Port-based application detection only works if each application communicates via its own specific port.
If application owners change protocols to HTTP or HTTPS, most traffic will appear to be Web or encrypted traffic.
Business traffic can't be prioritized, and unwanted traffic can't be blocked if it is unidentified.
Avoid network problems by controlling traffic patterns generated by the applications on the network.
Identify traffic coming across port 80 and port 443 without additional probes or spanning ports.
Identify high and low priority traffic to apply appropriate QoS.
Systems Engineer at Marina Bay Sands
Call us at 866.530.8100
Email us at Sales@SolarWinds.com