Virtual Appliance Sizing Guide
The following information is a guide to help you deploy the Cisco Secure Access Virtual Appliances (VAs) in your organization's environment. The key factors are ensuring that the hardware prerequisites are met, and understanding the network latencies between hops and the overall number of Secure Access Sites and users for each VA.
Table of Contents
- Prerequisites and Network Requirements
- High-Traffic Sites and Virtual Appliances
- AD Connector Sizing Guidelines
- Deployment Considerations
Prerequisites and Network Requirements
- For more information, see Prerequisites for Virtual Appliances.
High-Traffic Sites and Virtual Appliances
For sizing guidance, increasing the number of CPU cores on a VA will improve its performance, but the amount of RAM allocated to the machine must scale along with the number of CPU cores present.
Secure Access requires that you allocate at least 1 GB of RAM for each CPU core on the VA. For example, a VA deployed with two CPU cores should have a minimum of 2GB of RAM allocated to it.
VA Specifications | Maximum Queries per Second at Maximum 80% CPU Utilization |
---|---|
1 CPU, 1GB RAM | 1300 |
2 CPU, 2 GB RAM | 3500 |
4 CPU, 4 GB RAM | 8000 |
8 CPU, 8 GB RAM | 16000 |
16 CPU, 16 GB RAM | 28000 |
AD Connector Sizing Guidelines
For Active Directory integration with Virtual Appliances, we recommend that you size the AD Connector deployment for the number of VAs and domain controllers configured to communicate with this connector.
Number of Virtual Appliances | Number of Domain Controllers | Minimum Connector Specifications |
---|---|---|
1-2 | 1-5 | 2 CPU, 1 GB RAM |
4-15 | 6-20 | 4 CPU, 8 GB RAM |
16-20 | 21-64 | 4 CPU, 16 GB RAM |
>20 | >64 | 8 CPU, 32 GB RAM |
Each domain controller is assumed to process a maximum of 400 AD events a second. If any of your domain controllers are processing more events, make sure to increment the number of domain controllers accordingly. For example, if you have a domain controller that processes around 1000 AD events a second at peak load, count that as three domain controllers in the sizing table above.
If a connector is run on a system with lower CPU and memory specifications, the connector will continue to function. Some optimizations, such as parallel synchronization of login events to virtual appliances, will not be turned on.
Deployment Considerations
The number and location of VAs deployed in your environment will depend on the following:
- Overall latency:
- Latency between VA and the Secure Access Anycast DNS resolvers
- Latency between users and the VAs
- Number of Sites
- Number of users served by the VAs
Overall Latency
In general, clients on the network have the best web browsing experience when the total time to retrieve web resources is under 300ms. This total time to obtain web resources (such as documents, images, and stylesheets) includes both the time to retrieve a DNS response and the time needed to establish a connection with the server indicated in the DNS response. Secure Access aims to minimize the distance that a DNS packet must travel from a client device to our DNS resolvers. However, we do not control the responsiveness of those web servers or how traffic from various locations on the Internet is routed.
TOTAL TIME = Time to retrieve DNS response + Time to retrieve a web resource
There are two factors to consider when optimizing DNS response time: the distance between the VA and the Secure Access Anycast DNS resolvers, and the distance between the client and the VA.
The VA, when deployed, will forward all externally-bound DNS requests to the Secure Access DNS resolvers, 208.67.222.222 and 208.67.220.220. Therefore, when determining the latency between the VA and the closest Secure Access data center, we recommend an average DNS response time under 150ms for the best user experience.
When determining where to deploy VAs in your environment, you will want to take into account the distance between the clients that will utilize the VAs and the VAs themselves. For optimal performance, an average ping time between a client and the VM host on which the VA lives should not exceed 50ms.
Number of Secure Access Sites
Secure Access Sites allow you to divide up your Secure Access deployments. Each Secure Access Site is an isolated deployment in which the components will only communicate with other components in the same Secure Access Site. This is primarily useful in environments containing locations with high-latency connections or in environments with locations whose internal IP space overlaps.
Secure Access requires that you deploy at least two Virtual Appliances for a Site. This ensures high availability of the Virtual Appliances and the option to receive updates without downtime.
Number of Users for a VA
A typical VA deployed with minimum hardware requirements has a tested throughput of at least 2000 queries per second.
Taking into account these metrics, a single VA can handle DNS requests from at least 57,000 concurrent users. Secure Access defines a single user as a client that generates an average of 1000 DNS requests in a typical eight-hour workday. Therefore, Secure Access defines concurrent users as the number of users or devices sending DNS requests to a VA at the same time.
If the VA specifications are increased to two virtual CPUs and 1GB RAM, a single VA will be able to handle DNS requests from at least 115,000 concurrent users. The number of users on the network likely will NOT be the limiting factor when determining the number of VAs to deploy.
Virtual Appliance Deployment Guidelines < Virtual Appliance Sizing Guide > Manage VAs in Secure Access
Updated about 1 month ago