Toggle navigationAboutRelease and supportSystem architecturesGetting startedRequirements and limitationsInstallation and upgradeConfigurationUse casesGateway deploymentSession handlingTrafficHTTP/3Post-quantum cryptographyFilteringAuthenticationObservabilityToolingTroubleshooting and supportReference documentationUse casesTrafficTrafficThis chapter contains traffic management use cases.Chapter contentConfigure downstream HTTP/3Post-quantum cryptography