
Check Point QoS Policy
330
. . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CHECK POINT QOS POLICY
Defining a Check Point QoS Policy is very similar to defining a Security Policy.
Rules and objects define the actions a QoS Module should take for different
types of traffic. In the QoS Policy, connections are classified according to four
criteria:
Source
— Nodes, networks, user groups, domains
Destination
— Nodes, networks, user groups, domains
Resources
— Only resources of type URI for QoS
Service
— Limited to:
•TCP
• Compound TCP
• UDP
•ICMP
• Citrix TCP Services
• IP Services
Time
— Defined for specific times and/or specific days
These fields can be populated with the same objects used to define Security and
Desktop Policies. The Action configuration options for the QoS Policy differ
significantly from the actions available in a Security or Desktop Policy. The
Action field in a QoS rule is used to:
• Define Weights.
• Set Limits.
• Set Guarantees.
Other QoS parameters are configured on the QoS Modules’ Topology >
Interface Properties screens and on the Global Properties > QoS screen.