Go back to Security > aSecurity > Security Capabilities, click Add Resource Pool in the new page select a resource pool click Next. You can enable VM Security Protection and Cyber Attack Protection. After you select Cyber Attack Protection you need specific Resource Used and Method.
Resource Used:
Container Instance Specifications
Maximum Traffic Throughput
vNGAF Reference Value
Remarks
1 vCPU core, 1 GB memory
800 Mbps
50 Mbps
1 CPU core, 2 GB memory
2 vCPU cores, 2 GB memory
1.8 Gbps
200 Mbps
2 CPU cores, 4 GB memory
4 vCPU cores, 4 GB memory
3.3 Gbps
400 Mbps
4 CPU cores, 8 GB memory
8 vCPU cores, 8 GB memory
5.2 Gbps
1.6 Gbps
8 CPU cores, 16 GB memory
If the specifications do not match the remaining resources of the physical host, that is, resources are insufficient, enablement may fail.
Method:
Passthrough: The platform automatically enables the policy passthrough mode if it is detected that the traffic limit is exceeded. This helps avoid business interruption.
Packet loss: The platform directly drops excessive packets if it is detected that the traffic limit is exceeded, which may cause business interruption.