View and analyze bandwidth consumption across IP addresses, users, and
applications on the network. After reviewing the logs, adjust the allocated upstream
and
downstream bandwidth to control communications, block unwanted traffic, and allocate
the
appropriate bandwidth to critical traffic and services.