Sangfor HCI and aSV provide a unified infrastructure combining compute, storage, networking, and built-in security to simplify deployment, operations, and services.
Specification adjustment may generate the following impacts on your business: For access to services with cyber attack protection enabled, a small number of packets (one or two) may be lost, and a network jitter of no more than 10 seconds may occur. We recommend that you perform the operation during off-peak hours.
Specification adjustment may generate the following impacts on security protection: After configuration modification, the cyberattack protection module will restart to make the modification effective. The security protection policy will lose efficacy and recover within 1 minute. If any troubleshooting task exists, it will also be automatically closed.
If cyber attack protection is enabled, it occupies the CPU and memory resources of each physical host, which can be 1 CPU core, 1 GB memory by default and 8 CPU cores, 8 GB memory at maximum.
Steps
After installing aSecurity, click aSecurity. In the pop-up dialog box, click Go Now to enable VM security protection.
Go to Security Settings > Security Capabilities and click Enable for VM Security Protection
Configure and deploy EDR-MGR.
• Basics
Import the .vma VM file.
Select the datastore.
Keep the default value for the run location.
• Management interface: Specify the connection to the physical interface (this physical interface must have access to the HCI management interface, and we recommend that you plan it on the same segment as the HCI management network).
• (Optional) Business interface: Specify the connection to the physical interface of the business network, which can be used for connecting to security servers such as Antivirus Database and Cloud-Based Engine. Make sure that the physical interface can be connected to the following servers:
After the successful deployment, it will automatically redirect to the Security Capabilities page. Then, enable cyber attack protection.
• Cyber attack protection specification: Select the specifications as needed. If the specifications do not match the remaining resources of the physical host, that is, resources are insufficient, enablement may fail.
Container Instance Specifications
Maximum Traffic Throughput
vAF Reference Value
Remarks
1 vCPU core, 1 GB memory
800 Mbps
50 Mbps
1 CPU core, 2 GB memory for vAF
2 vCPU cores, 2 GB memory
1.8 Gbps
200 Mbps
2 CPU cores, 4 GB memory for vAF
4 vCPU cores, 4 GB memory
3.3 Gbps
400 Mbps
4 CPU cores, 8 GB memory for vAF
8 vCPU cores, 8 GB memory
5.2 Gbps
1.6 Gbps
8 CPU cores, 16 GB memory for vAF
• Processing for performance overload:
Passthrough: The platform automatically enables the policy passthrough mode if it is detected that the traffic limit is exceeded. This helps avoid business interruption.
Packet loss: The platform directly drops excessive packets if it is detected that the traffic limit is exceeded, which may cause business interruption.