Internet Traffic Shaping

proactive Network Monitoring

Internet Traffic Shaping

Peer to peer file sharing and unauthorized downloads of music and videos can bring your network to a screeching halt. Wanaport provides state of the art internet traffic shaping technology to limit unauthorized downloads of music, videos or adult content through peer to peer websites. Online gaming consoles can also degrade network performance. Allocate your properties precious bandwidth so your most important guests, e.g., business users that stay at your property often, can always download large files from their home office in seconds.

How does internet traffic shaping work?

Wanaport performs the following tasks 24/7 on all your network traffic:

  • We monitor ALL traffic with a layer 7 solution that covers all ports and protocols.
  • We discover and valuate traffic with advanced analytics and reports that categorize applications, content, users and devices.
  • We set specific policies on traffic values, blocking inappropriate traffic and properly prioritizing recreational, relevant and critical traffic.
    The result? Network performance improves and it stays that way!

What are the four types of internet traffic on your guest based network? 

Unfit Traffic

Consists of unwanted traffic, content or users that must be blocked, including web based threats. Common examples include malware, pornography, violence, P2P Applications, unauthorized mobile devices, etcetera.

Recreational Traffic

Consists of “everything else” traffic, content, and users that don’t cause alarms, but aren’t that important for business. Common examples include streaming media, iCloud, Spotify, Facebook, BYOD, etcetera.

Relevant Traffic

Consists of business operations traffic, content, and users like business software and services often found on cloud and other hosted environments. Common examples include CRMs, Google Drive, Microsoft OneDrive, Dropbox, Zoom, Skype, GoToMeeting, connected equipment (copiers, postal machines, etc.), UPS.com, etcetera.

Critical Traffic

Consists of traffic, content, and users that affect revenue production and management and that fundamentally depend on a high performing internet. Common examples include hosted billing systems, cloud-based ERPs, order fulfillment systems, etc.

Request a Free Consultation

We’ll answer all your questions and offer our candid business and technical advice on how to get the best ROI from your next generation cloud managed Wi-Fi solution. We look forward to becoming a long-term partner in strengthening your business.



    First Name


    Last Name





    happy hospitality wifi customer