Hyper Converged Infrastructure (HCI/aSV)

Sangfor HCI and aSV provide a unified infrastructure combining compute, storage, networking, and built-in security to simplify deployment, operations, and services.
{{ $t('productDocDetail.guideClickSwitch') }}
{{ $t('productDocDetail.know') }}
{{ $t('productDocDetail.dontRemind') }}
6.11.1R1
{{sendMatomoQuery("Hyper Converged Infrastructure (HCI/aSV)","Sangfor aSecurity (aSEC) Deployment")}}

Sangfor aSecurity (aSEC) Deployment

{{ $t('productDocDetail.updateTime') }}: 2026-01-05

Sangfor HCI supports the aSecurity deployment by importing virtual machines. This chapter mainly introduces the installation and deployment of the aSecurity, including the installation of the aSEC virtual machine and the deployment of the security protection management(ES/EDR) platform.

The deployment flow of aSecurity is shown below.

The network topology plan for Sangfor aSecurity deployment is shown in the figure below. The Sangfor aSecurity platform needs to be able to communicate with the HCI management network (it is recommended to be on the same network segment as the HCI management network). It is mainly used by Sangor aSecurity to call the API interface of HCI to execute tasks such as taking snapshots or creating distributed firewall policies.

The management interface of the security protection virtual machine will be connected to the physical interface (the physical interface must bridge to the HCI management interface, and it is recommended to be on the same network segment as the HCI management network).

The edge interface (optional) of the security protection virtual machine is connected to the physical edge interface to connect to the security servers, such as virus databases and cloud search services for automation of virus databases update.

The quarantined VMs will be added to the aSecurity quarantine policy. The policy will not take effect if the VM is directly connected to the edge.

Diagram  Description automatically generated

Sangfor aSecurity deployment recommended specification.

aSEC Virtual Machine Recommended Specification

Number of Endpoints

CPU

RAM

Disk

1 – 300 (default specification)

4 Cores

8G

300G

300 – 1000

4 Cores

16G

300G

1000 – 2000

8 Cores

32G

300G

Security Protection Virtual Machine Recommended Specification

Number of Endpoints

CPU

RAM

Disk

1 – 300 (default specification)

2 Cores

2G

300G

300 – 1000

2 Cores

4G

300G

1000 – 2000

4 Cores

8G

300G