INDIAN INSTITUTE OF MANAGEMENT AMRITSAR INDIAN INSTITUTE OF MANAGEMENT KOZHIKODE (Mentoring IIM of IIM Amritsar) Website: https://www.iimk.ac.in/iimamritsar/ TENDER FOR SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs Tender No. IT/ 01/IIMP/ 05/2015 Issued Cost of Tender : `500/- and is payable by way of DD in favour of IIM Kozhikode, payable at Kozhikode Date of issue of Tender Form : Last date for submission of Tender : Date of opening of Tender 04-07-2015 (till 5:30 PM) 20-07-2015 (till 3:00 PM) 20-07-2015 (at 4:00 PM)
NOTICE INVITING TENDER 1. Sealed tenders are invited by the Indian Institute of Management, Amritsar for supply, installation, testing and commissioning of following equipment: a. UTM (Type I) : 1 No. b. UTM (Type II) : 1 No. c. UTM (Type III) : 1 No. 2. Scope of Work: The scope of work includes development of a suitable architecture for the proposed networking system, supply, installation, configuring, testing and commissioning of the UTMs including but not limited to the following: Supply, installation and configuration of UTMs as per the specifications outlined in the tender document. Implementation of the proposed networking structure using VPN. Testing, commissioning and handover of the UTM to IIM Amritsar 3. All the UTMs proposed should be of the same Make/manufacturer. 4. Equipment supplied shall be complete in every respect with all mountings, power supply, fittings, fixtures and standard accessories normally provided with such equipment and/or needed for erection, completion and safe operation of the equipment. 5. Authorized signatory: If the tender is made by or on behalf of a company incorporated under the Companies Act of 1956, it shall be signed by the Managing Director or one of the Directors duly authorized on that behalf. If it is made by a partnership firm, it shall be signed with co-partnership name by a member of the firm who shall sign copy of Power of Attorney with the tender authorizing him to sign on behalf of the partners. A certified copy of the registered partnership deed shall also be submitted along with the tender. 6. If the Tenderer is not the OEM for the product, a letter from the OEM authorizing the Tenderer to quote OEM s product on behalf of the OEM specifically for this tender shall be attached failing which the offer shall be rejected. 7. Tenderers should submit along with the tender certified copies of audited documents showing their turnover for the last three years, failing which the tender shall be rejected. 8. Proof of executing at least three similar orders during last two years to be provided. 9. The vendor should attach a list of his/her customers with supporting documents, failing which the tender is liable to be rejected. 10. The vendor should be able to demonstrate the capability of the equipment quoted at his/her own cost, if required. 11. Rate quoted by the supplier: Complete rate for the supply, installation, testing and commissioning should be quoted in the prescribed format in Annexure IV. Rates quoted in any other place/form shall not be
considered. The quote can be for the items as per our specifications given in Annexures I to III. Adherence to our specifications shall be a precondition. Tenderers are requested to furnish specifications of the products quoted by them in Annexure I(A) to III(A). If the tenderer suggests any other alternative (option), this shall be separately mentioned and deviation from our specifications indicated clearly. Tenderers should quote their rates both in figures and in words. The unit price of each item shall be quoted separately and the total of each page along with carried figures of the previous page shall be given in ink and signed by the tenderer. No blank space shall be left. 12. Rate quoted by the supplier must include the cost of transportation of the equipment to the Institute, installation, commissioning and testing charges of the equipment; all taxes such as Sales Tax, Entry Tax, VAT, WCT, etc., and no claim after submitting the quotation shall be entertained. Any other charges over the quoted rate shall clearly be indicated. 13. The Institute will not provide Form C & D (Sales Tax) or any other certificates to the supplier. 14. Tenders not properly filled, mutilated, with incorrect calculations or generally not complying with the conditions are liable to be rejected. 15. Each page of the tender should be serially numbered. The covering letter should clearly specify the total number of pages in the tender submitted by the tenderer. The tenderer/authorized signatory shall sign on each page of this tender document as a token of acceptance of the tender conditions and also the Tender Form in Annexure IV (Page No. 12). Unsigned tenders shall not be considered and no correspondence shall be entertained. 16. No alternations in tender forms shall be made by the tenderer and if any such alteration is made, the tender is liable to be rejected. 17. Earnest Money Deposit and Security Deposit: a) EMD @ 2.5% of the amount specified in the respective tender form is to be submitted along with the tender document in the form of Demand Draft drawn in favour of the Indian Institute of Management Kozhikode, payable at Kozhikode. Tenders received without EMD or EMD in any other form than as stated shall be rejected. The EMD will be refunded to the unsuccessful tenderer within one month of the acceptance of the tender. b) Within ten days of the award of Purchase Order, the supplier shall furnish a bank guarantee for a sum equivalent to 5% of the order value as Security Deposit (Performance Guarantee) valid until the date of installation and testing of the equipment. EMD already deposited along with tender shall be returned on furnishing the performance guarantee (Security Deposit). The Security Deposit/EMD shall not bear any interest. 18. Acceptance period: The tender shall remain valid for acceptance for a period of 90 days from the date of opening of tender. However in case of any delay due to genuine reasons, the validity period may be extended further for additional period of 30 days.
19. The tenders submitted shall clearly mention the name of the firm/person in whose favour the purchase order is to be placed. Any request made after submitting the tender for changing the name of the firm in whose favour the purchase order is to be placed shall not ordinarily be entertained. 20. Acknowledgement of the Purchase Order: The supplier shall give an acknowledgement of the Purchase Order within 10 days of the date of the Purchase Order. In case, the supplier fails to acknowledge the Purchase Order within the stipulated time, the Institute is at liberty to cancel the Purchase Order. 21. Delivery Schedule and Penalty for Delay: Delivery schedule shall clearly be indicated in the quotation submitted by the supplier. Penalty at the rate of 0.5% or part thereof of the order value per week, subject to a maximum of 2.5% will be imposed for delayed delivery and installation. 22. The vendor shall commission and install the equipment at the designated locations within the IIM Amritsar Transit Campus. Payments: Normal payment terms acceptable to the Institute shall be 95% payment within 30 days of satisfactory installation and testing of the equipment and the rest 5% after expiry of warranty period. 23. Income Tax: Every tenderer shall furnish along with the tender the latest Income Tax Clearance Certificate without which his/her tender is liable to be rejected. The Institute will deduct amount towards Tax Deducted at Source (TDS) as per the latest Income Tax Rules from all payments made to the supplier/contractor. 24. Warranty: The equipment quoted shall carry three years comprehensive on-site manufacturer warranty. Deviation in warranty terms, if any, shall clearly be mentioned in the offer. During the warranty period, the OEM shall be fully responsible for warranty in respect of proper design, quality and workmanship of all the equipment, accessories etc. OEM should provide software fixes and updates to all the equipment as part of warrant. 25. AMC Charges: Rate of Annual Maintenance Charges after the warranty period shall clearly be given in the quotation. Special conditions, if any, for entering into AMC after the warranty period shall clearly be mentioned.
26. Contact details of the person for all post sales/installation maintenance support: Name & Designation: Phone No: Fax No: Mobile: E-mail: 27. Demurrages and penalty, if any, paid by the supplier due to his/her fault shall not be borne by the Institute. 28. In case of any dispute, the decision of the Director of the Institute shall be final and binding on both the parties. 29. The proposal should be duly supported by the following documents: i. Covering letter addressed to the Chief Administrative Officer, giving brief company profile including turnover details and brief technical description of the product quoted. ii. Name and address of the manufacturer. iii. Statement of compliance with specification as specified by us iv. Letter of authorization and support for three years, from the principal company, if the product quoted is a third party product. v. List of support locations vi. Customer list vii. Certified copies of audited turnover documents and Income Tax Clearance Certificates for the last three years. 30. Tender received after the last date and time for receiving tenders will be summarily rejected and no correspondence shall be entertained. 31. IIM Amritsar reserves the right to alter and revise the technical specifications or the required quantity of the items at any point of time. In case of such alteration, the tenderers shall be duly notified. 32. Tenderers are to abide by all the Terms and Conditions detailed above. In case these terms and conditions are not acceptable to any tenderer, he/she should clearly specify the deviations in his/her tender. IIM Amritsar reserves the right to accept or to reject them. 33. The acceptance of tender will rest with the Institute, which does not bind itself to accept the lowest tender and reserve to itself the authority to reject any or all of the tenders received, without assigning any reasons. 34. Receipt of Tenders:
Tenders along with all supporting documents, EMD etc., in sealed envelope will be received as stated on the cover of this notice. The tenders in sealed envelopes superscribing tender number should be sent to the following address: Nominated Officer, IIM Amritsar, Punjab Institute of Technology Building, Inside Government Polytechnic Campus, Polytechnic Road PO: Chheharta, G.T. Road Amritsar - 143105 0183-2254538 IIM AMRITSAR will not be liable for non-receipt of the tender in time due to change in address on the envelope. Signature of the Tenderer with Official Seal
Annexure - I Specifications of UTM (Type I) The Firewall must be appliance based, rack mountable and it should support internal or external redundant Power Supply. The platform must be capable of supporting a minimum of 8 interfaces with auto sensing 10/100/1000 capability and Two Gigabit SFP ports. The Firewall must support at least 2,000,000 concurrent connections and 20,000 new sessions per second. The Firewall should be having minimum 2.4 Gbps throughput. Licensing should be per device, license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPsec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. Should support 400 Mbps IPSec VPN throughput and 1500 Tunnels The firewall should support a minimum of 800 Mbps of IPS & 600 Mbps Gateway Antivirus throughput. Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunneling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN. Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination). Device should support Static routing, RIP, OSPF, BGP and IS-IS. Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+). Support for Native Windows Active Directory Integration. The device should have IPS protection for 6000+ signatures Should Identify and control over 2500+ applications. Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB. Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. The Firewall should have minimum 30 Gb on box storage for logging and reporting OEM should be having the following certifications/ratings o FIPS-140-2 for Client VPN software o OS should be IPv6 Phase II Ready certified o Firewall module should be ICSA Labs and EAL 4 certified o VPN should be ICSA Labs certified for both IPSec and SSL-TLS o Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. o o Antivirus should ICSA Labs and VB100 certified. OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
UTM (Type I): Specifications offered by the Bidder Annexure I (A) Feature Compliance Remarks The Firewall must be appliance based, rack mountable and it should support internal or external redundant Power Supply. The platform must be capable of supporting a minimum of 8 interfaces with auto sensing 10/100/1000 capability and Two Gigabit SFP ports. The Firewall must support at least 2,000,000 concurrent connections and 20,000 new sessions per second. The Firewall should be having minimum 2.4 Gbps throughput. Licensing should be per device, license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPsec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. Should support 400 Mbps IPSec VPN throughput and 1500 Tunnels The firewall should support a minimum of 800 Mbps of IPS & 600 Mbps Gateway Antivirus throughput. Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunneling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN. Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination). Device should support Static routing, RIP, OSPF, BGP and IS-IS. Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+). Support for Native Windows Active Directory Integration. The device should have IPS protection for 6000+ signatures
Should Identify and control over 2500+ applications. Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB. Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. The Firewall should have minimum 30 Gb on box storage for logging and reporting OEM should be having the following certifications/ratings FIPS-140-2 for Client VPN software OS should be IPv6 Phase II Ready certified Firewall module should be ICSA Labs and EAL 4 certified VPN should be ICSA Labs certified for both IPSec and SSL-TLS Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. Antivirus should ICSA Labs and VB100 certified. OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
Annexure - II Specifications of UTM (Type II) The Firewall must be appliance based. The platform must be capable of supporting a minimum of 4 interfaces with auto sensing 10/100/1000 capability The Firewall must support at least 1,500,000 concurrent connections and 4,000 new sessions per second. The Firewall should be having minimum 2.4Gbps throughput. Licensing should be per device, license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPSec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. Should support 700 Mbps IPSec VPN throughput. Should support 100 Gateway-to- Gateway and 900 Client-to-Gateway IPSec VPN Tunnels The firewall should support a minimum of at least 270 Mbps of IPS & 60 Mbps Gateway Antivirus throughput Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunnelling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination) Device should support Static routing, RIP, OSPF,BGP, IS-IS Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) Support for Native Windows Active Directory. The device should have IPS protection for 6000+ signatures Should Identify and control over 2500+ applications Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. The Firewall should have minimum 30 Gb on box storage for logging and reporting OEM should be having the following certifications/ratings o FIPS-140-2 for Client VPN software o OS should be IPv6 Phase II Ready certified o Firewall module should be ICSA Labs and EAL 4 certified o VPN should be ICSA Labs certified for both IPSec and SSL-TLS o Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. o o Antivirus should ICSA Labs and VB100 certified. OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
UTM (Type II): Specifications offered by the Bidder Annexure II (A) Feature Compliance Remarks The Firewall must be appliance based. The platform must be capable of supporting a minimum of 4 interfaces with auto sensing 10/100/1000 capability The Firewall must support at least 1,500,000 concurrent connections and 4,000 new sessions per second. The Firewall should be having minimum 2.4Gbps throughput. Licensing should be per device, license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPSec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. Should support 700 Mbps IPSec VPN throughput. Should support 100 Gatewayto-Gateway and 900 Client-to-Gateway IPSec VPN Tunnels The firewall should support a minimum of at least 270 Mbps of IPS & 60 Mbps Gateway Antivirus throughput Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunnelling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination) Device should support Static routing, RIP, OSPF,BGP, IS-IS Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) Support for Native Windows Active
Directory. The device should have IPS protection for 6000+ signatures Should Identify and control over 2500+ applications Gateway AV should be supported for realtime detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. The Firewall should have minimum 30 Gb on box storage for logging and reporting OEM should be having the following certifications/ratings FIPS-140-2 for Client VPN software OS should be IPv6 Phase II Ready certified Firewall module should be ICSA Labs and EAL 4 certified VPN should be ICSA Labs certified for both IPSec and SSL-TLS Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. Antivirus should ICSA Labs and VB100 certified. OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
Specifications of UTM (Type III) Annexure III The Firewall must be appliance based. Licensing should be per device license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPSec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. The platform must be capable of supporting a minimum of 4 interfaces with auto sensing 10/100/1000 capability The Firewall must support at least 400,000 concurrent connections and 4,000 new sessions per second. The Firewall should be having minimum 1 Gbps throughput. Should support 500 Mbps IPSec VPN throughput. Should support 100 Gateway-to- Gateway and 400 Client-to-Gateway IPSec VPN Tunnels The firewall should support a minimum of at least 100 Mbps of IPS & 50 Mbps Gateway Antivirus throughput Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunneling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination) Device should support Static routing, RIP, OSPF,BGP, IS-IS Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) Support for Native Windows Active Directory Integration The device should have IPS protection for 6000+ signatures Should Identify and control over 2500+ applications Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. OEM should be having the following certifications/ratings o FIPS-140-2 for Client VPN software o OS should be IPv6 Phase II Ready certified o Firewall module should be ICSA Labs and EAL 4 certified o VPN should be ICSA Labs certified for both IPSec and SSL-TLS o Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. o o Antivirus should ICSA Labs and VB100 certified OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
Annexure III (A) UTM (Type III): Specifications offered by the Bidder Feature Compliance Remarks The Firewall must be appliance based. Licensing should be per device license for unlimited users for Firewall / VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy. The device should be having security functions like Firewall, VPN (IPSec &SSL), Application firewall, Gateway level antivirus, Antispam, Category based web filtering, Intrusion prevention system, Traffic shaping, etc.. The platform must be capable of supporting a minimum of 4 interfaces with auto sensing 10/100/1000 capability The Firewall must support at least 400,000 concurrent connections and 4,000 new sessions per second. The Firewall should be having minimum 1 Gbps throughput. Should support 500 Mbps IPSec VPN throughput. Should support 100 Gateway-to- Gateway and 400 Client-to-Gateway IPSec VPN Tunnels The firewall should support a minimum of at least 100 Mbps of IPS & 50 Mbps Gateway Antivirus throughput Should support more than one ISP link with automatic ISP link failover as well as ISP link load sharing for outbound traffic. Should Support IPv6 functions such as Management over IPv6, IPv6 routing protocols, IPv6 tunneling, firewall and UTM for IPv6 traffic, NAT46, NAT64, IPv6 IPSEC VPN Should support IPv4 and IPv6 Rate based DOS protection with threshold settings against TCP Syn flood, TCP/UDP/ port scan, ICMP sweep, TCP/UDP/ SCTP/ICMP session flooding (source/destination) Device should support Static routing, RIP, OSPF,BGP, IS-IS Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) Support for Native Windows Active Directory
Integration The device should have IPS protection for 6000+ signatures Should Identify and control over 2500+ applications Gateway AV should be supported for realtime detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3, POP3S, IMAP, IMAPS, IM and SMB Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS with Document Fingerprinting. OEM should be having the following certifications/ratings FIPS-140-2 for Client VPN software OS should be IPv6 Phase II Ready certified Firewall module should be ICSA Labs and EAL 4 certified VPN should be ICSA Labs certified for both IPSec and SSL-TLS Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified. Antivirus should ICSA Labs and VB100 certified OEM should be having "Recommended" rating in NSS Labs 2012/2013 network intrusion prevention testing, Firewall testing and Next Generation Firewall testing.
Annexure IV TENDER FORM Sl. No. Item Rate (All inclusive*) Qty. Amount 1. 2. 3. UTM (Type I) (As per specifications given in Annexure I of the Tender Document) UTM (Type II) (As per specifications given in Annexure II of the Tender Document) UTM (Type III) (As per specifications given in Annexure III of the Tender Document) ` (in figures) Rupees. (in words) ` (in figures) Rupees. (in words) ` (in figures) Rupees. (in words) *Rate quoted shall be inclusive of all charges for supply, installation and testing. Date: Seal 1 No. 1 No. 1 No. ` (in figures) Rupees. (in words) ` (in figures) Rupees. (in words) ` (in figures) Rupees. (in words) Signature of the Tenderer with Official
Annexure V PROFORMA Certificate for Tender Documents Downloaded from Indian Institute of Management Amritsar Website: iimk.ac.in/iimamritsar In case the tender document is downloaded from the website, a declaration in the following Performa has to be furnished. "I... (Authorized Signatory) hereby declare that the Tender Document submitted has been downloaded from the website https://www.iimk.ac.in/iimamritsar and no addition/deletion/correction has been made in the Tender Form (Tender No.) downloaded. I also declare that I have enclosed a DD/Bankers Cheque No... dated... for `... towards the cost of Tender Form along with Tender document". In case at any stage, it is found that the information given above is false / incorrect, IIM Amritsar shall have the absolute right to take any action as deemed fit/without any prior intimation. 35. Signature of the Tender with seal