A PacketSHaper is installed between the VPN Gateway and Internet i outer at the main site of a company's network A server at the main site is hosting business critical applications. A local ion-based traffic tree has been created which classifies traffic coming from three remote sites by subnet. All traffic between the remote sites and the central sue is encrypted.
Which two (2) useful pieces of data can the PacketShaper provide in this scenario? (Select two)
Refer to the exhibit.
Which attribute is use to create a class that matches web traffic from all subdomains within CNN's website?
Which two (2) actions are most appropriate for controlling prohibited, unsanctioned traffic flows such as music downloads? (Select two)
After insulting a PacketShaper inline between a switch anda router, communications are slow.
Which command, executed repeatedly, can helpto determine it there ate errorson the PacketShaper interfaces?