HeadPic Headpic2
Home About 3-sss Software Networking Consultancy Contact Us Careers
 

3S FIRE (INTERNET SYSTEM MANAGEMENT & BILLING).


Feature Description

* Speed Limits -: Sets a maximum transfer rate for users and protocols that are traffic-intensive.
* Layer 3 Kernel Processing -: All network transactions are processed at Layer 3 in the IP stack resulting in the highest possible traffic shaping performance for larger networks.
* Traffic Monitor -:View traffic statistics for internet streams in real time including protocol, speed, transfer totals and graphs for all active connections.


* Prioritization -: Boosts real-time protocols such as VoIP, games and video for extra performance. Priority can also be given to workstations or other applications.





* Remote Management -: Provides access to centralized shaping rules, traffic monitoring and configuration from any client computer.


* Protocol Classification -: Different flow types are processed separately, allowing user-defined Quality of Service and traffic shaping.
* Address Groups -: Allows policies to be set for entire groups of users which can be identified by IP address, MAC address (for DHCP networks) or domain name.
* Guaranteed Reservation -: Service Level Agreements can be quickly implemented using guaranteed minimum speeds for specified users and protocols.
* Percentage Allocation -: Splits bandwidth at a pre-defined ratio between groups of users. For example, one group can be allocated 25% of available bandwidth, and another can be given 75%. The available bandwidth is calculated dynamically and varies according to the internet load.
* Deep Packet Inspection -: Classifies traffic based on Layer 7 stream content, rather than the Layer 3 protocol and ports used. This allows shaping by application such as FTP, HTTP, Video streaming and other high level protocols.
* Dynamic Batch Rules -: Automatically detects active users and evenly distributes traffic between them. This feature is useful for web servers, for instance, where the IP addresses of the remote machines are not known in advance, allowing traffic shaping with a single rule for a group of users.


Previous / Next