McAfee VirusScan Enterprise for Storage 1.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x



Similar documents
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator Software

McAfee Gateway 7.x Encryption and IronPort Integration Guide

McAfee Agent Handler

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee epolicy Orchestrator 4.5 Cluster Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Risk Advisor 2.7

Release Notes McAfee Risk Advisor Software For use with epolicy Orchestrator and Software

Release Notes for McAfee VirusScan Enterprise for Storage 1.0

epolicy Orchestrator Log Files

Desktop Release Notes. Desktop Release Notes 5.2.1

Implementing McAfee Device Control Security

Recommended Recommended for all environments. Apply this update at the earliest convenience.

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version and earlier

McAfee VirusScan Enterprise for Linux Software

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Product Guide Revision A. McAfee Secure Web Mail Client Software

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

Product Guide Revision A. McAfee Secure Web Mail Client Software

McAfee Solidcore Change Reconciliation and Ticket-based Enforcement

Release Notes for McAfee epolicy Orchestrator 4.5

McAfee Total Protection Service Installation Guide

Product Guide. McAfee Security-as-a-Service Partner SecurityDashboard 5.2.0

McAfee epolicy Orchestrator

McAfee GTI Proxy Administration Guide

Installation Guide. McAfee Security for Microsoft Exchange Software

Total Protection Service

Installation Guide. McAfee epolicy Orchestrator Software

Verizon Internet Security Suite Powered by McAfee User Guide

McAfee Solidcore Product Guide

McAfee Security for Microsoft SharePoint User Guide

McAfee Cloud Identity Manager

Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise

Installation Guide. McAfee SaaS Endpoint Protection 5.2.0

Performance Test Report: Novell iprint Appliance 1.1

McAfee SiteAdvisor Enterprise 3.5.0

Comparing the Network Performance of Windows File Sharing Environments

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Release Notes for McAfee(R) GroupShield(TM) version Patch 1 for Microsoft Exchange. Copyright (C) 2011 McAfee, Inc. All Rights Reserved CONTENTS

McAfee(R) Security Virtual Appliance 5.6 Installation Guide

Antivirus Solution Guide for Clustered Data ONTAP 8.2.1: McAfee

McAfee Cloud Identity Manager

Network Threat Behavior Analysis Monitoring Guide. McAfee Network Security Platform 6.1

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

System Status Monitoring Guide. McAfee Network Security Platform 6.1

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

McAfee(R) and Web Security Virtual Appliance 5.6 Installation Guide

Best Practices Guide. McAfee Endpoint Protection for Mac 1.1.0

McAfee VirusScan Enterprise for Storage 1.1.0

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

Dragon NaturallySpeaking and citrix. A White Paper from Nuance Communications March 2009

McAfee Policy Auditor 6.0 software Product Guide for epolicy Orchestrator 4.6

McAfee UTM Firewall Control Center Product Guide. version 2.0

Product Guide. McAfee epolicy Orchestrator Software

For a list of supported environments for VirusScan Enterprise 8.7i on Microsoft Windows, see (McAfee) KnowledgeBase article KB51111.

TREND MICROTM ServerProtectTM for EMC Celerra TM

Symantec AntiVirus for Network Attached Storage 5.1

McAfee Cloud Identity Manager

AVG File Server. User Manual. Document revision ( )

Installation Guide. McAfee VirusScan Enterprise for Linux Software

Total Protection for Enterprise-Advanced

McAfee MOVE AntiVirus 2.6.0

Best Practices Guide Revision B. McAfee epolicy Orchestrator Software

New!! - Higher performance for Windows and UNIX environments

McAfee VirusScan Enterprise 8.8 software Installation Guide

Product Guide. McAfee SaaS Endpoint Protection 5.2.0

McAfee SiteAdvisor Enterprise 3.5 Patch 2

Infor Web UI Sizing and Deployment for a Thin Client Solution

McAfee VirusScan Enterprise 8.8 software Product Guide

Data Center Connector for vsphere 3.0.0

Best Practices Guide. McAfee Security for Microsoft Exchange Software

NTP Software QFS for NAS, NetApp Edition Installation Guide

AVG File Server User Manual. Document revision (11/13/2012)

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

McAfee MOVE AntiVirus Multi-Platform 3.5.0

Performance Optimizer Software

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

McAfee Certified Product Specialist McAfee epolicy Orchestrator

System Requirements Table of contents

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

Microsoft SharePoint Server 2010

PHD Virtual Backup for Hyper-V

10.2 Requirements for ShoreTel Enterprise Systems

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

AuditMatic Enterprise Edition Installation Specifications

By the Citrix Publications Department. Citrix Systems, Inc.

Upgrade Guide. McAfee Vulnerability Manager Microsoft Windows Server 2008 R2

Hardware/Software Specifications for Self-Hosted Systems (Multi-Server)

McAfee Public Cloud Server Security Suite

Microsoft Windows Server 2003 with Internet Information Services (IIS) 6.0 vs. Linux Competitive Web Server Performance Comparison

Installation Guide Revision B. McAfee Gateway 7.x Virtual Appliances

McAfee SaaS Archiving

Release Notes for McAfee(R) VirusScan(R) Enterprise for Linux Version Copyright (C) 2014 McAfee, Inc. All Rights Reserved.

Oracle Database Scalability in VMware ESX VMware ESX 3.5

Transcription:

McAfee VirusScan Enterprise for Storage.0 Sizing Guide for NetApp Filer on Data ONTAP 7.x

COPYRIGHT Copyright 200 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIELD, LINUXSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2

Contents Overview.................................................................................... 4 Sizing Overview............................................................................ 5 Samples used in the tests.................................................................... 5 Hardware details........................................................................... 6 Testbed Configuration Single Filer with single Scan Server....................................... 7 Testbed Configuration Single Filer connected to two Scan Servers................................. 7 Performance Comparison between Single Proc and Dual Proc Scan Servers........ 8 CPU utilization............................................................................. 8 Average Scan Response time................................................................. 9 Average Throughput....................................................................... 0 Performance Statistics................................................................... Performance Improvement by adding additional Scan Servers..................... 3 Performance Considerations............................................................ 5 Test Summary............................................................................. 6 3

Overview McAfee VirusScan Enterprise for Storage.0 (VSES) remotely scans NetApp filers and Internet Content Adaptation Protocol (ICAP) storage appliances, by expanding the capabilities of McAfee VirusScan Enterprise 8.7i. McAfee VirusScan Enterprise for Storage.0 is an add-on to McAfee VirusScan Enterprise 8.7i. You can configure VirusScan Enterprise for Storage from the VirusScan Console or use epolicy Orchestrator to centrally manage and enforce policies, then use queries and dashboards to track activity and detections. The VirusScan Enterprise for Storage installation adds the following: Console Network Appliance Filer AV Scanner and ICAP AV Scanner Service McAfee VirusScan Enterprise for Storage, which manages scan requests received from the filer and uses the McAfee Engine Service to perform the actual scan. When a file is accessed by the CIFS (Common Internet File System) user, the Data ONTAP sends the file's UNC path to VirusScan Enterprise for Storage for scanning. VirusScan Enterprise for Storage then scans the file and takes the necessary action, then sends the result back to the filer. When a user tries to open, create or modify the files, the NetApp filer will send a scan request to VirusScan Enterprise for Storage when the following criteria is met: The file extension is included in the to-be-scanned file types list. The file has not already been marked as previously scanned, and no changes have occurred to the file. 4

Sizing Overview The objective of this sizing exercise is to measure the performance characteristics of the scanner and the NetApp Filer on various configurations. This helps an end-user to decide the number of scanners required for a given user load. McAfee has conducted these tests on the following filer configurations: Single NetApp filer with single Scan Server Single NetApp filer connected to two Scan Servers All the tests are done with 00% write operation, which means each file sends a scan request to the scan server. The default Scanner settings and default NetApp filer "vscan" settings were used for these sizing tests. A freeware tool having the capability of multi-threading feature was used for this exercise. The windows "perfmon" is used to capture scan server performance statistics. On the NetApp filer, "systat" command is used to capture the filer's performance statistics. Contents Samples used in the tests Hardware details Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer connected to two Scan Servers Samples used in the tests Different file types with extensions of doc, pdf, xls, txt, zip, rar, ppt, eml, com, docx, dcom and tmp were included in the sample set. The sample set consisted of 37 files. Sample size Clean vs. Infected ratio Average = 3 MB Minimum = KB Maximum = 30 MB 60% to 40% 5

Sizing Overview Hardware details Hardware details This section describes the hardware requirements, to measure the performance characteristics of the scanner and the NetApp Filer on various configurations for this sizing exercise. Table : Sizing excercise Hardware requirements Hardware Component Filer Scan Server Single Proc Scan Server Dual Proc Domain Controller Filer Model: FAS 2020 DataOntap Version: 7.3.. Processor: One, 298MHz Memory: 896MB NVMem: 28MB Network Adapter: Gbps speed Model: Dell Optiplex GX620 RAM: GB Processor: One Pentium4, 2.80GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) Model: Dell PowerEdge 2900 RAM: 4GB Processor: 2x Intel Xeon CPU 520 with Dual Core,.86GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) Model: Dell Optiplex GX620 RAM: GB Processor: One Pentium4, 2.80GHz Network Adapter: Gbps speed Operating System: Microsoft Windows 2003 Enterprise Server (x64bit) 6

Sizing Overview Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer with single Scan Server Testbed Configuration Single Filer connected to two Scan Servers 7

Performance Comparison between Single Proc and Dual Proc Scan Servers Tests were conducted separately on a single proc server and dual proc server. Below are the comparison graphs of CPU utilization, response time and throughput for the same load and the same settings. Contents CPU utilization Average Scan Response time Average Throughput CPU utilization The following figure shows the CPU utilization of Single Proc Scan Server and Dual Proc Scan Server: Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings 8

Performance Comparison between Single Proc and Dual Proc Scan Servers Average Scan Response time VSCAN Settings: Default settings Average Scan Response time The following figure shows the average scan response time (in milliseconds) of Single Proc Scan Server and Dual Proc Scan Server: Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings. VSCAN Settings: Default settings 9

Performance Comparison between Single Proc and Dual Proc Scan Servers Average Throughput Average Throughput When determining the sizing requirement, this average throughtput measurement is important. The following figure shows the average throughput in KB/s of Single Proc Scan Server and Dual Proc Scan Server. Tests were conducted on a single proc server and dual proc server seperately with the same load. Load Profile: 30 Users (30 clients accessing CIFS share) Test Duration: hour (Average of 3 runs) VSES Settings: Default settings VSCAN Settings: Default settings 0

Performance Statistics The test was done on a Single filer with a Dual Proc Scan Server. The tests were done by gradually increasing the number of users writing to filer simultaneously with default settings. In this test filer's (FAS2020), the CPU utilization reached 00% but the Scan Server CPU averaged to 50% for 300 users. Scan Server Performance Statistics Average CPU utilization: 50% Max scan threads: 53 Engine Server Throughput (KB/s): 28850 Average response Time (milliseconds): 3369 Filer Performance Statistics Peak CPU utilization: 00% Average CPU utilization: 90% CIFS Throughput: 64766 KB per second (network in+out) KB/user/s: 25 The following figure concludes that the average CPU and Memory (Working Set) utilization increases by increasing number of users accessing the filer: The following figure concludes that the average throughput increases, as the number of users writing to filers increase till the scanner/filer is able to handle. In this scenario, the throughput

Performance Statistics actually decreases beyond 200 users accessing the filer, as this filer is not able to scale beyond this. 2

Performance Improvement by adding additional Scan Servers By adding an additional server, there is a significant improvement in average scan response time and average data throughput. The scan requests will be sent to the scanners in a round-robin fashion, to distribute the load by NetApp filer. The following table shows the significant improvement in the average scan response time: Table 2: Average Response Time (in ms) # of Users One Scan Server Two Scan Servers 5 30 50 546 63 670 305 307 320 The following table shows the significant improvement in the average throughput: Table 3: Average Throughput (in KB/s) # of Users One Scan Server Two Scan Servers 5 30 320 3246 34346 34678 3

Performance Improvement by adding additional Scan Servers # of Users 50 One Scan Server 332 Two Scan Servers 34986 4

Performance Considerations Network connectivity Gigabit Ethernet (000MB) networking is the minimum recommendation between the NetApp storage device and the Scan Server. The NetApp filer and Scan Server can be connected directly or connected using a private network to achieve a clean network. If connecting through an Ethernet switch, use a dedicated switch or configure a virtual LAN (VLAN) to separate traffic traveling through the switch. Scan server hardware The limiting performance factors with AV scanners are the CPU frequency and memory bus performance. The amount of "vscan" requests the AV scanners will be able to process, will be greatly dependent on their CPU speed and the memory bus bandwidth. McAfee recommends the following system requirements for each AV server: Dual Processor 2.6GHz (or greater) Network Interface Card 000MB/s Ethernet Average File Size and Type of files AV Server performance will be affected by average size of the files and file types it scans ( such as.zip,.cab, etc). Deploying VSES on Virtual Environments The limiting performance factors with AV scanners are the CPU frequency and memory bus performance. The VMware/ESX infrastructure should be capable of handling the CPU and Memory requirements of AV scanner, as given below: Dual Processor 2.6GHz (or greater) Network Interface Card 000MB/s Ethernet Filer Storage Capacity The filer storage capacity does not affect the scanner's performance. The performance actually depends on the number of concurrent users accessing the filer and the average throughput of the filer. 5

Test Summary This section summarizes the performance characteristics of the scanner and the NetApp Filer on various configurations, which helps the end-user to decide the number of scanners required for a given user load. The following table summarizes the sizing tests for various configurations: # of CPU # of Scanners # of Users Avg CPU % Avg Engine Server Throughput (KB/s) Avg NetApp n/w In+Out (KB/s) KB/User/s Avg Working Set Engine Server(MB) Response Time (ms) Processor Queue Length # of files/s 22 8484 720 720 8.26 202 0.8 2.9 5 52 573 320 24 24.26 546 2.64 4 30 53 5946 3246 08 3.5 632 3.30 4 50 76 6874 332 662 36.69 692 3.98 4 2 5 26 738 34346 2290 9.9 307.07 5 2 30 27 8452 34678 56 22.2 32.09 0 2 30 20 7745 364 204 7.32 256 0.4 5.36 2 50 2 7797 3667 724 2.7 259 0.5 5.52 2 0 33 2786 53297 485 35.87 574 0.64 7.8 2 50 35 28962 64564 430 45.54 807 0.73 8.4 2 85 37 28979 6553 354 57.4 949 0.99 8.8 2 300 50 28850 64766 25 83.5 3369*.47 2 *The filer CPU Utilization reached 00% The Standard CIFS User Classification from NetApp is classified as: Heavy User A heavy user transfers around 20 KB/s of network data (in and out) from client to CIFS server. Medium User A medium user transfers around 7 to 3 KB/s of network data (in and out) from client to CIFS server. Low User A low user transfers around 3 to 6 KB/s of network data (in and out) from client to CIFS server. Light User A light user transfers around 0 to 2 KB/s of network data (in and out) from client to CIFS server. 6

Test Summary Based on the tests conducted on various scenarios, the following recommendations are suggested for the sample load as mentioned earlier. Table 4: Recommendations for the sample load Heavy users accessing the filer simultaneously Recommended # of Scan Server(s) Up to 30 Up to 75 Up to 300 One Single Proc Scan Server Two Single Proc Scan Servers One Dual Proc Scan Server NOTE: For a failover, it is highly recommended to add an additional scan server as secondary scan server. 7

Test Summary The following illustration shows the sample scanning pod: Figure : All the scanners as primary inside a data center Figure 2: AV scanning pod between two data centers 8