Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017
|
|
- Moris Chandler
- 6 years ago
- Views:
Transcription
1 Addendum to RFP SSL/IT/RFP-00/0- dated -March-0 Revised RFP Submission date: th April 0, 00 Hours RFP is now open for all SBI empanelled and non-empanelled bidders. Additional Requirement: Bidders are also required to quote for a mid-range NG firewall hardware (in high availability) Technical Specifications for above will be as per Annexure B- ANNEXURE B- A NG Firewall requirements Complied (Yes/No) Remarks Deviations if any The proposed solution must be a Next Generation Firewall with Layer / Application Layer security solution. The solution must be deployed in HA mode. It should embed application visibility/intelligence for commonly used TCP/IP protocols like telnet, ftp etc. Appliance should support for Active connections in case of HA. Device based licensing and not user/ip based licensing Support for dynamic routing protocols, OSPF, & BGP. Support the multicast protocols as a multicast host, by participating in IGMP and PIMDM / PIM-SM and Sparse mode. Firewall should offer Bandwidth Management for every TCP, IPSEC, & VoIP protocols with attributes of Minimum Committed Bandwidth per protocol; Proposed firewall OEM should be in the Leaders & Challengers Quadrant of Gartner Magic Quadrant for the last consecutive years for NG Firewall. The firewall should have an Ethernet interface for outof-band device Management Firewall should support VOIP traffic filtering. 0 Should support IPv and IPv
2 B NGFW - Hardware and Interface requirements Firewall appliance should have at least x 0/00/000 GE RJ Ports interfaces and scalability up to x 0/00/000 GE additional RJ interfaces. Should behave dedicated HA interfaces The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection +URL filtering along with all signatures turned on performance must based on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents Firewall should not introduce more than microsecond latency, same should be available publicly The Firewall solution should support NAT, DNS & DHCPv The NGFW appliance should have console port and USB Ports Appliance should be rack mountable and support side rails if required Platform should support VLAN tagging C Should support Internet Service Provider link load balancing. Support for health LEDs, LCD etc. to indicate operational status of the NGFW module NGFW - Performance requirements The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection+URL filtering along with all signatures turned on performance must base on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents The proposed solution must be able to handle minimum 0000 concurrent sessions per second with all the layer/ application layer/security features turned ON.
3 The proposed solution must be able to handle minimum 000 new sessions per second with all the layer/ application layer/security features turned ON Should have capability to support for more than 0 VLAN. Inbuilt support for IPSEC VPNs with DES/DES and AES support The NGFW should support Active/Active High Availability feature. Proposed NGFW solution must be capable to detect device failure, link and path failure NGFW appliance failover should be complete stateful in nature without any manual intervention. Proposed NGFW shall synchronize the following for HA: 0 a) All sessions b) Decryption Certificates c) All threat and application signatures d) All configuration changes e) Forwarding Information Base (FIB) tables The proposed solution must be able to handle minimum -0K SSL decrypted Sessions. Should support Advanced Persistent threat Prevention capabilities in a single appliance from day one. SBICap Sec can add a license later in the lifecycle of the solution to enable the capabilities D Firewall - Network Protocols/Standards Support Requirements Should support at least 00 protocols Firewall Modules should support the deployment in Routed as well as Transparent Mode. Firewall must provide state engine support for all common protocols of the TCP/IP stack. Firewall must provide NAT functionality, including dynamic and static NAT translations. All internet based applications should be supported for filtering like Telnet, FTP, SMTP, http, DNS, ICMP, DHCP, ARP, RPC, SNMP, Lotus Notes, Exchange etc.
4 Local access to the firewall modules should support authentication protocols RADIUS & TACACS+. Firewall should support authentication proxy for Remote VPN, HTTP/HTTPS Applications access and various other applications. Firewall should support the authentication protocols RADIUS, LDAP, TACACS, PKI methods & single sign on for Windows AD, Novell edirectory, Citrix and Terminal Server Agent Firewall should support PKI Authentication with PCKS# & PCKS#0 standards. 0 Should support BGP, OSPF, RIPv &, Multicast Tunnels. Dynamic policy enforcement on VPN clients. Should support telnet client and server functionality E Firewall filtering requirements Should support the filtering of TCP/IP based applications with standard TCP/UDP ports. Should provide state engine support for all common protocols of TCP/IP stack. Filtering capability that includes parameters like source & destination addresses, source & destination port numbers, protocol type. Firewall should be able to filter traffic even if the packets are fragmented. Should support the VOIP Applications Security by supporting to filter SIP, H., MGCP and Skinny flows. Firewall should support authentication protocols like LDAP, RADIUS and have support for firewall passwords, smart cards, & token-based products like SecurID, LDAP-stored passwords, RADIUS or TACACS+ authentication servers and X.0 digital certificates. Firewall should support database related filtering and should have support for Oracle, MS-SQL, and Oracle SQL-Net. Firewall should provide advanced NAT capabilities, supporting all applications and services-including H. and SIP based applications.
5 0 F Should support CLI & GUI based access to the firewall modules. Local access to firewall modules should support role based access. QoS Support [Guaranteed bandwidth, Maximum bandwidth, Priority bandwidth utilization, QOS weighted priorities, QOS guarantee, QOS limits and QOS VPN]. Should be able to block Instant Messaging like Yahoo, MSN, Skype. Should enable blocking of Peer-Peer applications, like Kazaa, Gnutella, Bit Torrent, IRC (over HTTP) Should support IPv and IPv Rate based DOS protection In-built token server that manages both physical and mobile tokens for use with IPsec (Client to site) & SSL VPN users. Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers. Intrusion prevention system requirements IPS device should perform stateful pattern recognition to identify vulnerability-based attacks through the use of multi-packet inspection across all protocols. The proposed IPS must perform protocol decoding and validation for network traffic including: IP, TCP, UDP, and ICMP. IPS should provide anomaly identification for attacks that may cover multiple sessions and connections, using techniques based on identifying changes in normal network traffic patterns. Should support creation of baseline of normal network traffic and then uses baseline to detect worm-infected hosts Proposed IPS should identify attacks based on observed deviations in the normal RFC behaviour of a protocol or service.
6 0 Must be able to identify Layer Address Resolution Protocol (ARP) attacks and man-in-the-middle attacks. The sensors should be able to detect attacks running inside of these tunnelling protocols such as GRE, IP-in- IP, MPLS, and IPv/IPv. Should be resistant to IPS evasion and protection from anti-nips (Network Intrusion Prevention System) techniques. Should support Vulnerability and Exploit signatures, Protocol validation, Anomaly detection, Behaviourbased detection, Multi-element global correlation and reputation based filtering IPS profile should have an option to select or re-select specific signatures that can be deactivated Intrusion Prevention should have the option to add exceptions for network and services. IPS should provide rate shaping to prioritize known, normal traffic flows and unknown traffic flows and proposed system should have integrated Traffic Shaping functionality. IPS policy to block the traffic by country should have an option to configure in incoming direction, outgoing direction or both. IPS events/protection exclusion rules should be created and the packet data should be viewed directly from log entries. Application Intelligence should have controls for Instant Messenger, Peer-to-Peer, Malware Traffic etc,regardless of Port / Protocol Instant Messenger should have options to Block File Transfer, Block Audio, Block Video, Application Sharing and Remote Assistance IPS should have an option to create your own signatures
7 G 0 H IPS should provide detailed information on each protection, including: Vulnerability and threat descriptions, Threat severity, Release date, Industry Reference, Confidence level etc Signatures should have severity level defined to it so that the administrator can understand and decide which signatures to enable for what traffic (e.g. for severity level: high medium low) Administration, Management and Logging NGFW Real-Time Monitoring, Management & Log Collection (with storage) should not be distributed to more than ONE server/appliance Any changes or commands issued by an authenticated user should be logged to a database. NGFW administration station must provide a means for exporting the firewall and IPS rules set and configuration. Support for role based administration of firewall and IPS NGFW administration software must provide a means of viewing, filtering and managing the log data. Firewall logs must contain information about the firewall policy rule that triggered the log. NGFW must provide a minimum basic statistics about the health of the device and the amount of traffic traversing the NGFW device. NGFW should have the functionality of auditing administrator configuration changes. Should provide real time health status of all the firewall modules on the dashboard for CPU & memory utilization, state table, total number of concurrent connections and the connections/second counter. NGFW must send mail or SNMP traps to Network Management Servers (NMS) in response to system failures or threshold violations of the health attributes. IPSec / SSL VPN Requirements
8 The VPN should be integrated with firewall and should be ICSA Labs certified for both IPSec and SSL-TLS. Should support the following protocols: DES & DES MD, SHA- & the more secure SHA- authentication Diffie-Hellman Group, Group, Group & the more secure Group Internet Key Exchange (IKE) v as well as IKE v algorithm The new encryption standard AES, & (Advanced Encryption Standard) IPSec VPN should support XAuth over RADIUS and RSA SecurID or similar product. The system should support forms of site-to-site VPN configurations: a) Route based IPsec tunnel b) Policy based IPsec tunnel The product must deliver integrated SSL VPN. At least 00 concurrent users must be supported by the product. Minimum 00 SSL VPN licenses must be enabled from day one. Should support one time login per user options: prevents concurrent logins using same username Should support SSL-VPN Two-factor Authentication Should support single sign-on for FTP and SMB Should support Windows, and MAC OS for SSL-VPN (Should have always-on clients for these OS apart from browser based access) 0 Should support Host integrity checking and OS check (for windows terminals only) prior to SSL tunnel mode connections Should able to view and manage current IPSEC and SSL VPN connections in details Device should support client for both IPSec and SSL-VPN Should support NAT within IPSec/SSL VPN tunnels
9 I Should also support PPTP and LTP over IPSec VPN protocols. Web Content Filtering The appliance should facilitate embedded web content filtering feature Web content filtering solution should work independently without the need to integrate with proxy server. Should have facility to block URL' based on categories. 0 URL Database should be cloud based, with filtering for categories like Adult, PP, Non-Business, Social Networking, Unknown, Malware and Phishing websites Should be able to block different categories/sites based on users. Should have configurable parameters to block/allow unrated sites Should have configurable options to allow/deny access to web sites in case if the URL rating service is unavailable Should have options to customize the block message information send to end users Should have facility to schedule the configurations so that non work related sites are blocked during office hrs and allow access to all sites except non harmful sites during non-office hrs. The solution should have options to block java applets, ActiveX as well as cookies The solution should be able to block URLs hosting spywares / adware s etc. Should have configurable policy options to define the URL exempt list The proposed solution should be able to enable or disable Web Filtering per policy or based on authenticated user groups for both HTTP and HTTPS traffic. The URL Filtering solution must support blocking of Phishing websites.
10 J The solution must prevent users from Credential Theft by not allowing users to submit corporate credentials to unauthorized websites/categories as defined by policy. Anti-virus & Anti-bot Should be able to block, allow or monitor only using AV signatures and file blocking based on per firewall policy based or based on firewall authenticated user groups with configurable selection of the following services: a) HTTP, HTTPS b) SMTP, SMTPS c) POP, POPS d) IMAP, IMAPS e) FTP, FTPS Solution should be able to inspect traffic on the fly for infected file using its own Anti-virus (AV) engine. It should be able to notify users if the traffic is blocked due to upload /download of infected file. Solution should have no file size restrictions on file scanning Firewall must include Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers also. Vendor needs to add additional license if it is required. Firewall should have dedicated botnet and command control definitions in its database inbuilt and should be updated on regular basis to protect from new definitions Antivirus module should be ICSA certified K Data Leakage Prevention Firewall should have in-built DLP functionality without requiring any additional hardware or software license System should allow administrator to prevent sensitive data
11 from leaving the network. Administrator should be able to define sensitive data patterns, and data matching these patterns that should be blocked and/or logged when passing through the L M unit. Solution must detect, protect and log sensitive data travelling through HTTP and HTTPS channels DLP actions should be : Log only, block, quarantine user/ip/interface Other Requirements Provision to create secure zones / DMZ (ie Multi-Zone support) Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP, IMAP, SMTP, POPS, IMAPS, SMTPS The DLP feature should support popular file types like MS-Word, PDF etc Should Support Packet Capture/sniffer to capture and examine the contents of individual data packets that traverse the firewall appliance for troubleshooting, diagnostics and general network activity Should able to support Geo-IP block. It should able to block country wise traffic. Warranty years x comprehensive support from OEM with maximum hour response time / hour Call-to- Resolution N Services & Support ever be a hardware failure replacement Training Technical Training for two persons All other terms and conditions of above referred tender shall remain unaltered.
Surat Smart City Development Ltd. Surat Municipal Corporation 1
Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested
More informationRequest for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )
Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;
More informationCorrigendum 3. Tender Number: 10/ dated
(A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial
More informationSystrome Next Gen Firewalls
N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security
More informationSecure and Always Online Networking for Small- to Medium-sized Businesses
Secure and Always Online Networking for Small- to Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for small and medium-sized businesses Anti-malware protection with
More informationHillstone E-Series Next-Generation Firewall
TM Hillstone Next-Generation Firewall Hillstone next generation firewalls provide visibility and control of web applications regardless of port, protocol, or evasive action. It can identify and prevent
More informationAccessEnforcer Version 4.0 Features List
AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect
More informationMedium / Large Enterprises Next-Generation UTM NU-850C
Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive Protection UR-980 Overall Integration Cloud-based Management ShareTech NU-850C is the next phase of technology change which will help
More informationDrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume
DrayTek Vigor 3900 Technical Specifications WAN Protocol Ethernet PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6 Multi WAN Outbound policy based load balance Allow your local network to access Internet
More informationVPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities
Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.
More informationNSG100 Nebula Cloud Managed Security Gateway
Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive
More informationMedium / Large Enterprises Next-Generation UTM NU-850C
Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive ShareTech NU-850C is the next phase of technology change which will help service provider Protection to launch the services in single
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationHigh Availability Synchronization PAN-OS 5.0.3
High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-504 Title : Securing Networks with Cisco Routers and Switches Vendors
More informationQUOTATION CALL NOTICE
THE ODISHA STATE POLICE HOUSING & WELFARE CORPORATION LTD. (A Government of Odisha Undertaking) Letter No. 5764/OPHWC Date : 06 / 05 /2013 QUOTATION CALL NOTICE Quotations are invited from OEM for supply
More informationBarracuda Firewall Release Notes 6.6.X
Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationZyWALL VPN2S VPN Firewall
ZyWALL 2S Firewall The ZyWALL 2S is designed for small businesses, branch offices and home/remote workers. it provides you Internet connections with high reliability, high performance and high security
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationNSG50/100/200 Nebula Cloud Managed Security Gateway
NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-500 PA-220 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,
More informationNext-Generation Firewall Series Datasheet
RUIJIE NETWORKS COMPANY LIMITED www.ruijienetworks.com Ruijie 1600 Next-Generation Firewall Series Datasheet Ruijie 1600 Firewall Series is a collection of nextgeneration firewall offering security, routing
More informationPalo Alto Networks PCNSE7 Exam
Volume: 96 Questions Question: 1 Which three function are found on the dataplane of a PA-5050? (Choose three) A. Protocol Decoder B. Dynamic routing C. Management D. Network Processing E. Signature Match
More informationMinutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida.
SOFTWARE TECHNOLOGY PARKS OF INDIA NOIDA 29 th Sept 2015 Minutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida. File Ref No:
More informationFundamentals of Network Security v1.1 Scope and Sequence
Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document
More informationTest Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version
Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version ACE Exam Question 1 of 50. Which of the following statements is NOT True regarding a Decryption Mirror interface? Supports SSL outbound
More informationNSG50/100/200 Nebula Cloud Managed Security Gateway
NSG50/100/200 The Zyxel is built with remote management and ironclad security for organizations with multiple distributed sites. With an extensive suite of security features including ICSAcertified firewall,
More informationLegal and notice information
Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro
More informationCisco - ASA Lab Camp v9.0
Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationISG-600 Cloud Gateway
ISG-600 Cloud Gateway Cumilon ISG Integrated Security Gateway Integrated Security Gateway Cumilon ISG-600C cloud gateway is the security product developed by Systrome for the distributed access network
More informationSpirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing
Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-3020 PA-850 PA-820 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS,
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-5050 PA-5020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-220 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,
More informationSecurity Assessment Checklist
Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment
More informationPass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS
Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-3060 PA-3050 PA-3020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network
More informationTender No. 61/20(83)/506/STPI-BH/2015, Dt: 06/04/2015. RFP for Supply, Installation and Commissioning of firewall at STPI- Bhubaneswar ISSUED BY
SOFTWARE TECHNOLOGY PARKS OF INDIA (An Autonomous Body under Department of Electronics & IT, Ministry of Communications & Information Technology, Govt. of India) C-Ground Zero, Fortune Towers, C.S.Pur,
More informationWatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1
WatchGuard System Manager Fireware Configuration Guide WatchGuard Fireware Pro v8.1 Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationEvaluation criteria for Next-Generation Firewalls
Evaluation criteria for Next-Generation Firewalls This document outlines many of the important features and capabilities to look for when evaluating a Next-Generation Firewall (NGFW), in order to help
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
Feature PA-7000-20G-NPC PA-5060 Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More informationMcAfee Network Security Platform 8.1
Revision C McAfee Network Security Platform 8.1 (8.1.7.91-8.1.3.124 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationNo: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE
OFFICE OF THE MISSION DIRECTOR, NATIONAL RURAL HEALTH MISSION, ASSAM Saikia Commercial Complex, G. S. Road, Christianbasti, Guwahati - 781005 Ph. 0361 2340236:: Fax 0361 2340238 Website : www.nrhmassam.in
More informationDraytek Vigor 2925 Dual-WAN Router Firewall
Product Name: Manufacturer: - Model Number: V2925-K Please Note: The Vigor 2925 has been discontinued. For an alternative, we recommend the Vigor 2926. The is a dual-ethernet WAN firewall for load-balancing
More informationCertified SonicWALL Security Administrator (CSSA) Instructor-led Training
Instructor-led Training Comprehensive Services from Your Trusted Security Partner Additional Information Recommended prerequisite for the Certified SonicWALL Security Administrator (CSSA) exam Course Description:
More informationUnified Services Routers
Product Highlights Comprehensive Management Solution Active-Active WAN port features such as auto WAN failover and load balancing, ICSA-certified firewall, and D-Link Green Technology make this a reliable,
More informationPowerful, Robust Anti-malware Protection for Medium-sized Businesses
Powerful, Robust Anti-malware Protection for Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for medium-sized businesses and campuses Anti-malware protection with firewall,
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 642-618 EXAM QUESTIONS & ANSWERS Number: 642-618 Passing Score: 800 Time Limit: 120 min File Version: 39.6 http://www.gratisexam.com/ CISCO 642-618 EXAM QUESTIONS & ANSWERS Exam Name: Deploying Cisco
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More informationQ-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ
Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
Feature PA-7080 PA-7050 PA-7000-20GQXM-NPC Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured
More informationThis release of the product includes these new features that have been added since NGFW 5.5.
Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential
More informationVenusense UTM Introduction
Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,
More informationSecurity with Passion. Endian UTM Virtual Appliance
Security with Passion Endian UTM Virtual Appliance Endian UTM Virtual Appliance Endian UTM Virtual Appliance: Secure and Protect your Virtual Infrastructure Whether you are securing your internal virtual
More informationImplementing Cisco Network Security (IINS) 3.0
Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationPalo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010
Palo Alto Networks Stallion Spring Seminar -Tech Track Peter Gustafsson, June 2010 About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and
More information45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all
Addendum / Corrigendum Dated 29/09/2017 Tender Ref No. - 236/387/DCCS/2010/IREDA/1 Dated: 22/09/2017 Name of Project - Supply Installation and Support Services of Data centers S. No. Document Reference
More informationNetDefend UTM Firewall Series
NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging and Port-Based VLAN D-Link End-to-End
More informationSeqrite TERMINATOR (UTM) Unified Threat Management Solution.
Unified Threat Management Solution TERMINATOR Introduction Seqrite TERMINATOR is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution
More informationCisco RV180 VPN Router
Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow
More informationFeature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
Performance Feature *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS, antivirus
More informationSteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)
Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized
More informationSecure and Always Online Networking for Small- to Medium-sized Businesses
Secure and Always Online Networking for Small- to Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for small and medium-sized businesses Anti-malware protection with
More informationThis release of the product includes these new features that have been added since NGFW 5.5.
Release Notes Revision A McAfee Next Generation Firewall 5.7.6 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade
More information*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.
VM-300 VM-200 VM-100 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,
More informationHP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard
More informationFirefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran
Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS
More informationNIP6000 Next-Generation Intrusion Prevention System
NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such
More informationThe Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi.
The Institute of Cost Accountants of India Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi Tender Document Table of Contents Chapter Description Page No. 1 Notice
More information*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM
PA-820 PA-500 Feature Performance *Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM models please refer to hypervisor, cloud specific data sheet
More informationVigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive
Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering
More informationTechnical Specification of the proposed components :
Technical Specification of the proposed components : Hardware Features L3 Managed Switch Description 1 Fixed configuration stackable managed switch 2 Stackable up to 4 units 3 24 x 10/100/1000 Base-T from
More informationCradlepoint COR IBR350 Specifications
Cradlepoint COR IBR350 Specifications Figure 1: COR IBR350 Compact, M2M Gateway for Kiosks, ATMs and Digital Signage The Cradlepoint COR IBR350 Series is an affordable, compact, high performance 4G LTE
More informationOverview 1. Service Features 1
Table of Contents Overview 1 Service Features 1 Introduction 1 Feature List 1 Feature Introduction 3 Firewall Web Manual 3 Security Volume 12 Access Volume 14 IP Services Volume 15 IP Routing Volume 16
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationConfiguring Access Rules
Configuring Access Rules Rules > Access Rules About Access Rules Displaying Access Rules Specifying Maximum Zone-to-Zone Access Rules Changing Priority of a Rule Adding Access Rules Editing an Access Rule
More informationNetwork Security Platform 8.1
8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationSeceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationAC3000 Tri-Band Wireless Gigabit Dual-WAN VPN SMB Router TEW-829DRU (v1.0r)
AC3000 Tri-Band Wireless Gigabit Dual-WAN SMB Router (v1.0r) Dual-WAN ports support load-balancing and fail-over modes 8 x Gigabit LAN ports, 1 x Console port SSL, IPsec, PPTP, and L2TP w/ipsec support
More informationEN6200 Series Feature Sheet
+ 7500 Successful Installation EN6200 Series Feature Sheet Security Solutions Antivirus UTM AAA User Management VPN Connectivity www.tacitine.com EN 6200 Series Unified Threat Management with AAA Hotspot
More informationUTM Content Security Gateway
UTM Content Security Gateway Physical Port 4 x 10/100/1000BASE-T RJ45 2 undefined Ethernet ports (WAN/LAN/DMZ) Multi-WAN function Outbound load balancing (Supported algorithms: Auto, Source IP, Destination
More informationTable of Contents 1 IKE 1-1
Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration
More informationCompTIA E2C Security+ (2008 Edition) Exam Exam.
CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network
More informationDraytek Vigor 2925n Dual-WAN Router Firewall
Product Name: Manufacturer: - Model Number: V2925N-K Please Note: The Vigor 2925n has been discontinued. For an alternative, we recommend the Vigor 2926. The is a dual-ethernet WAN firewall for load-balancing
More informationImplementing Cisco Edge Network Security Solutions ( )
Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to
More informationNew Features for ASA Version 9.0(2)
FIREWALL Features New Features for ASA Version 9.0(2) Cisco Adaptive Security Appliance (ASA) Software Release 9.0 is the latest release of the software that powers the Cisco ASA family. The same core
More informationPlatform Settings for Firepower Threat Defense
Platform settings for devices configure a range of unrelated features whose values you might want to share among several devices. Even if you want different settings per device, you must create a shared
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationASACAMP - ASA Lab Camp (5316)
ASACAMP - ASA Lab Camp (5316) Price: $4,595 Cisco Course v1.0 Cisco Security Appliance Software v8.0 Based on our enhanced FIREWALL and VPN courses, this exclusive, lab-based course is designed to provide
More informationA Comprehensive CyberSecurity Policy
A Comprehensive CyberSecurity Policy Review of ALL NGFW Capabilities Attack Surface Reduction From Complex to Comprehensive Before and After of a PANW customer 1 2 1 Enhanced Policy on the L7 layer Leverage
More informationApp-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID is a patent-pending traffic classification technology that identifies more than
More informationHTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS
More information