The following table details the
minimum hardware requirements for
Security Management Server see
Security Management Server Architecture Design for additional information about scaling based on the size of your deployment.
Hardware Requirements
Processor
Modern Quad-Core CPU (1.5 GHz+)
RAM
16GB
Free Disk Space
20GB of free disk space
NOTE:Up to 10GB may be consumed for a local event database that is stored within PostgreSQL.
Network Card
10/100/1000 or better
Miscellaneous
IPv4 or IPv6 or Hybrid IPv4/IPv6 environment required
The following table details the
minimum hardware requirements for a
Security Management Server Front - End / Proxy Server.
Hardware Requirements
Processor
Modern Dual-Core CPU
RAM
8GB
Free Disk Space
20GB of free disk space for log files
Network Card
10/100/1000 or better
Miscellaneous
IPv4 or IPv6 or Hybrid IPv4/IPv6 environment required
Virtualization
The
Security Management Server can be installed in a virtual environment. Only the following environments are recommended.
Security Management Server v11.7 has been validated on the following platforms.
Hyper-V Server that is installed as a Full or Core installation or as a role in Windows Server 2012, Windows Server 2016, Windows Server 2019, or Windows Server 2022.
Hyper-V Server
64-bit x86 CPU required
Host computer with at least two cores
8 GB RAM minimum recommended
Hardware must conform to minimum Hyper-V requirements.
Security Management Server v11.7 has been validated with VMware ESXi 6.0, VMware ESXi 6.5, and VMware ESXi 6.5.
NOTE:When running VMware ESXi and Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, or Windows Server 2022, Dell Technologies recommends VMXNET3 Ethernet Adapters.
NOTE:The SQL Server database hosting the
Security Management Server must be run on a separate computer for performance reasons.
SQL Server
In larger environments, it is highly recommended that the SQL Database server run on a redundant system, such as a SQL Cluster, to ensure availability and data continuity. It is also recommended to perform daily full backups with transactional logging that is enabled to ensure that any newly generated keys through user/device activation are recoverable.
Database maintenance tasks should include rebuilding database indexes and collecting statistics.
Los datos no están disponibles para el tema
Proporcione calificaciones (1 a 5 estrellas).
Proporcione calificaciones (1 a 5 estrellas).
Proporcione calificaciones (1 a 5 estrellas).
Seleccione si el artículo fue útil o no.
Los comentarios no pueden contener estos caracteres especiales: <>"(", ")", "\"