Red Hat NETWORK BASIC - USER REFERENCE GUIDE 4.0 Guida Utente Pagina 6

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 79
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 5
6
Pre-Installation
To ensure a streamlined installation process, it is important to ensure that the appropriate hardware, software, and
licensing requirements are in place prior to installation.
Hardware requirements
Enterprise networks can vary in performance, capacity, protocols, and overall activity. Resource requirements to consider
for PVS deployments include raw network speed, the size of the network being monitored, and the configuration of the
PVS application.
The following chart outlines some basic hardware requirements for operating PVS:
Scenario
Minimum Recommended Hardware
Passive Vulnerability Scanner managing up to
50,000 hosts *
CPU: 1 dual-core 2 GHz CPU
Memory: 2 GB RAM (4 GB RAM recommended)
Passive Vulnerability Scanner managing in
excess of 50,000 hosts
CPU: 1 dual-core 3 GHz CPU (2 dual-core recommended)
Memory: 4 GB RAM (8 GB RAM recommended)
* Note: The ability to monitor a given number of hosts rests heavily on the bandwidth, memory, and processor
power available to the system running PVS.
Please research your VM software vendor for comparative recommendations as VMs typically see up to a
30% loss in efficiency compared with dedicated servers.
Processor requirements will increase with greater throughput and number of network interfaces. Memory requirements will
increase for networks with more hosts. The requirements for both of these components are affected by options such as a
long report-lifetime and enabling some or all of the PVS optional services in the configuration file.
Disk space requirements for PVS will vary depending on usage based on the amount and length of time data is stored on
the system.
Software and Licensing
Download or Obtain the Software
To install the PVS, obtain the correct version for your desired operating system from the “Downloads” section of the
Tenable Support Portal. Confirm the integrity of the installation package by comparing the download MD5 checksum with
the one listed in the product release notes.
It is important to ensure that the correct build for your operating environment is downloaded to ensure binary
compatibility.
PVS Subscription
A PVS subscription Activation Code is available to enable PVS to operate in a stand-alone mode. This mode enables the
PVS results to be viewed from a HTML interface enabled on the PVS server.
SecurityCenter Continuous View
Continuous View includes PVS as part of a bundled license package with SecurityCenter. This license allows an unlimited
number of PVS deployments to monitor an unlimited number of networks. SecurityCenter’s IP view will be constrained by
the license purchased with it.
Vedere la pagina 5
1 2 3 4 5 6 7 8 9 10 11 ... 78 79

Commenti su questo manuale

Nessun commento