1. Home
  2. Frequently Asked Questions
  3. Encrypted Protocols

Encrypted Protocols

Benefits of Optimization to Encrypted Traffic

One of the primary objectives of Wan Optimization is to reduce the load on the link through Compression and Deduplication. On the encrypted traffic this may not be possible directly on the encrypted payload, but the compression and deduplication on the bulk of the link traffic together with QoS limits and priorities may significantly improve the available bandwidth of encrypted protocols and ultimately application performance.

Traffic with the payload encrypted may not be reduced through compression and deduplication and some common encrypted protocols like SSH and HTTPS are placed in the bypassed Encrypted traffic policy class by default. When the payload is encrypted, each transfer of the same data is encrypted differently when sent across the WAN, which reduces the efficiency of compression and deduplication to 0%. To enable stream compression and deduplication, encryption and compression can be disabled on the application server and/or client.

Enabled Features on Encrypted traffic

To enable Compression, Deduplication and Packet Loss Recovery, first ensure the application is not bypassed with the Encrypted or Interactive default traffic policies. See how to Remove encrypted protocols from Interactive Bypass group. The Interactive class receives high priority by default and hence it would not be required to explicitly remove the application to configure high priority for it.

Layer-7 Deep Packet Inspection signatures are included for some encrypted traffic like Office 365, Facebook, Youtube etc.

Quality of Service features like Traffic Shaping, DSCP Tagging, Block and Priority Queuing can be configured on Encrypted traffic.

Application Visibility and NetFlow exports are also available for these protocols.

TCP Acceleration works on all TCP Traffic

Tags ,
Was this article helpful to you? Yes 2 No

How can we help?