SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :



Similar documents
Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

Project Management Basics

Third Party Technical Guidelines

SHARESYNC SECURITY FEATURES

Next Generation Enterprise Network Security Platform

Chapter 8 Router and Network Management

Firewall Feature Overview

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Performance of a Browser-Based JavaScript Bandwidth Test

Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

CASE STUDY ALLOCATE SOFTWARE

PALO ALTO SAFE APPLICATION ENABLEMENT

License & SW Asset Management at CES Design Services

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Fortigate Features & Demo

Using Palo Alto Networks to Protect the Datacenter

Network protection and UTM Buyers Guide

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

Networking for Caribbean Development

Fortinet Certified Network Security Administrator

Implementing Cisco IOS Network Security

Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

USG6600 Next-Generation Firewall

Recommended IP Telephony Architecture

Cyber Essentials. Test Specification

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

8. Firewall Design & Implementation

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

Endian Unified Threat Management

Guideline on Firewall

About Firewall Protection

NETASQ MIGRATING FROM V8 TO V9

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Astaro Gateway Software Applications

SVN5800 Secure Access Gateway

IINS Implementing Cisco Network Security 3.0 (IINS)

Cyberoam Perspective BFSI Security Guidelines. Overview

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Hillstone Intelligent Next Generation Firewall

Locking down a Hitachi ID Suite server

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

ReadyNAS Remote White Paper. NETGEAR May 2010

Digifort Enterprise The most complete Digifort solution for camera and alarm monitoring.

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

OPINION PIECE. It s up to the customer to ensure security of the Cloud

Customer Service Description Next Generation Network Firewall

Progress 8 measure in 2016, 2017, and Guide for maintained secondary schools, academies and free schools

Cluster-Aware Cache for Network Attached Storage *

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

What s Next for Network Security - Visibility is king! Gøran Tømte March 2013

Fortinet Network Security NSE4 test questions and answers:

REQUEST FOR PROPOSAL FOR SUPPLY & INSTALLATION OF Firewall. Bill of Material

USG6300 Next-Generation Firewall

The Cisco ASA 5500 as a Superior Firewall Solution

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Load Balance Router R258V

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Palo Alto Networks. October 6

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Agenda , Palo Alto Networks. Confidential and Proprietary.

SonicWALL PCI 1.1 Implementation Guide

Bidding for Representative Allocations for Display Advertising

Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy cradaelli@paloaltonetworks.com

Gigabit Content Security Router

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Gigabit Multi-Homing VPN Security Router

CASE STUDY BRIDGE.

R&S SITGate Next-Generation Firewall Secure access to Internet and cloud services

Gigabit SSL VPN Security Router

74% 96 Action Items. Compliance

Applications erode the secure network How can malware be stopped?

McAfee Network Security Platform Administration Course

Social Islami Bank Ltd.

WildFire. Preparing for Modern Network Attacks

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Return on Investment and Effort Expenditure in the Software Development Environment

Transcription:

S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering, QoS and cheduling at ingle place within a ingle rule and not at multiple location. There mut not be different place and option to difine policy rule baed on thee parameter. 2 3 4 5 6 7 8 The Solution mut upport identification and control of all type of application (Buine, Social, Encrypted and Cutom) within our environment without requiring any licene/ubcription/blade. It hould provide detailed analyi on eion conumed,data tranferred and threat involved through the application. The propoed olution mut allow free cutom application ignature for Homegrown and cutom application(both current and future) that are running in our network. The olution mut provide real time traffic log baed on application irrepective of port. While monitoring real time traffic log, olution mut provide detailed view of application and Uer, not jut port and ip addree. Solution mut not have Application pecific chip like ASIC that doen't allow future firmware and feature expanion on the ame hardware. Solution mut be baed on parallel proceing architecture and mut not ue proprietry ASIC chip. The propoed olution mut be in the Leader quadrant in Gartner Magic Quadrant of Enterprie Firewall for lat 3 year. Solution mut upport Full tunnel, plit tunnel and application pecific tunnel for client to ite VPN. Solution mut allow cutom policie to control VPN traffic baed on uer, application. It mut allow different policie for different uer group for threat (Virue, vulnerabilitie, zero-day malware) within VPN traffic. The Firewall mut upport application identification and control natively, without requiring any licene/ubcription/blade.

S.No Functional Requirement : 9 The olution mut upport Firewall, Application viibility and control, IPS, Anti-viru, Anti-malware, Anti-bot, Zero-day attack prevention from day one. 10 11 12 The olution mut have alway on acce to the firewall. The Firewall hould have dedicated inbuilt hardware reource for firewall acce and management at all time, and mut be available irrepective of load. The olution mut report on the CPU uage for management activitie and CPU uage for other activitie. The propoed olution mut upport Policy Baed forwarding baed on: - Zone - Source or Detination Addre - Source or detination port - Application (not port baed) - AD/LDAP uer or Uer Group - Service or port Firewall hould upport Active/Active and Active/Paive HA and mut upport ynchronization of the following for HA: 13 14 15 16 17 18 -All eion -Decryption Certificate -All VPN Security Aociation -All IPS and AV eion -All threat and application ignature -FIB Table The propoed olution mut upport different Cutom IPS and Application policie for different uer and group. The propoed olution mut upport Cutomized DoS protection rule. Solution hould upport Seion baed load haring (not packet baed) over multiple equal cot path.it hould work with both tatic and dynamic routing. The propoed olution mut upport different action in the policy uch a deny, drop, reet client, reet erver, reet both client and erver. Solution hould upport Seion baed (not packet baed) differentiated ervice code point (DSCP) claification.

S.No Functional Requirement : 19 20 Solution mut upport end-to-end (firewall-to-client) priority policing and C2S & S2C direction enforcement. Solution mut upport Link Layer dicovery protocol (LLDP) for implified network management 21 22 23 24 25 Solution mut upport IPv6 baed ite-to-ite VPN tunnel Solution mut upport SNMP counter for logical interface e.g L2/L3 ubinterface, tunnel intefface, LAG (802.3ad), Loopback. Solution mut upport virtual ytem.every Virtual ytem mut upport individual eparate configuration for eparate DNS entrie and other ervice route for acce to NTP, Sylog, SNMP, Proxy etc. Every virtual ytem mut upport individual route through virtual ytem pecifc interface to acce all thee ervice. Solution hould correlate and detect hot that have received malware detected by inbuilt APT olution, and have alo exhibited command-and-control (C2) network behavior correponding to the detected malware. Solution hould correlate and detect hot that have exhibited command-and-control (C2) network behavior correponding to malware detected by inbuilt APT olution elewhere on the network. 26 27 Solution hould correlate and detect a hot involved in a equence of activity indicating remote compromie, tarting with canning or probing activity, progreing to exploitation, and concluding with network contact to a known maliciou domain. Solution hould detect probable exploit kit activity targeted at a hot on the network. Exploit kit hould be identified by a vulnerability exploit or exploit kit landing page ignature, combined with either a malware download ignature or a known commandand-control ignature.

S.No Functional Requirement : 28 29 30 Solution hould correlate and detect likely compromied hot baed on activity that reemble command-and-control (C2) beaconing, uch a repeated viit to dynamic DNS domain, repeated file download from the ame location, generation of unknown traffic, etc. Solution mut provide change control and baeline deviation mechanihm. It mut provide viibility in traffic pattern change in lat one hour, one day and compare thi with lat one day, one week and one month traffic pattern. The propoed olution hall upport andbox behavior baed inpection and protection of unknown virue and zero-day malware for any application and protocol (not limited to HTTP and SMTIP) 31 32 33 34 35 36 37 38 The propoed olution hall upport automated ignature generation for dicovered zero-day malware and the OEM hould enure the delivery of the ignature in 15 min from the time of inpection Solution mut provide automatic ignature for zeroday malware baed on File content and file type (not jut file hah and file name) Solution mut perform andbox baed multi-verion analyi of PDF file acro minimum three verion of Adobe reader The propoedolution hall upport DNS-baed ignature to detect pecific DNS lookup for hotname that have been aociated with malware The olution mut upport minimum four level of decompreion/decoding for any combination of decoding: ZIP, gzip, bae64,chunked, uuencode. The olution mut provide the ability to block file with multi-level-encoding with 5 or more level of compreion e.g office file in 5 level of zip. The propoed olution be able to upport imultaneou deployment with interface ervicing Layer 3, Layer 2, Tranparent and Tap mode The propoed olution mut upport the ability to lock configuration while modifying it, avoiding adminitrator colliion when there are multiple people configuring the appliance

S.No Functional Requirement : 39 40 41 The propoed olution mut upport validation of policy for hadowed rule before rule application The propoed olution mut upport on appliance Per policy SSL and SSH decryption for both inbound and outbound traffic. The propoed mut upport on appliance SSL decryption policy baed on IP, Uer, web category. 42 43 44 45 46 47 48 49 The Propoed olution hould upport authentication for terminal ervice like Citrix and Microoft. The propoed olution hall upport block and continue (i.e. allowing a uer to acce a web-ite which potentially violate policy by preenting them a block page with a warning with a continue option allowing them to proceed for a certain time) The propoed olution hould upport the ability to create QoS policy on a per rule bai: -by ource addre -by detination addre -by application (uch a Skype, Bittorrent, YouTube, azureu) -by tatic or dynamic application group (uch a Intant Meaging or P2P group) -by port and ervice The propoed olution hall upport packet capture baed on: -Application -Unknown Application -any threat -data-filter Solution upgrade mut not require new licene and there mut be feature parity from previou verion Solution mut not require cloud connectivity to detect and control any application Solution hould allow file blocking acro all protocol not limited to http, mtp, imap, Pop3. Solution mut provide a ingle on appliance management for Firewall, Application control, IPS, AV, Advanced malware etc.

S.No Functional Requirement : 50 The OEM mut provide free profeional ecurity audit report once every 3 month after tudying the network. The report mut provide detail related to dicovery of all type of threat (known and unknown) that are running on the network. It hould alo cover bandwidth utiliation of all application by uer, and capture the threat landcape uggeting corrective action if required. The Bidder i duty bound to include implementation a part of thi exercie. Pleae note that all uch ecurity report will be the property of the Railtel. 51 S.No 52 53 OEM mut provide performance, throughput and feature evidence through public domain- Webite and data heet. we reerve the right for aking the bidder to do a PoC that validate all technical compliance a ubmitted in the tender document. Any variance found during the PoC and not inline with technical compliance ubmitted by the bidder will be ummarily rejected leading to bid diqualification.the PoC will be done before the releae of any formal purchae order. Hardware Specification The propoed olution will be a Next Generation Firewall and not an UTM (unified threat management) ytem, with a capability of upporting at leat 250 Mbp of Application Identification Enabled Firewall throughput uing 64 byte HTTP packet. The OEM mut publih performance claim on public domain like webite, dataheet. Letter head performance claim will not be entertained. The propoed olution hould upport at leat 100 Mbp of performance with Firewall, application control, IPS, Anti-Viru, Anti-malware and Anti-bot enabled. The OEM mut publih performance claim on public domain like webite, dataheet. Letter head performance claim will not be entertained. Thi ubcription licene not to be quoted but teh functionality hall be available from Day 1.

S.No Functional Requirement : 54 55 56 57 58 59 The propoed olution hould upport at leat 100 Mbp Gbp of performance with tream baed (not proxy baed) Anti-Viru Prevention. The OEM mut publih performance claim on public domain like webite, dataheet. Letter head performance claim will not be entertained. The performance mut be meaured uing Data Center Environment with all Traffic enabled (not jut internet traffic). The OEM mut furinh detail of the teting methodology. The propoed olution mut upport at leat 64,000 concurrent connection. The connection count mut be active TCP connection. The propoed olution mut upport at leat 7,500 new eion per econd The propoed olution mut upport at leat 50 Mbp of IPSec VPN throughput. The olution mut provide 8 10/100/1000 gigabit interface and 1 out of band management interface. 60 The propoed olution mut upport at leat 250 IPSec VPN tunnel and 100 SSL VPN Uer from Day one without requiring any licene.