Sophos Utm9.2 Sizing-guide - Ikaria

1y ago
13 Views
2 Downloads
1.05 MB
6 Pages
Last View : 8d ago
Last Download : 3m ago
Upload by : Victor Nelms
Transcription

Sizing Guideline Sophos UTM 9.2 Sophos UTM 9.2 Sizing Guide

Three steps to specifying the right appliance model This document provides a guideline for choosing the right Sophos UTM appliance for your customer. Specifying the right appliance is dependent on a number of factors and involves developing a usage profile for the users and the network environment. For best results we recommend using the following step-by-step procedure: 1. Identify the “Total UTM User” Number Understand the customer’s environment like browsing behavior, application usage, network and server infrastructure to get an accurate understanding of the actual usage a UTM will see at peak times. 2. Make a first estimate Based on the Total UTM User number. 3. Check specific throughput requirements Understand if any local factors like the maximum available internet uplink capacity will impact performance – check this against Sophos UTM throughput numbers and adjust the recommendation accordingly. Of course, the best way to understand if an appliance will meet a customer’s needs is to test it in the customer environment and with Sophos UTM you can offer a free on-site evaluation of the selected unit. 1. Identify the “Total UTM User” number Use the following table to first calculate the Total UTM User number that the UTM will need to handle. a. Calculate the Weighted User Count number. Identify the user category (Average/Advanced/Power) that best fits the average user behavior of the users, or estimate how many users fit each category. Use the criteria in table 1.2 to classify the type of users. E nter the User Counts in table 1.1, multiply them with the indicated factor, enter the results into the "Weighted User Count" boxes and sum it into the "Total Weighted User Count" box. b. Identify the System Load Number. Use the criteria using table 1.3 to classify the load. Enter the System Load Number in the box "multiplied by System Load" in table 1.1, multiply it with the "Total Weighted User Count" and enter the result into the "Total UTM Users" box. Table 1.1 User Count Standard user Advanced Users Power Users Total User Count Multiplied by 1 1,5 2 Total Weighted User Count multiplied by System Load Total UTM Users Sophos UTM 9.2 Sizing Guide Weighted User Count

1.2 User Category Criteria Use the criteria described below to classify the type of users. Average user Advanced user (*1.5) Power user (*2) Email usage (per 10h working day) Number of received emails in inbox 50 50 to 100 100 Data volume Few MBytes Multiple MBytes Numerous MBytes Web usage (per 10h working day) Data volume Few MBytes Multiple MBytes Numerous MBytes Usage pattern Equally spread throughout the day Various peaks Many peaks Web applications used Mostly webmail / Google / news Heavy surfing, moderate media transfer, business applications Intensive surfing and media transfers (schools, universities) Rarely – sporadically connected Several times per week – connected at regular times Every day – connected most of the time VPN usage VPN remote access usage 1.3 System Load Criteria Identify any specific requirements that might increase the overall system load and hence the performance requirements for the system. Average system usage Advanced system usage (*1.2) High system usage (*1.5) No Yes Yes No IPS protection required Mostly Windows PCs, 1-2 servers Various Client Operating systems, browsers and multimedia apps, 2 servers 50% 50-90% 90% Report storage time and granularity requirement Up to 1 month web report only (per Domain) Up to 3 months Up to 5 reports (per Domain) 3 months (per URL) Accounting storage time on UTM No Up to 1 month 1 month Authentication Active Directory in use FW/IPS/VPN usage Variety of systems to be protected by IPS Email Percentage of Spam Reporting Sophos UTM 9.2 Sizing Guide

2. Make first estimate — using the calculated “Total UTM User” number Take the “Total UTM User” and make a first estimate for the required UTM hardware appliance within the following diagram: ÌÌ Each line shows the range of users recommended when only using this single subscription. ÌÌ Please ensure all numbers include users connected via VPN, RED and wireless APs. Subscription Profile Email Protection UTM 100 UTM 110 UTM 120 UTM 220 UTM 320 UTM 425 UTM 525 Network Protection UTM 100 UTM 110 UTM 120 UTM 220 UTM 320 UTM 425 UTM 525 Web Protection UTM 100 UTM 110 UTM 120 UTM 220 UTM 320 UTM 425 UTM 525 Email Network Web UTM 100 All UTM Modules UTM 100 Total UTM Users UTM 120 UTM 110 UTM 110 10 UTM 120 25 UTM 220 UTM 220 UTM 320 UTM 320 50 150 UTM 425 UTM 425 350 UTM 525 UTM 525 UTM 625 UTM 625 UTM 625 UTM 625 UTM 625 1,000 2,500 5,000 Rule of thumb: ÌÌ Estimate that adding Wireless Protection, Webserver Protection or Endpoint Protection in will decrease range by 5-10% each. 3. Check for specific throughput requirements Depending on the customer’s environment there might be specific throughput requirements driving an adjustment of your first estimate to a higher (or even lower) unit. These requirements are typically based on the following two factors: The maximum available internet uplink capacity The capacity of the customer’s internet connection (Up- and downlink) should match the average throughput rate that the selected unit is able to forward (depending on the subscriptions in use). For instance if the download or upload limit is 20 Mbps only then there is no huge benefit for using a UTM 320 even though the calculated total number of users is around 100. In that case even a UTM 220 might be sufficient because it can perfectly fill the complete internet link even with all UTM features enabled. However data might not only be filtered on its way to the internet but also between internal network segments. Hence consider internal traffic that traverses the firewall as well in this assessment. Specific performance requirements based on customer experience or knowledge If the customer knows their overall throughput requirements among all connected internal and external interfaces (e.g. based on their past experience) then check whether the selected unit is able to meet these numbers. For instance the customer might have several servers located within a DMZ and wants to get all traffic to those servers from all segments to be inspected by the IPS. Or the customer may have many different network segments that should be protected against each other (by using the FW packet filter and/or the Application Control feature). In this case require that the unit must scan the complete internal traffic between all segments. Sophos UTM 9.2 Sizing Guide

Further questions to ask in order to find out if there are any other performance requirements: ÌÌ ÌÌ ÌÌ ÌÌ How many site-to-site VPN tunnels are required? How many emails are being transferred per hour - on average/at peak times? How much web traffic (Mbps and requests/s) is being generated - on average/at peak times? How many web servers should be protected and how much traffic is expected - on average/at peak times? The following section provides detailed performance numbers to help determine whether the selected appliance meets all individual requirements. Sophos UTM Hardware performance numbers The following table provides performance numbers by traffic type measured within Sophos UTM Labs. Average numbers represent throughput values achievable with a typical/real life traffic mix (IMIX with various packet sizes), maximum numbers represent best throughput achievable under perfect conditions, e.g. using large packet sizes. Please note that none of these numbers are guaranteed as performance may vary in a real life customer scenario based on user characteristics, application usage, security configurations and other factors. For detailed information please refer to the “Sophos UTM - Performance Test Methodology” document. UTM 100 rev.5 UTM 110 rev.5 UTM 120 rev.5 UTM 220 rev.5 UTM 320 rev.5 UTM 425 rev.5 UTM 525 rev.5 UTM 625 rev.2 Firewall max. 1 (Mbps) 250 1000 1,800 3,000 3,500 6,000 23,000 40,000 Firewall Realworld (Mbps) 100 350 813 2,600 2,721 5,180 12,900 15,300 ATP Realworld (Mbps) 100 350 678 2,200 2,133 5,090 9,785 11,150 60 140 420 1,200 1,900 5,500 6,800 9,100 35 75 175 490 696 2,130 2,474 4,832 FW ATP IPS max. (Mbps) 50 130 390 1,140 1,820 5,080 6,160 8,050 2 FW ATP IPS Realworld (Mbps) 25 50 100 200 265 1,165 1,210 3,630 App Ctrl Realworld 2 (Mbps) 80 330 603 2,000 2,500 5,120 10,250 12.200 VPN AES max. 3 (Mbps) 60 100 180 500 800 2,500 4,200 5,500 VPN AES Realworld (Mbps) 30 40 54 100 190 400 850 1,700 Web Proxy plain (Mbps) 80 120 180 520 750 2,100 4,000 4,200 Web Proxy – AV 5 (Mbps) 35 50 75 235 375 1,400 1,700 3,800 Web Application Firewall – AV 5 (Mbps) N/A 40 85 490 900 1,700 2,300 2,600 Web requests/sec – AV 100 250 380 1,300 2,000 6,800 7,900 18,000 10,000 20,000 30,000 52,000 78,000 160,000 200,000 250,000 100,000 150,000 250,000 400,000 600,000 1,600,000 2,000,000 2,500,000 1,700 1,700 1,700 6,000 9,900 25,000 35,000 50,000 20,000 40,000 300,000 1,000,000 2,000,000 3,000,000 4,500,000 6,000,000 Concurrent IPsec VPN tunnels 5 10 25 125 400 800 2.000 2.200 Concurrent SSL VPN tunnels 10 30 70 150 200 250 320 340 N/A 5 10 20 35 70 80 100 Model Performance Numbers 2 2 IPS max. 1 (Mbps) IPS all rules (Mbps) 1 4 5 5 Emails scanned (max emails/h) Emails seen (max emails/h) Maximum connections New TCP connections/sec Concurrent TCP connections HTML5 sessions 1. 1518 byte packet size (UDP), default rule set 4. NSS Core Mix (TCP/UCP) 2. NSS Perimeter Mix (TCP/UCP) 5. Throughput: 100kByte files, requests/sec: 1Kbyte files 3. AES-NI with AES GCM where possible (UDP) Sophos UTM 9.2 Sizing Guide

Sophos UTM 9.2 Sizing Guide Sophos UTM Software/Virtual Appliances For choosing a typical system configuration when installing Sophos UTM software on Intel-compatible PCs/ servers Sophos recommends selecting a Sophos UTM Hardware appliance that fits the needs first (based on the guidance shown above) and then choose a suitable hardware configuration from the table below. Model UTM 100 rev.5 UTM 110 rev.5 UTM 120 rev.5 UTM 220 rev.5 UTM 320 rev.5 UTM 425 rev.5 UTM 525 rev.5 UTM 625 rev.2 CPU Atom (600Mhz) Atom (1Ghz) Atom (1.6Ghz) Celeron Dual Core (2.2Ghz) Pentium Dual Core (2.6Ghz) Quad Core i5 (3.1GHz) Xeon Six Core E5 (2.0 GHz) 2*Xeon Eight Core E5 (2.0 GHz) Memory (GB) 2 2 2 2 4 8 16 24 Using a Sophos UTM in a virtual environment has a estimated 10% performance decrease caused by the Hypervisor framework. On-site evaluations While the procedure explained above is a good foundation for selecting the most appropriate model it is only based on information received from the customer. There are many factors determining the behavior and performance of a UTM appliance which can only be evaluated in a real life scenario. Hence an onsite evaluation within the customer’s environment is always the best to determine whether the selected appliance meets the actual performance requirements of the customer. For further assistance, staff within the Sophos pre-sales teams are ready to assist you sizing and in selecting the right platform. Sales DACH Deutschland, Österreich Schweiz Tel: 49 (0)611 5858-0 Tel: 49 (0)721 255 16-0 Email: sales@sophos.de Japan Sales Tel: 81 3 3568 7550 Email: sales@sophos.co.jp China Sales Tel: 86-10 - 6567 5820 Shanghai Sales Tel: 86-21-32517160 United Kingdom and Worldwide Sales Tel: 44 (0)8447 671131 Email: sales@sophos.com North American Sales Toll Free: 1-866-866-2802 Email: nasales@sophos.com Australia and New Zealand Sales Tel: 61 2 9409 9100 Email: sales@sophos.com.au Oxford, UK Boston, USA Copyright 2014. Sophos Ltd. All rights reserved. Registered in England and Wales No. 2096520, The Pentagon, Abingdon Science Park, Abingdon, OX14 3YP, UK Sophos is the registered trademark of Sophos Ltd. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. 04.14.RP.utm92sg.uk

Sophos UTM 9.2 Sizing Guide 2. Make first estimate — using the calculated "Total UTM User" number Take the "Total UTM User" and make a first estimate for the required UTM hardware appliance within the following diagram: Ì Each line shows the range of users recommended when only using this single subscription.

Related Documents:

HTTPS Sophos UTM Manager IP Address 192.168.2.200 Sophos UTM (UTM01) Port 4433 Ext. IP Address 65.227.28.232 WebAdmin Port 4444 Port 4433 InternetInte Sophos UTM (UTM03) Sophos UTM (UTM04) Sophos UTM (UTM02) Sophos UTM (UTM06) Sophos UTM (UTM07) Sophos UTM (UTM05) Sophos UTM (UTM08) Customer/Of ce 1 Customer/Of ce 2 Port 4422 Gateway Manager

This section describes the Sophos products required for managed endpoint security: Sophos Enterprise Console Sophos Update Manager Sophos Endpoint Security and Control 2.1 Sophos Enterprise Console Sophos Enterprise Console is an administration tool that deploys and manages Sophos endpoint software using groups and policies.

Sophos Server Protection Sophos Email Protection EMC NetApp Sophos for Network Storage ストレージサーバー 外部用サーバー SafeGuard Sophos Anti-Virus for vShield - VDI Windows Mac Linux Windows クライアント 支店 / 支社 2 Sophos RED Sophos Wi-Fi Ac

This guide is intended to help you install and get up and running with Sophos iView v2. Reports for Device Type iView v2 provides reports for following device types: - Sophos Firewall OS - Sophos UTM 9 - CyberoamOS Licensing Sophos iView licenses are available in multiple tiers based on storage requirements and support terms

Sep 21, 2018 · Sophos Anti-Virus for NetApp Storage Systems 4 Before you install Sophos Anti-Virus for NetApp Storage Systems Before installing Sophos Anti-Virus for NetApp Storage Systems, you need to do the following: Install Sophos Endpoint Security and Control (antivirus component only

EventTracker: Integrating Sophos UTM 11 Figure 11 . Verify Sophos UTM Alerts 1. Logon to EventTracker Enterprise. 2. Click the Admin menu, and then click Alerts. 3. In the Search field, type ' Sophos UTM ', and then click the Go button. Alert Management page will display all the imported Sophos UTM alerts. Figure 12 . 4.

Sophos XG Firewall v 15.01.0 – Release Notes Sophos XG Firewall Web Interface Reference and Admin Guide v17 For Sophos Customers Document Date: October 2017

conforms to the ISO 14001 Standard.1 While ISO 14001 has existed for more than 20 years, the changes adopted by the International Organization of Standards in 2015 are the most sweeping since the standard’s inception. Organizations certified to the former version must incorporate the new requirements by September 15, 2018. The articles that follow examine key changes in the ISO 14001:2015 .