Virtual Modular Sensor Provisioning and Performance

This article describes the resources required for the successful installation and operation of Stellar Cyber virtual modular sensors. Virtual modular sensors install as dedicated VMs with Stellar Cyber software pre-installed.

Refer to the following sections for details:

What Determines Sensor Performance?

Virtual modular sensor performance depends on the following key factors:

  • Allocated VM resources (CPU and Memory). Sensor performance scales with CPU and RAM.

  • Enabled features (Log Forwarder, Network Traffic, Sandbox, and IDS).

  • Traffic volume (both peak and sustained events per second, connections per second, and bandwidth usage).

More features, deeper inspection, and more traffic always require more CPU and RAM.

Sensor Provisioning Rules

Guarantee your virtual modular sensor performance by following these rules for sensor provisioning:

As a simple rule, more traffic and inspection depth require more CPU and memory.

Sensor Provisioning by Module

Stellar Cyber provides virtual modular sensors using specific modules. This section lists the provisioning you must provide to achieve the performance for your purchased module. See the sections below for details.

Stated specifications support the corresponding maximum network traffic inspection throughput. Performance may vary depending on your environment, configuration, and other variables.

Network-Module Sensor Specifications

The Network-Module sensor specifications assume a span port, local file assembly, packet forwarding, log forwarding, and Network Traffic. The Malware Sandbox and IDS features are not enabled.

Virtual machines for the Network-Module sensors must be provisioned as follows:

Component Network-Module-1G Network-Module-10G
Virtual Cores (reserved) 8 32
RAM (GB) (reserved) 16 64
Maximum throughput (Gbps)
(1 or 2 span ports)
Up to 1.0 Up to 10.0
Log Forwarder Events/s 7,000 10,000

Security-Module Sensor Specifications – IDS Only

The Security-Module IDS sensor specifications assume a span port, local file assembly, log forwarding, Network Traffic, and IDS. The Malware Sandbox feature is not enabled.

Virtual machines for the Security-Module sensors must be provisioned as follows:

Component

Security-Module-200M IDS

Security-Module 500M IDS

Security-Module 1G IDS Security-Module 10G IDS
Virtual Cores (reserved)        
RAM (GB) (reserved)        
Maximum throughput (Mbps)
(1 or 2 span ports)

Up to 200

Up to 500

Up to 1,000 Up to 10,000
Log Forwarder Events/s        

Security-Module Sensor Specifications – IDS and Sandbox

The Security-Module sensor specifications assume a span port, local file assembly, log forwarding, Network Traffic, Malware Sandbox, and IDS.

Virtual machines for the Security-Module IDS sensors must be provisioned as follows:

Component

Security-Module-200M

Security-Module-500M

Security-Module-1G Security-Module-10G
Virtual Cores (reserved)

4

8

16 32
RAM (GB) (reserved)

8

16

64 64
Maximum throughput (Mbps)
(1 or 2 span ports)

Up to 200

Up to 500

Up to 1,000 Up to 10,000
Log Forwarder Events/s

1,500

1,500

7,000 10,000