Hey,
I have a few site to site ipsec vpn tunnels and i wanted to know if there is a way to limit the traffic for a specific tunnel. I want to limit the traffic to 2mbps on that specific tunnel.
This thread was automatically locked due to age.
Hey,
I have a few site to site ipsec vpn tunnels and i wanted to know if there is a way to limit the traffic for a specific tunnel. I want to limit the traffic to 2mbps on that specific tunnel.
Tom,
you can apply traffic shaping to firewall rule (lan to VPN) where in the destination objects, you specify the IP, range IP of the remote VPN network. Of course if you have multiple VPN, create many different firewall rules with specific source/destination IP (vpn to lan and lan to vpn firewall rule).
https://community.sophos.com/kb/en-us/123357
Regards
Tom,
remember to ask one question per thread. If the question is answered, mark "this helped me" so the thread is marked as completed.
IPS is resource consuming but it should applied wherever possible. It depends how you trust your other side of the tunnel. Apply an IPS based on the traffic that will pass through the tunnel, for example select only the application that will pass through it. Most of the time, Admins create a site to site where services is any. This is not my case. I always pretend to know what the tunnel is for, which protocols, users, etc etc etc will need to be allowed. This is another vector of malware if the other side is not correctly protected or breached.
Regards
Tom,
remember to ask one question per thread. If the question is answered, mark "this helped me" so the thread is marked as completed.
IPS is resource consuming but it should applied wherever possible. It depends how you trust your other side of the tunnel. Apply an IPS based on the traffic that will pass through the tunnel, for example select only the application that will pass through it. Most of the time, Admins create a site to site where services is any. This is not my case. I always pretend to know what the tunnel is for, which protocols, users, etc etc etc will need to be allowed. This is another vector of malware if the other side is not correctly protected or breached.
Regards