SECTION- F (Revised) BOM & TECHNICAL SPECIFICATIONS

Size: px
Start display at page:

Download "SECTION- F (Revised) BOM & TECHNICAL SPECIFICATIONS"

Transcription

1 SECTION- F (Revised) BOM & TECHNICAL SPECIFICATIONS ALL TECHNICAL PARAMETERS ARE MANDATORY NO DOWNWARD DEVIATION IS ALLOWED IN CASE OF ANY DEVIATIONS IN SPECIFICATIONS, THE BID WILL BE SUMMERILY REJECTED TECHNICAL SPECIFICATIONS FOR WEBSECURITY Sl No Specifications Functionality Required in the Appliance Solution The Appliance should support HTTP, HTTPS and FTP traffic 1 Appliance Requirement and Functionality The solution should be a hardened Web Proxy, Caching, Web based Reputation filtering, URL filtering, Antivirus and Anti-malware appliance All the functionalities should be in a single appliance only 2 The web proxy appliance should not allow end users connections directly to the internet The appliance should maintain user connections & initiate connections to the internet on behalf of end clients Appliance Hardware and Operating System Specifications for Internet & Non-Internet Gateway locations 3 Network Interface cards The appliances should have minimum 4 nos Gigabit Ethernet ports 4 Operating System The solution should support 2500 users from day one and should have the scalability to support users on the same appliance, without any change in the hardware 5 Operating System Performance The underlying operating system and hardware should be capable of supporting at least 10,000 users from day one 6 Operating System Security The operating system should be secure from vulnerabilities and hardened for web proxy and caching functionality 7 Hardware The appliance should have at least 1 TB of disk space with Raid support 8 Power Supplies /Hard Drives Appliance should support redundant power supplies & hot swappable hard drives from day one 9 Caching Web Proxy appliance should support at least 100 Gb of cache space & minimum object size in cache of 1Gb Proxy & Caching Deployment Options 10 Forward proxy mode The solution should support explicit forward proxy mode deployment in which client applications like browsers are pointed towards the proxy for web traffic 11 Forward proxy mode - The forward proxy mode deployment should support single IP proxy configuration and Single and Dual IP dual IP proxy configuration where one IP will be of local LAN and another IP will be of configuration DMZ 12 Transparent mode The solution should also support transparent mode deployment using WCCP v2 and L4 switches/pbr (Policy-based Routing) 13 Pac File support The appliance should support hosting proxy auto-config files that define how web browsers can automatically choose the appropriate web proxy for fetching a URL 14 Support multiple deployment options The solution should allow to deploy the appliance in explicit proxy as well as transparent mode together 15 Proxy Chaining The solution should support proxy configuration in a Chain The Lower end proxies at spoke locations should be able to forward the request to an Higher end proxies at Hub Location forming a Chain of Proxies 16 DNS Splitting The solution should support configuration to use Split DNS It should be able to refer to different DNS for Different Domains eg (root dns for all external domains and internal DNS for organization domain 17 IP Spoofing support in transparent mode deployments The solution should have facility to do IP spoofing When enabled, requests originating from a client should retain the client s source address and appear to originate from the client instead of the appliance This is useful in scenarios where policies are based on original IP and logging/reporting is required to track activity of individual IP basis WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 1 of 6

2 Web Proxy performance 18 Sustained RPS or TPS The appliance should support a sustained RPS/TPS of atleast 575 requests per second/transaction Per seconds with the below mentioned services without reporting data loss & in no loss in any applicable functionality of the web proxy appliance The overall solution should be able to support to scale upto atleast 1000 sustained requests per second 19 Web Security Services The web security services should include URL-Filtering, Web Proxy, Application visibility control for web traffic, Web based reputation filtering, should support industry known Anti-virus/Anti-Malware engines simultaneously, with access policies, NTLM authentication & adaptive scanning with atleast 10% of the https traffic being decrypted Proxy Requirements 20 Proxy support The proposed solution should be a Fast Web Proxy and should support HTTP, FTP and HTTPS proxy 21 HTTPS Decryption The solution should support HTTPS decryption 22 HTTPS decrypted traffic The solution should support scanning of the https decrypted traffic by the on-board scanning anti-malware and/or anti-virus engines 23 HTTPS decryption controls The solution should provide the flexibility of deciding whether to decrypt https traffic or not to the solution administrator The solution should offer three aspects to decide These are: 1) URL category based decryption 2) Web Reputation based decryption 3) Default action for the specific policy 24 HTTPS decryption policy HTTPS decryption should provide flexibility to have multiple decryption policies and should not be just a Global action 25 Protocol Tunneling Should support the functionality to block applications that attempts to tunnel non- HTTP traffic on ports typically used for HTTP traffic Should support the functionality for blocking non-ssl traffic on SSL ports & should also support the functionality to tunnel the transaction 26 Native FTP protection The solution should act as an FTP proxy and enable organizations to exercise granular control, including: allow/block FTP connections, restrict users/groups, control downloads or uploads and downloads both, and restrict sent/received files to certain types or sizes 27 File download and size restrictions The solution should be capable of blocking specific files downloads and based on user or group basis 28 IP based Access Control The solution should allow administrator to define access to internet based on IP addresses, range of IP addresses, subnet and CIDR basis It should also support to be forced for Authentication from Specific IP addresses, Subnet or CIDR's 29 User based Access Control The solution should support integration with active directory and/or LDAP This should allow administrator to define user or group based access policies to Internet 30 Multiple Authentication Server Support 31 Application and Protocol Control The solution should support Multiple Auth Servers / Auth Failover using Multi Scheme Auth (NTLM and LDAP) It should also support authentication exemption The solution should support granular application control over web eg Facebook controls like block file upload, block posting text, enforcing bandwidth limits on application types 32 Layer 4 Traffic Monitoring Should detect Phone Home attempts occurring from the entire Network It should also detect the PC's that are already infected with Malware in the Network across all network ports that attempts to bypass port Layer 4 Traffic Monitoring Solution should support scanning of traffic on all ports to match against domain names & IP addresses against entries in it s own database table which should be continuously updated 34 Layer 4 Traffic Monitoring It should support through monitoring and blocking of malware address 35 Bandwidth restrictions The solution should support providing bandwidth limitation or optimization for streaming media application traffic This should be possible at the Global level as well as at a per policy level WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 2 of 6

3 Security 36 Anti Malware The appliance should have support for known Anti Malware/Anti Virus engine that can scan HTTP, HTTPS and FTP traffic for web based threats, that can range from adware, browser hijackers, phishing and pharming attacks to more malicious threats such as rootkits, Trojans, worms, system monitors and Keyloggers and as defined by the organizations policy 37 Anti-Malware With AV/Anti-Malware engine scanning when a URL causes different verdicts from the scanning engine the appliance should perform the most restrictive action 38 Malware Protection The AV/Malware engines should protect atleast against the follow types of malware/threats: Adware, Browser Helper Object, Commercial system monitor softwares, Dialer, Generic spyware, Hijacker, Phishing URL, potentially unwanted applications, Trojan downloader, virus, worm etc 39 Web Reputation The solution should provide Web Reputation engine in built within the solution 40 Web Reputation parameters 41 Incoming/Outgoing Traffic scanning 42 Outbound connection control on all ports and protocols The Web Reputation Filters should have capability to analyze more than 100 different web traffic and network-related parameters to accurately evaluate the trustworthiness of a URL or IP address Solution should also support in participating by providing information to the cloud based servers to increase the efficacy & reputation based scoring The solution should scan for Incoming and outgoing traffic The solution shall provide option to scan all ports at wire speed, detecting and blocking spyware activity trying to connect to the outside Internet By tracking all network ports and all protocols, the solution shall effectively mitigate malware that attempts to bypass Port URL filtering The solution should have an inbuilt URL filtering functionality with multiple pre-defined categories 44 Custom URL filtering The solution should support creation of custom URL categories for allowing/blocking specific destinations as required by the Organization 45 URL Filtering Options The web Proxy should support following actions like allow, monitor, block, time-based access Should also support displaying a warning page but allows the user to continue clicking a hypertext link in the warning page 46 Dynamic Categorization Provision should be available to enable Real Time Dynamic categorization that shall classify in real time in case the URL the user is visiting is not already under the predefined or custom categories database 47 Reporting Miscategorization The solution should have facility for End User to report Mis-categorisation in URL Category through the administrator 48 URL check & submission Support portal should give facility to end user to check URL category and submit new URL for categorization 49 Filtering Content Solution should support filtering adult content from web searches & websites on search engines like google 50 Application control The solution should support signature / application based control For instance, it should allow Facebook but should support blocking of only chat or file transfer or playing games within Facebook This blocking should be based on signature / application and not only on URL The application signature database should be updated periodically by the vendor Mention the number of signatures available in the current release or mention the number of web based applications that can be blocked by the current signature set WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 3 of 6

4 51 End User Notification Solution should support following end user notification functionalities The proxy should support the functionality to display a custom message to the end user to specify the reason the web request is blocked When the website is blocked due to suspected malware or URL-Filters it should allow the end user or administrator to report that the webpage has been wrongly misclassified The solution should support the functionality of redirecting all notification pages to a custom URL to display a different block page for different reasons Should support the functionality to force users to explicitly agree to the terms and conditions for browsing the World Wide Web from the organization s network to let the user know that the Organization is monitoring their web activity Fine tuning performance parameters Caching Technical Support Connection parameters Appliance should support the functionality to remove a Url from the cache & also support specifying a Url or domain to never cache Should support the functionality to apply per user bandwidth controls to content served from the web cache in addition to the content served from web servers Appliance should support the functionality to specify how long the Web Proxy keeps open a connection to a client or server after a transaction has been completed Appliance should support the functionality for how long the Web Proxy waits for more data from an idle client or server when the current transaction has not been completed Appliance should support the functionality to specify the maximum number of connections (sockets) the Web Proxy keeps open with servers Appliance should support forwarding HTTP X-Forwarded-For headers 56 Remote support The remote support from principal company should be available via India Toll Free and The Support Portal access should be provided for Case management, knowledgebase, new version information, tools etc 57 Secure Remote Access The Support Engineers should be able to login to appliance using secure tunneling methods such as SSH for troubleshooting purposes 58 Diagnostic Tools The appliance should have diagnostic network utilities like telnet, traceroute, nslookup and tcpdump/packet capture 59 Updates and Upgrades The appliance should provide seamless version upgrades and updates Appliance Administration and Management Secure Web Based management CLI based management Serial Console access Ethernet Management Appliance should support a web interface that includes a tool that traces & can simulate client requests as if they were made by the end users and describes Web Proxy processes the request for troubleshooting purpose It should support simulating HTTP GET & POST requests The appliance should be manageable via HTTP or HTTPS The appliance should be manageable via command line using SSH For emergency, the appliance should have serial console access Should have provision for Ethernet for managing the appliance WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 4 of 6

5 Logging and Reporting Web Logs Log retention & rollover Log transfer Retention Period User Reports The Proxy Log should be scalable The log formats shall include Apache, Squid or W3C or Xml Solution should support automatic rollover & archive the log file when it reaches admin defined maximum file-size or time interval like daily/weekly rollover of logs Should support compressing rolled over log files before storing them on disk to reduce disk space consumption The appliance should support following mechanism to transfer log files: Should support remote FTP client to access the appliance to retrieve log files using an admin or operator user s username and password Periodically pushing log files to an FTP server Periodically pushes log files using the secure copy protocol to an SCP server on a remote computer Sending logs to a remote syslog server confirming to RFC 3164 The retention period should be customizable Options should be provided to transfer the logs to an FTP server using FTP or SCP Informative and exhaustive set of reports on User Activity and URL filtering activities (GUI to report past activity, top usage users and top malware threat) 67 Bandwidth Reports Reports on Bandwidth Consumed / Bandwidth Saved 68 Detailed logging Product to maintain detailed proxy access logs that can be searched via filters, for easy location of any desired access of the user and to see how the product dealt with it 69 Off Box Reporting Solution should also support centralized reporting 70 L4 traffic reports 71 Blocked by reputation & malware reports Detailed report on an IP basis should be provided on the L4 traffic monitoring / Network Layer Malware Detection It should support reporting web requests blocked due to web reputation & blocked by malware Warranty 72 Optional Points Report Formats Scheduling of Reports System Reports Updates and Upgrades Customizable Web Reputation Solution Solution should support generating a printer-friendly formatted pdf version of any of the report pages Should also support exporting reports as CSV files Solution should support to schedule reports to run on a daily, weekly, or monthly basis Should support system reports to show CPU usage, RAM usage, percentage of disk space used for reporting & logging Support should cover all upgrades for the time period the licenses and support purchased from principal vendor The Appliance should have customizable setting in the Web Based Reputation Services, like Allow, Scan and Block based on the scoring settings by the Administrator Solution should provide deployment flexibility as a appliance based, software based, SAAS based and Hybrid deployment then management should be from single management console in case of any deployment mode Solution should provide in-built gateway level AV and SSL decryption within same appliance Web category bypass from decryption WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 5 of 6

6 MANAGEMENT SERVER: Sl Component Detailed Specification No 1 Processor type Intel xeon E5-2609, 240 GHz / E5, 15M Cache, 72GT/s QPI, Turbo, 6C, 95W 2 No of Cores 4 core per processor 3 Chassis 25-inch Chassis, risers with up to 4, x8pcie slots + 2, x16 PCIe Slot 4 Cache per processor 10 MB (Min) 5 No of processor 2 processor 6 RAM DDR III - 16 GB RDIMM, 1333 MHz, Low Volt, Dual Rank, x4 Bandwidth 7 HDD 2 x 600 GB HDD or higher with SAS interface with RAID 15 configuration 8 Networking Integrated 2 nos 10/100/1000 Base TX ethernet Interface 9 Optical Drive DVD/R/W Drive 10 Power Supply Dual, Hot-plug, Redundant Power Supply (1+1), 750W 11 USB port Minimum 5 nos USB Display 17" LCD Monitor (4:3 or 16:9 aspect ratio) 13 KeyBoard 104 Keyboard 14 Mouse Optical Scroll Mouse 15 Operating System Vendor to provide as per the requirement of solution 16 Database Vendor to provide as per the requirement of solution 17 Form factor 2U Rack mounted with accessories 18 Certification The offered servers are certified for EMC, FCC, UL 19 PC Table PC Table to house the monitor 20 Warranty 03 (Three) Years comprehensive onsite with NBD resolution NB 1 All the Hardware should be with 3 years onsite comprehensive warranty from the date of commissioning 2 Bidders must provide the MAFs (Manufacturer s Authorization Form) for all the equipments quoted in the proposal 3 All the OEMs of the offered product/solution of the bidders must have their owned or authorized service/support centre operational for at least last 3 years in Kolkata Bidders are required to submit their undertaking supported with confirmation of OEM with details of such service centers in Kolkata with contact person, mobile no, address, years of operation of the service centre, supported credentials/orders/customers satisfactory certificate Any non-compliance of the above service/support centre of the OEMs or its authorized partner shall make the proposal as being unresponsive and may lead to disqualification of the proposal The Nodal Agency reserves the right to take appropriate action in this regard WEB GATEWAY SOLUTION AND MANAGEMENT SERVER Page 6 of 6

How To Protect Your Network From A Web Based Attack

How To Protect Your Network From A Web Based Attack I r o n P o r t A p p l i a n c e s P O W E R F U L M A LWA R E P R O T E C T I O N E N A B L E S T H E I N D U S T RY S M O S T C O M P R E H E N S I V E P E R I M E T E R D E F E N S E IronPort S-Series

More information

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 Objetivo Securing Web with Cisco Web Security Appliance (SWSA) é um curso com carga horário de dois dias, que proporciona aos alunos os conhecimentos

More information

Cisco S380 and Cisco S680 Web Security Appliance

Cisco S380 and Cisco S680 Web Security Appliance QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance

More information

Barracuda Web Filter Administrator s Guide

Barracuda Web Filter Administrator s Guide Barracuda Web Filter Administrator s Guide Version 3.3 Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2008, Barracuda Networks

More information

Barracuda Web Filter Administrator s Guide

Barracuda Web Filter Administrator s Guide Barracuda Web Filter Administrator s Guide Version 4.x Barracuda Networks Inc. 3175 S. WInchester Blvd Campbell, CA 95008 http://www.barracuda.com 1 Copyright Notice Copyright 2004-2010, Barracuda Networks

More information

Direct or Transparent Proxy?

Direct or Transparent Proxy? Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL

More information

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance 1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Web. Anti- Spam. Disk. Mail DNS. Server. Backup

Web. Anti- Spam. Disk. Mail DNS. Server. Backup Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves

More information

Part-1: SERVER AND PC

Part-1: SERVER AND PC Part-1: SERVER AND PC Item Item Details Manufacturer Quantity Unit Price Total Dell server or equivalent Intel Xeon E5-2420 1.90GHz, 15M Cache, 7.2GT/s QPI, Turbo, 6C, 95W or equivalent PCIE Riser for

More information

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security

More information

Websense Web Security Gateway: What to do when a Web site does not load as expected

Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.

More information

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide

GFI Product Manual. Web security, monitoring and Internet access control. Administrator Guide GFI Product Manual Web security, monitoring and Internet access control Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Cyan Networks Secure Web vs. Websense Security Gateway Battle card

Cyan Networks Secure Web vs. Websense Security Gateway Battle card URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

IronPort S-Series Web Security Appliances

IronPort S-Series Web Security Appliances IronPort Appliances THE INDUSTRY S BEST W E B S E C U R I T Y G AT E WAY, PROVIDING MALWARE PROTECTION AND HIGH PERFORMANCE IronPort S-Series Web Security Appliances Overview SECURE AND CONTROL WEB TRAFFIC

More information

Secure Web Gateway 11.5 Release Notes

Secure Web Gateway 11.5 Release Notes Trustwave is pleased to announce the release of Secure Web Gateway version 11.5. Review the Release Notes below for further information. Contents New Features... 1 General Enhancements and Bug Fixes...

More information

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,

More information

McAfee Web Gateway 7.4.1

McAfee Web Gateway 7.4.1 Release Notes Revision B McAfee Web Gateway 7.4.1 Contents About this release New features and enhancements Resolved issues Installation instructions Known issues Find product documentation About this

More information

GFI Product Manual. Administrator Guide for ISA/TMG

GFI Product Manual. Administrator Guide for ISA/TMG GFI Product Manual Administrator Guide for ISA/TMG The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

Centralized Cloud Firewall. Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013.

Centralized Cloud Firewall. Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013. Centralized Cloud Firewall Ivan Ivanovic BUCC/AMRES Tbilisi, December 2013. AMRES NREN 172 institutions ~2200 km dark fiber links 22 cities 3 cross border optical links Redundant Geant internet links 1

More information

Superior protection from Internet threats and control over unsafe web usage

Superior protection from Internet threats and control over unsafe web usage datasheet Trend Micro interscan web security Superior protection from Internet threats and control over unsafe web usage Traditional secure web gateway solutions that rely on periodic updates to cyber

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses 1. Why do I need a Web security or gateway anti-spyware solution? Malware attack vector is rapidly shifting from

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Dell KACE K1000 Management Appliance. Administrator Guide. Release 5.3. Revision Date: May 16, 2011

Dell KACE K1000 Management Appliance. Administrator Guide. Release 5.3. Revision Date: May 16, 2011 Dell KACE K1000 Management Appliance Administrator Guide Release 5.3 Revision Date: May 16, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and agreements,

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway TESTING & INTEGRATION GROUP SOLUTION GUIDE Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway INTRODUCTION...2 RADWARE SECUREFLOW... 3

More information

Move over, TMG! Replacing TMG with Sophos UTM

Move over, TMG! Replacing TMG with Sophos UTM Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Cisco M-Series Content Security Management Appliance for Email and Web Security Appliances

Cisco M-Series Content Security Management Appliance for Email and Web Security Appliances Data Sheet Cisco M-Series Content Security Management Appliance for Email and Web Security Appliances Product Overview Cisco M-Series Content Security Management Appliances centralize and consolidate policy

More information

Deployment Guide Microsoft IIS 7.0

Deployment Guide Microsoft IIS 7.0 Deployment Guide Microsoft IIS 7.0 DG_IIS_022012.1 TABLE OF CONTENTS 1 Introduction... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites... 4 4 Accessing the AX Series Load Balancer...

More information

F-Secure Client Security. Administrator's Guide

F-Secure Client Security. Administrator's Guide F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main

More information

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor

Servers, Clients. Displaying max. 60 cameras at the same time Recording max. 80 cameras Server-side VCA Desktop or rackmount form factor Servers, Clients Displaying max. 60 cameras at the same time Recording max. 80 cameras Desktop or rackmount form factor IVR-40/40-DSKT Intellio standard server PC 60 60 Recording 60 cameras Video gateway

More information

INDIAN INSTITUTE OF TECHNOLOGY KANPUR Department of Mechanical Engineering

INDIAN INSTITUTE OF TECHNOLOGY KANPUR Department of Mechanical Engineering INDIAN INSTITUTE OF TECHNOLOGY KANPUR Department of Mechanical Engineering Enquiry No: Enq/IITK/ME/JB/02 Enquiry Date: 14/12/15 Last Date of Submission: 21/12/15 Formal quotations are invited for HPC cluster.

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

F-Secure Internet Gatekeeper

F-Secure Internet Gatekeeper F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security

IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Cisco Web Security Appliance

Cisco Web Security Appliance Data Sheet Cisco Web Security Appliance In our highly connected and increasingly mobile world, more complex and sophisticated threats require the right mix of security solutions. Cisco delivers security

More information

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239 Check Point Firewall Software and Management Software I. Description of the Item Up gradation, installation and commissioning of Checkpoint security gateway

More information

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0

eprism Email Security Appliance 6.0 Release Notes What's New in 6.0 eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

User Manual. ALLO STM Appliance (astm) Version 2.0

User Manual. ALLO STM Appliance (astm) Version 2.0 User Manual ALLO STM Appliance (astm) Version 2.0 Table of Contents 1. Introduction... 1 1.1. Overview:... 1 1.2. STM Deployment Considerations... 3 2. Initial Setup & Configuration... 4 2.2. Default Configuration...

More information

AVG AntiVirus. How does this benefit you?

AVG AntiVirus. How does this benefit you? AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

PFSENSE Load Balance with Fail Over From Version Beta3

PFSENSE Load Balance with Fail Over From Version Beta3 PFSENSE Load Balance with Fail Over From Version Beta3 Following are the Installation instructions of PFSense beginning at first Login to setup Load Balance and Fail over procedures for outbound Internet

More information

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware

More information

Spyware Doctor Enterprise Technical Data Sheet

Spyware Doctor Enterprise Technical Data Sheet Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

SuperLumin Nemesis. Administration Guide. February 2011

SuperLumin Nemesis. Administration Guide. February 2011 SuperLumin Nemesis Administration Guide February 2011 SuperLumin Nemesis Legal Notices Information contained in this document is believed to be accurate and reliable. However, SuperLumin assumes no responsibility

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Deploying with Websense Content Gateway

Deploying with Websense Content Gateway Deploying with Websense Content Gateway Websense Content Gateway is a high-performance Web proxy that provides realtime content scanning and Web site classification to protect network computers from malicious

More information

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365

Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365 Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365 DG_ADFS20_120907.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites...

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Deployment Guide AX Series with Citrix XenApp 6.5

Deployment Guide AX Series with Citrix XenApp 6.5 Deployment Guide AX Series with Citrix XenApp 6.5 DG_XenApp_052012.1 TABLE OF CONTENTS 1 Introduction... 4 1 Deployment Guide Overview... 4 2 Deployment Guide Prerequisites... 4 3 Accessing the AX Series

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

WebMarshal User Guide

WebMarshal User Guide WebMarshal User Guide Legal Notice Copyright 2014 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Zscaler Internet Security Frequently Asked Questions

Zscaler Internet Security Frequently Asked Questions Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices

More information

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Aerohive Networks Inc. Free Bonjour Gateway FAQ Aerohive Networks Inc. Free Bonjour Gateway FAQ 1. About the Product... 1 2. Installation... 2 3. Management... 3 4. Troubleshooting... 4 1. About the Product What is the Aerohive s Free Bonjour Gateway?

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

IronPort X1000 Email Security System

IronPort X1000 Email Security System I r o n P o r t A p p l i a n c e s T H E U LT I M AT E E M A I L S E C U R I T Y S Y S T E M F O R T H E W O R L D S M O S T D E M A N D I N G N E T W O R K S. IronPort X1000 Email Security System O v

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Unified Threat Management

Unified Threat Management Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Third Party Integration

Third Party Integration APPENDIXG This appendix contains the following sections: Overview, page G-1 BlackBerry Enterprise Server, page G-1 Blue Coat, page G-2 Check Point, page G-3 Firebox, page G-4 ISA Server/Forefront TMG,

More information

CORRIGENDUM TO TENDER FOR HIGH PERFORMANCE SERVER

CORRIGENDUM TO TENDER FOR HIGH PERFORMANCE SERVER CORRIGENDUM TO TENDER FOR HIGH PERFORMANCE SERVER Tender Notice No. 3/2014-15 dated 29.12.2014 (IIT/CE/ENQ/COM/HPC/2014-15/569) Tender Submission Deadline Last date for submission of sealed bids is extended

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Cisco Secure Control Access System 5.8

Cisco Secure Control Access System 5.8 Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based

More information

Threat Containment for Facebook

Threat Containment for Facebook Threat Containment for Facebook Based on statistics for more than 62M users in 2009, the Blue Coat WebPulse cloud service ranked social networking as the number one most requested web category, surpassing

More information

Web Appliance Configuration Guide

Web Appliance Configuration Guide Web Appliance Configuration Guide Sophos TOC 3 Contents Copyrights and Trademarks...4 Introduction...4 Features...5 Network Deployment...6 Explicit Deployment...7 Transparent Deployment...9 Bridged Deployment...10

More information

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3 WAN Optimization, Web Cache, Explicit Proxy, and WCCP FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP v3 13 January 2012 01-433-96996-20120113

More information

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s Server Internet Veiligheidspakket Administrator s guide Administrator s Guide Internet Veiligheidspakket voor Server s Server IVP Administrator s Guide Versie 1.0, d.d. 01-08-2011 Inhoudsopgave 1 Introduction...

More information

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2

Firewall Server 7.2. Release Notes. What's New in Firewall Server 7.2 Firewall Server 7.2 Release Notes BorderWare Technologies is pleased to announce the release of version 7.2 of the Firewall Server. This release includes the following new features and improvements. What's

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

Common Services Platform Collector 2.5 Quick Start Guide

Common Services Platform Collector 2.5 Quick Start Guide Common Services Platform Collector 2.5 Quick Start Guide September 18, 2015 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com CSP-C Quick

More information

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B

Acano solution. Virtualized Deployment R1.1 Installation Guide. Acano. February 2014 76-1025-03-B Acano solution Virtualized Deployment R1.1 Installation Guide Acano February 2014 76-1025-03-B Contents Contents 1 Introduction... 3 1.1 Before You Start... 3 1.1.1 About the Acano virtualized solution...

More information

Masters Project Proxy SG

Masters Project Proxy SG Masters Project Proxy SG Group Members Chris Candilora Cortland Clater Eric Garner Justin Jones Blue Coat Products Proxy SG Series Blue Coat Proxy SG appliances offer a comprehensive foundation for the

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

v7.8.2 Release Notes for Websense Content Gateway

v7.8.2 Release Notes for Websense Content Gateway v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised

More information

Symantec Messaging Gateway 10.6

Symantec Messaging Gateway 10.6 Powerful email gateway protection Data Sheet: Messaging Security Overview Symantec Messaging Gateway enables organizations to secure their email and productivity infrastructure with effective and accurate

More information

GFI Product Manual. Administrator Guide

GFI Product Manual. Administrator Guide GFI Product Manual Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,

More information

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.

Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and

More information