Software Secure Workload
Activity Configure

Configuration Limits in Secure Workload

Last updated: Jun 09, 2025

Configuration Limits in Secure Workload

This chapter outlines the configuration limits within Cisco Secure Workload, emphasizing the constraints on resource allocation, policy enforcement, and system performance to ensure optimal security management. Maximum limits for various resources, including the number of workloads, policies, and users that can be managed simultaneously. Understanding these limits is crucial for network engineers to design scalable architectures. It details the constraints on security policies, such as the maximum number of micro-segmentation policies and the implications of exceeding these limits on system performance.

The chapter provides guidelines on monitoring system performance indicators to prevent degradation when approaching configuration limits. It provides guidelines on monitoring system performance indicators to prevent degradation when approaching configuration limits.

Secure Workload has defined thresholds for effective operation. Exceeding these thresholds can lead to degraded performance or potential security vulnerabilities. Regular monitoring and adjustment of configurations are recommended to stay within optimal operational parameters.

The limits for various features in Secure Workload vary depending on the version and platform.


 

Due to recent GUI updates, some of the images or screenshots used in the user guide may not fully reflect the current design of the product. We recommend using this guide in conjunction with the latest version of the software for the most accurate visual reference.