Addendum to RFP SSL/IT/RFP-004/ dated 28-March-2017

Similar documents
Surat Smart City Development Ltd. Surat Municipal Corporation 1

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Corrigendum 3. Tender Number: 10/ dated

Systrome Next Gen Firewalls

Secure and Always Online Networking for Small- to Medium-sized Businesses

Hillstone E-Series Next-Generation Firewall

AccessEnforcer Version 4.0 Features List

Medium / Large Enterprises Next-Generation UTM NU-850C

DrayTek Vigor Technical Specifications. PPPoE, PPTP, DHCP client, static IP, L2TP*, Ipv6. Redundancy. By WAN interfaces traffic volume

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

NSG100 Nebula Cloud Managed Security Gateway

Medium / Large Enterprises Next-Generation UTM NU-850C

Training UNIFIED SECURITY. Signature based packet analysis

High Availability Synchronization PAN-OS 5.0.3

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

QUOTATION CALL NOTICE

Barracuda Firewall Release Notes 6.6.X

Future-ready security for small and mid-size enterprises

ZyWALL VPN2S VPN Firewall

Gigabit SSL VPN Security Router

NSG50/100/200 Nebula Cloud Managed Security Gateway

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

Next-Generation Firewall Series Datasheet

Palo Alto Networks PCNSE7 Exam

Minutes of Meeting of the Designated Technical Bid Evaluation Committee in regard to e-tender for Procurement of UTM at STPI Noida.

Fundamentals of Network Security v1.1 Scope and Sequence

Test Accredited Configuration Engineer (ACE) Exam PAN OS 6.0 Version

NSG50/100/200 Nebula Cloud Managed Security Gateway

Legal and notice information

Cisco - ASA Lab Camp v9.0

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

ISG-600 Cloud Gateway

Spirent Avalanche. Applications and Security Testing Solutions. Application. Features & Benefits. Data Sheet. Network Performance Testing

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

Security Assessment Checklist

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

CISCO EXAM QUESTIONS & ANSWERS

Tender No. 61/20(83)/506/STPI-BH/2015, Dt: 06/04/2015. RFP for Supply, Installation and Commissioning of firewall at STPI- Bhubaneswar ISSUED BY

WatchGuard System Manager Fireware Configuration Guide. WatchGuard Fireware Pro v8.1

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Evaluation criteria for Next-Generation Firewalls

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

McAfee Network Security Platform 8.1

No: NRHM/MIS/SERVER/1742/ /14972 Dated 1 st July 2013 CORRIGENDUM NO. 1 AND EXTENSION NOTICE

Draytek Vigor 2925 Dual-WAN Router Firewall

Certified SonicWALL Security Administrator (CSSA) Instructor-led Training

Unified Services Routers

Powerful, Robust Anti-malware Protection for Medium-sized Businesses

CISCO EXAM QUESTIONS & ANSWERS

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

This release of the product includes these new features that have been added since NGFW 5.5.

McAfee Network Security Platform Administration Course

Venusense UTM Introduction

Security with Passion. Endian UTM Virtual Appliance

Implementing Cisco Network Security (IINS) 3.0

Palo Alto Networks Stallion Spring Seminar -Tech Track. Peter Gustafsson, June 2010

45 10.C. 1 The switch should have The switch should have G SFP+ Ports from Day1, populated with all

NetDefend UTM Firewall Series

Seqrite TERMINATOR (UTM) Unified Threat Management Solution.

Cisco RV180 VPN Router

Feature. *1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

Secure and Always Online Networking for Small- to Medium-sized Businesses

This release of the product includes these new features that have been added since NGFW 5.5.

*1. Firewall throughput measured with App-ID and User-ID features enabled utilizing 64KB HTTP transactions. 2.

HP Load Balancing Module

Firefly Perimeter ( vsrx ) Technical information 12.1 X47 D10.2. Tuncay Seyran

NIP6000 Next-Generation Intrusion Prevention System

The Institute of Cost Accountants of India. Tender for supply and installation of 1 Nos 1U Rack Hardware mountable firewall at Delhi.

*Performance and capacities are measured under ideal testing conditions using PAN-OS.0. Additionally, for VM

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive

Technical Specification of the proposed components :

Cradlepoint COR IBR350 Specifications

Overview 1. Service Features 1

Paloalto Networks PCNSA EXAM

Configuring Access Rules

Network Security Platform 8.1

Seceon s Open Threat Management software

AC3000 Tri-Band Wireless Gigabit Dual-WAN VPN SMB Router TEW-829DRU (v1.0r)

EN6200 Series Feature Sheet

UTM Content Security Gateway

Table of Contents 1 IKE 1-1

CompTIA E2C Security+ (2008 Edition) Exam Exam.

CISCO EXAM QUESTIONS & ANSWERS

Draytek Vigor 2925n Dual-WAN Router Firewall

Implementing Cisco Edge Network Security Solutions ( )

New Features for ASA Version 9.0(2)

Platform Settings for Firepower Threat Defense

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

ASACAMP - ASA Lab Camp (5316)

A Comprehensive CyberSecurity Policy

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeBPR (Shaping) How To Guide

Transcription:

Addendum to RFP SSL/IT/RFP-00/0- dated -March-0 Revised RFP Submission date: th April 0, 00 Hours RFP is now open for all SBI empanelled and non-empanelled bidders. Additional Requirement: Bidders are also required to quote for a mid-range NG firewall hardware (in high availability) Technical Specifications for above will be as per Annexure B- ANNEXURE B- A NG Firewall requirements Complied (Yes/No) Remarks Deviations if any The proposed solution must be a Next Generation Firewall with Layer / Application Layer security solution. The solution must be deployed in HA mode. It should embed application visibility/intelligence for commonly used TCP/IP protocols like telnet, ftp etc. Appliance should support for Active connections in case of HA. Device based licensing and not user/ip based licensing Support for dynamic routing protocols, OSPF, & BGP. Support the multicast protocols as a multicast host, by participating in IGMP and PIMDM / PIM-SM and Sparse mode. Firewall should offer Bandwidth Management for every TCP, IPSEC, & VoIP protocols with attributes of Minimum Committed Bandwidth per protocol; Proposed firewall OEM should be in the Leaders & Challengers Quadrant of Gartner Magic Quadrant for the last consecutive years for NG Firewall. The firewall should have an Ethernet interface for outof-band device Management Firewall should support VOIP traffic filtering. 0 Should support IPv and IPv

B NGFW - Hardware and Interface requirements Firewall appliance should have at least x 0/00/000 GE RJ Ports interfaces and scalability up to x 0/00/000 GE additional RJ interfaces. Should behave dedicated HA interfaces The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection +URL filtering along with all signatures turned on performance must based on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents Firewall should not introduce more than microsecond latency, same should be available publicly The Firewall solution should support NAT, DNS & DHCPv The NGFW appliance should have console port and USB Ports Appliance should be rack mountable and support side rails if required Platform should support VLAN tagging C Should support Internet Service Provider link load balancing. Support for health LEDs, LCD etc. to indicate operational status of the NGFW module NGFW - Performance requirements The proposed solution must provide 00 Mbps of throughput with all security features enabled including application control + IPS +Anti Spyware + Anti Bot+ Antivirus +APT Protection+URL filtering along with all signatures turned on performance must base on HTTP traffic and not UDP traffic. The claim has to be supported by publicly available documents The proposed solution must be able to handle minimum 0000 concurrent sessions per second with all the layer/ application layer/security features turned ON.

The proposed solution must be able to handle minimum 000 new sessions per second with all the layer/ application layer/security features turned ON Should have capability to support for more than 0 VLAN. Inbuilt support for IPSEC VPNs with DES/DES and AES support The NGFW should support Active/Active High Availability feature. Proposed NGFW solution must be capable to detect device failure, link and path failure NGFW appliance failover should be complete stateful in nature without any manual intervention. Proposed NGFW shall synchronize the following for HA: 0 a) All sessions b) Decryption Certificates c) All threat and application signatures d) All configuration changes e) Forwarding Information Base (FIB) tables The proposed solution must be able to handle minimum -0K SSL decrypted Sessions. Should support Advanced Persistent threat Prevention capabilities in a single appliance from day one. SBICap Sec can add a license later in the lifecycle of the solution to enable the capabilities D Firewall - Network Protocols/Standards Support Requirements Should support at least 00 protocols Firewall Modules should support the deployment in Routed as well as Transparent Mode. Firewall must provide state engine support for all common protocols of the TCP/IP stack. Firewall must provide NAT functionality, including dynamic and static NAT translations. All internet based applications should be supported for filtering like Telnet, FTP, SMTP, http, DNS, ICMP, DHCP, ARP, RPC, SNMP, Lotus Notes, Exchange etc.

Local access to the firewall modules should support authentication protocols RADIUS & TACACS+. Firewall should support authentication proxy for Remote VPN, HTTP/HTTPS Applications access and various other applications. Firewall should support the authentication protocols RADIUS, LDAP, TACACS, PKI methods & single sign on for Windows AD, Novell edirectory, Citrix and Terminal Server Agent Firewall should support PKI Authentication with PCKS# & PCKS#0 standards. 0 Should support BGP, OSPF, RIPv &, Multicast Tunnels. Dynamic policy enforcement on VPN clients. Should support telnet client and server functionality E Firewall filtering requirements Should support the filtering of TCP/IP based applications with standard TCP/UDP ports. Should provide state engine support for all common protocols of TCP/IP stack. Filtering capability that includes parameters like source & destination addresses, source & destination port numbers, protocol type. Firewall should be able to filter traffic even if the packets are fragmented. Should support the VOIP Applications Security by supporting to filter SIP, H., MGCP and Skinny flows. Firewall should support authentication protocols like LDAP, RADIUS and have support for firewall passwords, smart cards, & token-based products like SecurID, LDAP-stored passwords, RADIUS or TACACS+ authentication servers and X.0 digital certificates. Firewall should support database related filtering and should have support for Oracle, MS-SQL, and Oracle SQL-Net. Firewall should provide advanced NAT capabilities, supporting all applications and services-including H. and SIP based applications.

0 F Should support CLI & GUI based access to the firewall modules. Local access to firewall modules should support role based access. QoS Support [Guaranteed bandwidth, Maximum bandwidth, Priority bandwidth utilization, QOS weighted priorities, QOS guarantee, QOS limits and QOS VPN]. Should be able to block Instant Messaging like Yahoo, MSN, Skype. Should enable blocking of Peer-Peer applications, like Kazaa, Gnutella, Bit Torrent, IRC (over HTTP) Should support IPv and IPv Rate based DOS protection In-built token server that manages both physical and mobile tokens for use with IPsec (Client to site) & SSL VPN users. Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers. Intrusion prevention system requirements IPS device should perform stateful pattern recognition to identify vulnerability-based attacks through the use of multi-packet inspection across all protocols. The proposed IPS must perform protocol decoding and validation for network traffic including: IP, TCP, UDP, and ICMP. IPS should provide anomaly identification for attacks that may cover multiple sessions and connections, using techniques based on identifying changes in normal network traffic patterns. Should support creation of baseline of normal network traffic and then uses baseline to detect worm-infected hosts Proposed IPS should identify attacks based on observed deviations in the normal RFC behaviour of a protocol or service.

0 Must be able to identify Layer Address Resolution Protocol (ARP) attacks and man-in-the-middle attacks. The sensors should be able to detect attacks running inside of these tunnelling protocols such as GRE, IP-in- IP, MPLS, and IPv/IPv. Should be resistant to IPS evasion and protection from anti-nips (Network Intrusion Prevention System) techniques. Should support Vulnerability and Exploit signatures, Protocol validation, Anomaly detection, Behaviourbased detection, Multi-element global correlation and reputation based filtering IPS profile should have an option to select or re-select specific signatures that can be deactivated Intrusion Prevention should have the option to add exceptions for network and services. IPS should provide rate shaping to prioritize known, normal traffic flows and unknown traffic flows and proposed system should have integrated Traffic Shaping functionality. IPS policy to block the traffic by country should have an option to configure in incoming direction, outgoing direction or both. IPS events/protection exclusion rules should be created and the packet data should be viewed directly from log entries. Application Intelligence should have controls for Instant Messenger, Peer-to-Peer, Malware Traffic etc,regardless of Port / Protocol Instant Messenger should have options to Block File Transfer, Block Audio, Block Video, Application Sharing and Remote Assistance IPS should have an option to create your own signatures

G 0 H IPS should provide detailed information on each protection, including: Vulnerability and threat descriptions, Threat severity, Release date, Industry Reference, Confidence level etc Signatures should have severity level defined to it so that the administrator can understand and decide which signatures to enable for what traffic (e.g. for severity level: high medium low) Administration, Management and Logging NGFW Real-Time Monitoring, Management & Log Collection (with storage) should not be distributed to more than ONE server/appliance Any changes or commands issued by an authenticated user should be logged to a database. NGFW administration station must provide a means for exporting the firewall and IPS rules set and configuration. Support for role based administration of firewall and IPS NGFW administration software must provide a means of viewing, filtering and managing the log data. Firewall logs must contain information about the firewall policy rule that triggered the log. NGFW must provide a minimum basic statistics about the health of the device and the amount of traffic traversing the NGFW device. NGFW should have the functionality of auditing administrator configuration changes. Should provide real time health status of all the firewall modules on the dashboard for CPU & memory utilization, state table, total number of concurrent connections and the connections/second counter. NGFW must send mail or SNMP traps to Network Management Servers (NMS) in response to system failures or threshold violations of the health attributes. IPSec / SSL VPN Requirements

The VPN should be integrated with firewall and should be ICSA Labs certified for both IPSec and SSL-TLS. Should support the following protocols: DES & DES MD, SHA- & the more secure SHA- authentication Diffie-Hellman Group, Group, Group & the more secure Group Internet Key Exchange (IKE) v as well as IKE v algorithm The new encryption standard AES, & (Advanced Encryption Standard) IPSec VPN should support XAuth over RADIUS and RSA SecurID or similar product. The system should support forms of site-to-site VPN configurations: a) Route based IPsec tunnel b) Policy based IPsec tunnel The product must deliver integrated SSL VPN. At least 00 concurrent users must be supported by the product. Minimum 00 SSL VPN licenses must be enabled from day one. Should support one time login per user options: prevents concurrent logins using same username Should support SSL-VPN Two-factor Authentication Should support single sign-on for FTP and SMB Should support Windows, and MAC OS for SSL-VPN (Should have always-on clients for these OS apart from browser based access) 0 Should support Host integrity checking and OS check (for windows terminals only) prior to SSL tunnel mode connections Should able to view and manage current IPSEC and SSL VPN connections in details Device should support client for both IPSec and SSL-VPN Should support NAT within IPSec/SSL VPN tunnels

I Should also support PPTP and LTP over IPSec VPN protocols. Web Content Filtering The appliance should facilitate embedded web content filtering feature Web content filtering solution should work independently without the need to integrate with proxy server. Should have facility to block URL' based on categories. 0 URL Database should be cloud based, with filtering for categories like Adult, PP, Non-Business, Social Networking, Unknown, Malware and Phishing websites Should be able to block different categories/sites based on users. Should have configurable parameters to block/allow unrated sites Should have configurable options to allow/deny access to web sites in case if the URL rating service is unavailable Should have options to customize the block message information send to end users Should have facility to schedule the configurations so that non work related sites are blocked during office hrs and allow access to all sites except non harmful sites during non-office hrs. The solution should have options to block java applets, ActiveX as well as cookies The solution should be able to block URLs hosting spywares / adware s etc. Should have configurable policy options to define the URL exempt list The proposed solution should be able to enable or disable Web Filtering per policy or based on authenticated user groups for both HTTP and HTTPS traffic. The URL Filtering solution must support blocking of Phishing websites.

J The solution must prevent users from Credential Theft by not allowing users to submit corporate credentials to unauthorized websites/categories as defined by policy. Anti-virus & Anti-bot Should be able to block, allow or monitor only using AV signatures and file blocking based on per firewall policy based or based on firewall authenticated user groups with configurable selection of the following services: a) HTTP, HTTPS b) SMTP, SMTPS c) POP, POPS d) IMAP, IMAPS e) FTP, FTPS Solution should be able to inspect traffic on the fly for infected file using its own Anti-virus (AV) engine. It should be able to notify users if the traffic is blocked due to upload /download of infected file. Solution should have no file size restrictions on file scanning Firewall must include Anti-bot capability using IP reputation DB, terminates botnet communication to C&C servers also. Vendor needs to add additional license if it is required. Firewall should have dedicated botnet and command control definitions in its database inbuilt and should be updated on regular basis to protect from new definitions Antivirus module should be ICSA certified K Data Leakage Prevention Firewall should have in-built DLP functionality without requiring any additional hardware or software license System should allow administrator to prevent sensitive data

from leaving the network. Administrator should be able to define sensitive data patterns, and data matching these patterns that should be blocked and/or logged when passing through the L M unit. Solution must detect, protect and log sensitive data travelling through HTTP and HTTPS channels DLP actions should be : Log only, block, quarantine user/ip/interface Other Requirements Provision to create secure zones / DMZ (ie Multi-Zone support) Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP, IMAP, SMTP, POPS, IMAPS, SMTPS The DLP feature should support popular file types like MS-Word, PDF etc Should Support Packet Capture/sniffer to capture and examine the contents of individual data packets that traverse the firewall appliance for troubleshooting, diagnostics and general network activity Should able to support Geo-IP block. It should able to block country wise traffic. Warranty years x comprehensive support from OEM with maximum hour response time / hour Call-to- Resolution N Services & Support ever be a hardware failure replacement Training Technical Training for two persons All other terms and conditions of above referred tender shall remain unaltered.