Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017

Size: px
Start display at page:

Download "Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017"

Transcription

1 Addendum to RFP SSL/IT/RFP-00/0- dated -March-0 Revised RFP Submission date: th April 0, 00 Hours RFP is now open for all SBI empanelled and non-empanelled bidders. Additional Requirement: Bidders are also required to quote for a mid-range NG firewall hardware (in high availability) Technical Specifications for above will be as per Annexure B- ANNEXURE B- A NG Firewall requirements Complied (Yes/No) Remarks Deviations if any The proposed solution must be a Next Generation Firewall with Layer / Application Layer security solution. The solution must be deployed in HA mode. It should embed application visibility/intelligence for commonly used TCP/IP protocols like telnet, ftp etc. Appliance should support for Active connections in case of HA. Device based licensing and not user/ip based licensing Support for dynamic routing protocols, OSPF, & BGP. Support the multicast protocols as a multicast host, by participating in IGMP and PIMDM / PIM-SM and Sparse mode. Firewall should offer Bandwidth Management for every TCP, IPSEC, & VoIP protocols with attributes of Minimum Committed Bandwidth per protocol; Proposed firewall OEM should be in the Leaders & Challengers Quadrant of Gartner Magic Quadrant for the last consecutive years for NG Firewall. The firewall should have an Ethernet interface for outof-band device Management Firewall should support VOIP traffic filtering. 0 Should support IPv and IPv

2 B NGFW - Hardware and Interface requirements Firewall appliance should have at least x 0/00/000 GE RJ Ports interfaces and scalability up to x 0/00/000 GE additional RJ interfaces. Should behave dedicated HA interfaces The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection +URL filtering along with all signatures turned on performance must based on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents Firewall should not introduce more than microsecond latency, same should be available publicly The Firewall solution should support NAT, DNS & DHCPv The NGFW appliance should have console port and USB Ports Appliance should be rack mountable and support side rails if required Platform should support VLAN tagging C Should support Internet Service Provider link load balancing. Support for health LEDs, LCD etc. to indicate operational status of the NGFW module NGFW - Performance requirements The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection+URL filtering along with all signatures turned on performance must base on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents The proposed solution must be able to handle minimum 0000 concurrent sessions per second with all the layer/ application layer/security features turned ON.

3 The proposed solution must be able to handle minimum 000 new sessions per second with all the layer/ application layer/security features turned ON Should have capability to support for more than 0 VLAN. Inbuilt support for IPSEC VPNs with DES/DES and AES support The NGFW should support Active/Active High Availability feature. Proposed NGFW solution must be capable to detect device failure, link and path failure NGFW appliance failover should be complete stateful in nature without any manual intervention. Proposed NGFW shall synchronize the following for HA: 0 a) All sessions b) Decryption Certificates c) All threat and application signatures d) All configuration changes e) Forwarding Information Base (FIB) tables The proposed solution must be able to handle minimum -0K SSL decrypted Sessions. Should support Advanced Persistent threat Prevention capabilities in a single appliance from day one. SBICap Sec can add a license later in the lifecycle of the solution to enable the capabilities D Firewall - Network Protocols/Standards Support Requirements Should support at least 00 protocols Firewall Modules should support the deployment in Routed as well as Transparent Mode. Firewall must provide state engine support for all common protocols of the TCP/IP stack. Firewall must provide NAT functionality, including dynamic and static NAT translations. All internet based applications should be supported for filtering like Telnet, FTP, SMTP, http, DNS, ICMP, DHCP, ARP, RPC, SNMP, Lotus Notes, Exchange etc.

4 Local access to the firewall modules should support authentication protocols RADIUS & TACACS+. Firewall should support authentication proxy for Remote VPN, HTTP/HTTPS Applications access and various other applications. Firewall should support the authentication protocols RADIUS, LDAP, TACACS, PKI methods & single sign on for Windows AD, Novell edirectory, Citrix and Terminal Server Agent Firewall should support PKI Authentication with PCKS# & PCKS#0 standards. 0 Should support BGP, OSPF, RIPv &, Multicast Tunnels. Dynamic policy enforcement on VPN clients. Should support telnet client and server functionality E Firewall filtering requirements Should support the filtering of TCP/IP based applications with standard TCP/UDP ports. Should provide state engine support for all common protocols of TCP/IP stack. Filtering capability that includes parameters like source & destination addresses, source & destination port numbers, protocol type. Firewall should be able to filter traffic even if the packets are fragmented. Should support the VOIP Applications Security by supporting to filter SIP, H., MGCP and Skinny flows. Firewall should support authentication protocols like LDAP, RADIUS and have support for firewall passwords, smart cards, & token-based products like SecurID, LDAP-stored passwords, RADIUS or TACACS+ authentication servers and X.0 digital certificates. Firewall should support database related filtering and should have support for Oracle, MS-SQL, and Oracle SQL-Net. Firewall should provide advanced NAT capabilities, supporting all applications and services-including H. and SIP based applications.

5 0 F Should support CLI & GUI based access to the firewall modules. Local access to firewall modules should support role based access. QoS Support [Guaranteed bandwidth, Maximum bandwidth, Priority bandwidth utilization, QOS weighted priorities, QOS guarantee, QOS limits and QOS VPN]. Should be able to block Instant Messaging like Yahoo, MSN, Skype. Should enable blocking of Peer-Peer applications, like Kazaa, Gnutella, Bit Torrent, IRC (over HTTP) Should support IPv and IPv Rate based DOS protection In-built token server that manages both physical and mobile tokens for use with IPsec (Client to site) & SSL VPN users. Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers. Intrusion prevention system requirements IPS device should perform stateful pattern recognition to identify vulnerability-based attacks through the use of multi-packet inspection across all protocols. The proposed IPS must perform protocol decoding and validation for network traffic including: IP, TCP, UDP, and ICMP. IPS should provide anomaly identification for attacks that may cover multiple sessions and connections, using techniques based on identifying changes in normal network traffic patterns. Should support creation of baseline of normal network traffic and then uses baseline to detect worm-infected hosts Proposed IPS should identify attacks based on observed deviations in the normal RFC behaviour of a protocol or service.

6 0 Must be able to identify Layer Address Resolution Protocol (ARP) attacks and man-in-the-middle attacks. The sensors should be able to detect attacks running inside of these tunnelling protocols such as GRE, IP-in- IP, MPLS, and IPv/IPv. Should be resistant to IPS evasion and protection from anti-nips (Network Intrusion Prevention System) techniques. Should support Vulnerability and Exploit signatures, Protocol validation, Anomaly detection, Behaviourbased detection, Multi-element global correlation and reputation based filtering IPS profile should have an option to select or re-select specific signatures that can be deactivated Intrusion Prevention should have the option to add exceptions for network and services. IPS should provide rate shaping to prioritize known, normal traffic flows and unknown traffic flows and proposed system should have integrated Traffic Shaping functionality. IPS policy to block the traffic by country should have an option to configure in incoming direction, outgoing direction or both. IPS events/protection exclusion rules should be created and the packet data should be viewed directly from log entries. Application Intelligence should have controls for Instant Messenger, Peer-to-Peer, Malware Traffic etc,regardless of Port / Protocol Instant Messenger should have options to Block File Transfer, Block Audio, Block Video, Application Sharing and Remote Assistance IPS should have an option to create your own signatures

7 G 0 H IPS should provide detailed information on each protection, including: Vulnerability and threat descriptions, Threat severity, Release date, Industry Reference, Confidence level etc Signatures should have severity level defined to it so that the administrator can understand and decide which signatures to enable for what traffic (e.g. for severity level: high medium low) Administration, Management and Logging NGFW Real-Time Monitoring, Management & Log Collection (with storage) should not be distributed to more than ONE server/appliance Any changes or commands issued by an authenticated user should be logged to a database. NGFW administration station must provide a means for exporting the firewall and IPS rules set and configuration. Support for role based administration of firewall and IPS NGFW administration software must provide a means of viewing, filtering and managing the log data. Firewall logs must contain information about the firewall policy rule that triggered the log. NGFW must provide a minimum basic statistics about the health of the device and the amount of traffic traversing the NGFW device. NGFW should have the functionality of auditing administrator configuration changes. Should provide real time health status of all the firewall modules on the dashboard for CPU & memory utilization, state table, total number of concurrent connections and the connections/second counter. NGFW must send mail or SNMP traps to Network Management Servers (NMS) in response to system failures or threshold violations of the health attributes. IPSec / SSL VPN Requirements

8 The VPN should be integrated with firewall and should be ICSA Labs certified for both IPSec and SSL-TLS. Should support the following protocols: DES & DES MD, SHA- & the more secure SHA- authentication Diffie-Hellman Group, Group, Group & the more secure Group Internet Key Exchange (IKE) v as well as IKE v algorithm The new encryption standard AES, & (Advanced Encryption Standard) IPSec VPN should support XAuth over RADIUS and RSA SecurID or similar product. The system should support forms of site-to-site VPN configurations: a) Route based IPsec tunnel b) Policy based IPsec tunnel The product must deliver integrated SSL VPN. At least 00 concurrent users must be supported by the product. Minimum 00 SSL VPN licenses must be enabled from day one. Should support one time login per user options: prevents concurrent logins using same username Should support SSL-VPN Two-factor Authentication Should support single sign-on for FTP and SMB Should support Windows, and MAC OS for SSL-VPN (Should have always-on clients for these OS apart from browser based access) 0 Should support Host integrity checking and OS check (for windows terminals only) prior to SSL tunnel mode connections Should able to view and manage current IPSEC and SSL VPN connections in details Device should support client for both IPSec and SSL-VPN Should support NAT within IPSec/SSL VPN tunnels

9 I Should also support PPTP and LTP over IPSec VPN protocols. Web Content Filtering The appliance should facilitate embedded web content filtering feature Web content filtering solution should work independently without the need to integrate with proxy server. Should have facility to block URL' based on categories. 0 URL Database should be cloud based, with filtering for categories like Adult, PP, Non-Business, Social Networking, Unknown, Malware and Phishing websites Should be able to block different categories/sites based on users. Should have configurable parameters to block/allow unrated sites Should have configurable options to allow/deny access to web sites in case if the URL rating service is unavailable Should have options to customize the block message information send to end users Should have facility to schedule the configurations so that non work related sites are blocked during office hrs and allow access to all sites except non harmful sites during non-office hrs. The solution should have options to block java applets, ActiveX as well as cookies The solution should be able to block URLs hosting spywares / adware s etc. Should have configurable policy options to define the URL exempt list The proposed solution should be able to enable or disable Web Filtering per policy or based on authenticated user groups for both HTTP and HTTPS traffic. The URL Filtering solution must support blocking of Phishing websites.

10 J The solution must prevent users from Credential Theft by not allowing users to submit corporate credentials to unauthorized websites/categories as defined by policy. Anti-virus & Anti-bot Should be able to block, allow or monitor only using AV signatures and file blocking based on per firewall policy based or based on firewall authenticated user groups with configurable selection of the following services: a) HTTP, HTTPS b) SMTP, SMTPS c) POP, POPS d) IMAP, IMAPS e) FTP, FTPS Solution should be able to inspect traffic on the fly for infected file using its own Anti-virus (AV) engine. It should be able to notify users if the traffic is blocked due to upload /download of infected file. Solution should have no file size restrictions on file scanning Firewall must include Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers also. Vendor needs to add additional license if it is required. Firewall should have dedicated botnet and command control definitions in its database inbuilt and should be updated on regular basis to protect from new definitions Antivirus module should be ICSA certified K Data Leakage Prevention Firewall should have in-built DLP functionality without requiring any additional hardware or software license System should allow administrator to prevent sensitive data

11 from leaving the network. Administrator should be able to define sensitive data patterns, and data matching these patterns that should be blocked and/or logged when passing through the L M unit. Solution must detect, protect and log sensitive data travelling through HTTP and HTTPS channels DLP actions should be : Log only, block, quarantine user/ip/interface Other Requirements Provision to create secure zones / DMZ (ie Multi-Zone support) Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP, IMAP, SMTP, POPS, IMAPS, SMTPS The DLP feature should support popular file types like MS-Word, PDF etc Should Support Packet Capture/sniffer to capture and examine the contents of individual data packets that traverse the firewall appliance for troubleshooting, diagnostics and general network activity Should able to support Geo-IP block. It should able to block country wise traffic. Warranty years x comprehensive support from OEM with maximum hour response time / hour Call-to- Resolution N Services & Support ever be a hardware failure replacement Training Technical Training for two persons All other terms and conditions of above referred tender shall remain unaltered.

Surat Smart City Development Ltd. Surat Municipal Corporation 1

Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Ltd. Surat Municipal Corporation 1 Surat Smart City Development Limited (SSCDL) ADDENDUM AND CORRIGENDUM-1 Name of the work: - [SSCDL-Network-01-2018] The Bidders are requested

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

Systrome Next Gen Firewalls

Systrome Next Gen Firewalls N E T K S Systrome Next Gen Firewalls Systrome s Next Generation Firewalls provides comprehensive security protection from layer 2 to layer 7 for the mobile Internet era. The new next generation security

More information

Secure and Always Online Networking for Small- to Medium-sized Businesses

Secure and Always Online Networking for Small- to Medium-sized Businesses Secure and Always Online Networking for Small- to Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for small and medium-sized businesses Anti-malware protection with

More information

Hillstone E-Series Next-Generation Firewall

Hillstone E-Series Next-Generation Firewall TM Hillstone Next-Generation Firewall Hillstone next generation firewalls provide visibility and control of web applications regardless of port, protocol, or evasive action. It can identify and prevent

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Medium / Large Enterprises Next-Generation UTM NU-850C

Medium / Large Enterprises Next-Generation UTM NU-850C Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive Protection UR-980 Overall Integration Cloud-based Management ShareTech NU-850C is the next phase of technology change which will help

More information

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume DrayTek Vigor 3900 Technical Specifications WAN Protocol Ethernet PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6 Multi WAN Outbound policy based load balance Allow your local network to access Internet

More information

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities Product Highlights Comprehensive Management Solution Advanced features such as WAN failover, load balancing, and integrated firewall help make this a reliable, secure, and flexible way to manage your network.

More information

NSG100 Nebula Cloud Managed Security Gateway

NSG100 Nebula Cloud Managed Security Gateway Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive

More information

Medium / Large Enterprises Next-Generation UTM NU-850C

Medium / Large Enterprises Next-Generation UTM NU-850C Medium / Large Enterprises Next-Generation UTM NU-850C Comprehensive ShareTech NU-850C is the next phase of technology change which will help service provider Protection to launch the services in single

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

High Availability Synchronization PAN-OS 5.0.3

High Availability Synchronization PAN-OS 5.0.3 High Availability Synchronization PAN-OS 5.0.3 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Device Configuration... 4 Network Configuration... 9 Objects Configuration...

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 642-504 Title : Securing Networks with Cisco Routers and Switches Vendors

More information

QUOTATION CALL NOTICE

QUOTATION CALL NOTICE THE ODISHA STATE POLICE HOUSING & WELFARE CORPORATION LTD. (A Government of Odisha Undertaking) Letter No. 5764/OPHWC Date : 06 / 05 /2013 QUOTATION CALL NOTICE Quotations are invited from OEM for supply

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

ZyWALL VPN2S VPN Firewall

ZyWALL VPN2S VPN Firewall ZyWALL 2S Firewall The ZyWALL 2S is designed for small businesses, branch offices and home/remote workers. it provides you Internet connections with high reliability, high performance and high security

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-500 PA-220 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,

More information

Next-Generation Firewall Series Datasheet

Next-Generation Firewall Series Datasheet RUIJIE NETWORKS COMPANY LIMITED www.ruijienetworks.com Ruijie 1600 Next-Generation Firewall Series Datasheet Ruijie 1600 Firewall Series is a collection of nextgeneration firewall offering security, routing

More information

Palo Alto Networks PCNSE7 Exam

Palo Alto Networks PCNSE7 Exam Volume: 96 Questions Question: 1 Which three function are found on the dataplane of a PA-5050? (Choose three) A. Protocol Decoder B. Dynamic routing C. Management D. Network Processing E. Signature Match

More information

Minutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida.

Minutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida. SOFTWARE TECHNOLOGY PARKS OF INDIA NOIDA 29 th Sept 2015 Minutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida. File Ref No:

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version ACE Exam Question 1 of 50. Which of the following statements is NOT True regarding a Decryption Mirror interface? Supports SSL outbound

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 The Zyxel is built with remote management and ironclad security for organizations with multiple distributed sites. With an extensive suite of security features including ICSAcertified firewall,

More information

Legal and notice information

Legal and notice information Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro

More information

Cisco - ASA Lab Camp v9.0

Cisco - ASA Lab Camp v9.0 Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

ISG-600 Cloud Gateway

ISG-600 Cloud Gateway ISG-600 Cloud Gateway Cumilon ISG Integrated Security Gateway Integrated Security Gateway Cumilon ISG-600C cloud gateway is the security product developed by Systrome for the distributed access network

More information

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing Data Sheet Spirent Avalanche Spirent s Avalanche Layer 4-7 testing solution provides capacity, security and performance testing for network infrastructures, cloud and virtual environments, Web application

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-850 PA-820 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS,

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-5050 PA-5020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-220 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID,

More information

Security Assessment Checklist

Security Assessment Checklist Security Assessment Checklist Westcon Security Checklist - Instructions The first step to protecting your business includes a careful and complete assessment of your security posture. Our Security Assessment

More information

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3060 PA-3050 PA-3020 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network

More information

Tender No. 61/20(83)/506/STPI-BH/2015, Dt: 06/04/2015. RFP for Supply, Installation and Commissioning of firewall at STPI- Bhubaneswar ISSUED BY

Tender No. 61/20(83)/506/STPI-BH/2015, Dt: 06/04/2015. RFP for Supply, Installation and Commissioning of firewall at STPI- Bhubaneswar ISSUED BY SOFTWARE TECHNOLOGY PARKS OF INDIA (An Autonomous Body under Department of Electronics & IT, Ministry of Communications & Information Technology, Govt. of India) C-Ground Zero, Fortune Towers, C.S.Pur,

More information

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1 WatchGuard System Manager Fireware Configuration Guide WatchGuard Fireware Pro v8.1 Notice to Users Information in this guide is subject to change without notice. Companies, names, and data used in examples

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

Evaluation criteria for Next-Generation Firewalls

Evaluation criteria for Next-Generation Firewalls Evaluation criteria for Next-Generation Firewalls This document outlines many of the important features and capabilities to look for when evaluating a Next-Generation Firewall (NGFW), in order to help

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Feature PA-7000-20G-NPC PA-5060 Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision C McAfee Network Security Platform 8.1 (8.1.7.91-8.1.3.124 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE OFFICE OF THE MISSION DIRECTOR, NATIONAL RURAL HEALTH MISSION, ASSAM Saikia Commercial Complex, G. S. Road, Christianbasti, Guwahati - 781005 Ph. 0361 2340236:: Fax 0361 2340238 Website : www.nrhmassam.in

More information

Draytek Vigor 2925 Dual-WAN Router Firewall

Draytek Vigor 2925 Dual-WAN Router Firewall Product Name: Manufacturer: - Model Number: V2925-K Please Note: The Vigor 2925 has been discontinued. For an alternative, we recommend the Vigor 2926. The is a dual-ethernet WAN firewall for load-balancing

More information

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training Instructor-led Training Comprehensive Services from Your Trusted Security Partner Additional Information Recommended prerequisite for the Certified SonicWALL Security Administrator (CSSA) exam Course Description:

More information

Unified Services Routers

Unified Services Routers Product Highlights Comprehensive Management Solution Active-Active WAN port features such as auto WAN failover and load balancing, ICSA-certified firewall, and D-Link Green Technology make this a reliable,

More information

Powerful, Robust Anti-malware Protection for Medium-sized Businesses

Powerful, Robust Anti-malware Protection for Medium-sized Businesses Powerful, Robust Anti-malware Protection for Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for medium-sized businesses and campuses Anti-malware protection with firewall,

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-618 EXAM QUESTIONS & ANSWERS Number: 642-618 Passing Score: 800 Time Limit: 120 min File Version: 39.6 http://www.gratisexam.com/ CISCO 642-618 EXAM QUESTIONS & ANSWERS Exam Name: Deploying Cisco

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. PA-3020 PA-500 PA-200 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ Q-Balancer Range FAQ The Q-Balance LB Series The Q-Balance Balance Series is designed for Small and medium enterprises (SMEs) to provide cost-effective solutions for link resilience and load balancing

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Feature PA-7080 PA-7050 PA-7000-20GQXM-NPC Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Venusense UTM Introduction

Venusense UTM Introduction Venusense UTM Introduction Featuring comprehensive security capabilities, Venusense Unified Threat Management (UTM) products adopt the industry's most advanced multi-core, multi-thread computing architecture,

More information

Security with Passion. Endian UTM Virtual Appliance

Security with Passion.  Endian UTM Virtual Appliance Security with Passion Endian UTM Virtual Appliance Endian UTM Virtual Appliance Endian UTM Virtual Appliance: Secure and Protect your Virtual Infrastructure Whether you are securing your internal virtual

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Palo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010

Palo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010 Palo Alto Networks Stallion Spring Seminar -Tech Track Peter Gustafsson, June 2010 About Palo Alto Networks Palo Alto Networks is the Network Security Company World-class team with strong security and

More information

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all Addendum / Corrigendum Dated 29/09/2017 Tender Ref No. - 236/387/DCCS/2010/IREDA/1 Dated: 22/09/2017 Name of Project - Supply Installation and Support Services of Data centers S. No. Document Reference

More information

NetDefend UTM Firewall Series

NetDefend UTM Firewall Series NetDefend UTM Firewall Series Integrated Firewall/VPN Powerful Firewall Engine Virtual Private Network (VPN) Security Granular Bandwidth Management 802.1Q VLAN Tagging and Port-Based VLAN D-Link End-to-End

More information

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

Seqrite TERMINATOR (UTM) Unified Threat Management Solution. Unified Threat Management Solution TERMINATOR Introduction Seqrite TERMINATOR is a high-performance, easy-to-use Unified Threat Management solution for small and mid-size enterprises. It is a robust solution

More information

Cisco RV180 VPN Router

Cisco RV180 VPN Router Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet ports allow

More information

Feature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

Feature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Performance Feature *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID, User-ID, IPS, antivirus

More information

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS) Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized

More information

Secure and Always Online Networking for Small- to Medium-sized Businesses

Secure and Always Online Networking for Small- to Medium-sized Businesses Secure and Always Online Networking for Small- to Medium-sized Businesses High-performance, high-value Next Generation Firewall (NGFW) for small and medium-sized businesses Anti-malware protection with

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision A McAfee Next Generation Firewall 5.7.6 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. VM-300 VM-200 VM-100 Feature Performance *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2. Threat prevention throughput measured with App-ID,

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2 Tuncay Seyran Security in a virtualized environment: same security risks + more TRADITIONAL SECURITY RISKS IMPACTING VIRTUAL ENVIRONMENTS

More information

NIP6000 Next-Generation Intrusion Prevention System

NIP6000 Next-Generation Intrusion Prevention System NIP6000 Next-Generation Intrusion Prevention System Thanks to the development of the cloud and mobile computing technologies, many enterprises currently allow their employees to use smart devices, such

More information

The Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi.

The Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi. The Institute of Cost Accountants of India Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi Tender Document Table of Contents Chapter Description Page No. 1 Notice

More information

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM PA-820 PA-500 Feature Performance *Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM models please refer to hypervisor, cloud specific data sheet

More information

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering

More information

Technical Specification of the proposed components :

Technical Specification of the proposed components : Technical Specification of the proposed components : Hardware Features L3 Managed Switch Description 1 Fixed configuration stackable managed switch 2 Stackable up to 4 units 3 24 x 10/100/1000 Base-T from

More information

Cradlepoint COR IBR350 Specifications

Cradlepoint COR IBR350 Specifications Cradlepoint COR IBR350 Specifications Figure 1: COR IBR350 Compact, M2M Gateway for Kiosks, ATMs and Digital Signage The Cradlepoint COR IBR350 Series is an affordable, compact, high performance 4G LTE

More information

Overview 1. Service Features 1

Overview 1. Service Features 1 Table of Contents Overview 1 Service Features 1 Introduction 1 Feature List 1 Feature Introduction 3 Firewall Web Manual 3 Security Volume 12 Access Volume 14 IP Services Volume 15 IP Routing Volume 16

More information

Paloalto Networks PCNSA EXAM

Paloalto Networks PCNSA EXAM Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:

More information

Configuring Access Rules

Configuring Access Rules Configuring Access Rules Rules > Access Rules About Access Rules Displaying Access Rules Specifying Maximum Zone-to-Zone Access Rules Changing Priority of a Rule Adding Access Rules Editing an Access Rule

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Seceon s Open Threat Management software

Seceon s Open Threat Management software Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real

More information

AC3000 Tri-Band Wireless Gigabit Dual-WAN VPN SMB Router TEW-829DRU (v1.0r)

AC3000 Tri-Band Wireless Gigabit Dual-WAN VPN SMB Router TEW-829DRU (v1.0r) AC3000 Tri-Band Wireless Gigabit Dual-WAN SMB Router (v1.0r) Dual-WAN ports support load-balancing and fail-over modes 8 x Gigabit LAN ports, 1 x Console port SSL, IPsec, PPTP, and L2TP w/ipsec support

More information

EN6200 Series Feature Sheet

EN6200 Series Feature Sheet + 7500 Successful Installation EN6200 Series Feature Sheet Security Solutions Antivirus UTM AAA User Management VPN Connectivity www.tacitine.com EN 6200 Series Unified Threat Management with AAA Hotspot

More information

UTM Content Security Gateway

UTM Content Security Gateway UTM Content Security Gateway Physical Port 4 x 10/100/1000BASE-T RJ45 2 undefined Ethernet ports (WAN/LAN/DMZ) Multi-WAN function Outbound load balancing (Supported algorithms: Auto, Source IP, Destination

More information

Table of Contents 1 IKE 1-1

Table of Contents 1 IKE 1-1 Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration

More information

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CompTIA E2C Security+ (2008 Edition) Exam Exam. CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 300-206 EXAM QUESTIONS & ANSWERS Number: 300-206 Passing Score: 800 Time Limit: 120 min File Version: 35.2 http://www.gratisexam.com/ Exam Code: 300-206 Exam Name: Implementing Cisco Edge Network

More information

Draytek Vigor 2925n Dual-WAN Router Firewall

Draytek Vigor 2925n Dual-WAN Router Firewall Product Name: Manufacturer: - Model Number: V2925N-K Please Note: The Vigor 2925n has been discontinued. For an alternative, we recommend the Vigor 2926. The is a dual-ethernet WAN firewall for load-balancing

More information

Implementing Cisco Edge Network Security Solutions ( )

Implementing Cisco Edge Network Security Solutions ( ) Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to

More information

New Features for ASA Version 9.0(2)

New Features for ASA Version 9.0(2) FIREWALL Features New Features for ASA Version 9.0(2) Cisco Adaptive Security Appliance (ASA) Software Release 9.0 is the latest release of the software that powers the Cisco ASA family. The same core

More information

Platform Settings for Firepower Threat Defense

Platform Settings for Firepower Threat Defense Platform settings for devices configure a range of unrelated features whose values you might want to share among several devices. Even if you want different settings per device, you must create a shared

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

ASACAMP - ASA Lab Camp (5316)

ASACAMP - ASA Lab Camp (5316) ASACAMP - ASA Lab Camp (5316) Price: $4,595 Cisco Course v1.0 Cisco Security Appliance Software v8.0 Based on our enhanced FIREWALL and VPN courses, this exclusive, lab-based course is designed to provide

More information

A Comprehensive CyberSecurity Policy

A Comprehensive CyberSecurity Policy A Comprehensive CyberSecurity Policy Review of ALL NGFW Capabilities Attack Surface Reduction From Complex to Comprehensive Before and After of a PANW customer 1 2 1 Enhanced Policy on the L7 layer Leverage

More information

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID is a patent-pending traffic classification technology that identifies more than

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide V 3. 8 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeBPR XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS

More information