27-12-05/2011-12/Res Dated 30.12.2011 INVITATION FOR BIDS



Similar documents
TENDER FOR. SUPPLY, INSTALLATION, TESTING & COMMISSIONING OF UTMs. Tender No. IT/ 01/IIMP/ 05/2015

QUOTATION FOR UTM 4/26(1)/2009/EDP-HO 06/08/2015

Gigabit SSL VPN Security Router

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Gigabit Multi-Homing VPN Security Router

Network Security. Protective and Dependable. Pioneer of IP Innovation

Network Security Firewall

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Unified Services Routers

Move over, TMG! Replacing TMG with Sophos UTM

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Gigabit Multi-Homing VPN Security Router

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV 120W Wireless-N VPN Firewall

NETASQ MIGRATING FROM V8 TO V9

Load Balance Router R258V

Meraki MX Family Cloud Managed Security Appliances

FortiOS Handbook WAN Optimization, Web Cache, Explicit Proxy, and WCCP for FortiOS 5.0

Unified Services Routers

Government of Canada Managed Security Service (GCMSS) Annex A-1: Statement of Work - Firewall

*TKtr *W4>K. Government of India itwm mitm Ministry of Labour & Employment W T HSlPT&llem. Directorate General of Mines Safety TENDER NOTICE

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

MARINE PRODUCTS EXPORT DEVELOPMENT AUTHORITY Panampilly Nagar, Kochi Ph: ,

Network Security. Network Security. Protective and Dependable. > UTM Content Security Gateway. > VPN Security Gateway. > Multi-Homing Security Gateway

Request for Proposal MDM Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

UTM FIREWALL SPECS HARDWARE SPECIFICATIONS

Gigabit Content Security Router

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

NetDefend UTM Firewall Series

Introduction of Quidway SecPath 1000 Security Gateway

Unified Services Routers

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices

Cyberoam Next-Generation Security. 11 de Setembro de 2015

NetDefend UTM Firewall Series

Funkwerk UTM Release Notes (english)

Firewall Defaults and Some Basic Rules

Proof of Concept Guide

APV9650. Application Delivery Controller

TENDER DOCUMENT FOR SUPPLY, INSTALLATION, TESTING AND COMMISSIONING OF FIREWALL

FortiGate /FortiWiFi -80 Series Enterprise-Class Protection for Branch Offices

NetDefend UTM Firewall Series

RuggedCom Solutions for

Boston Area Windows Server User Group April 2010

NetDefend UTM Firewall Series

Astaro Gateway Software Applications

Sophos Certified Architect Course overview

E-GOVERNANCE MISSION MODE PROJECT (MMP) CRIME & CRIMINAL TRACKING NETWORK & SYSTEMS (CCTNS) IMPLEMENTATION OF CCTNS IN GOA

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Barracuda Link Balancer

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

WAN Optimization, Web Cache, Explicit Proxy, and WCCP. FortiOS Handbook v3 for FortiOS 4.0 MR3

USG6600 Next-Generation Firewall

Layer 3 Network + Dedicated Internet Connectivity

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Cisco Small Business ISA500 Series Integrated Security Appliances

Multi-Homing Security Gateway

LB Intelligent Multi-WAN Router

Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.

Cisco RV180 VPN Router

Office of the Competition Commission of India Hindustan Times House, K.G. Marg, New Delhi

SVN5800 Secure Access Gateway

SOLUTION GUIDE. Radware & CyberGuard Complete Security Solutions offering Load Balancing, High Availability and Bandwidth Management.

APPENDIX 3 LOT 3: WIRELESS NETWORK

USG6300 Next-Generation Firewall

Security. Quick Sales Guide

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

KAMLA NEHRU INSTITUTE OF TECHNOLOGY SULATANPUR (UP) SHORT TENDER NOTICE

Cisco RV110W Wireless-N VPN Firewall

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

- Introduction to PIX/ASA Firewalls -

ProSecure Unified Threat. UTM Series. Unified Gateway Security for Smart IT Networks Without Compromise

Request for Quotation For the Supply, Installation, and Configuration of Firewall Upgrade Project

NEN Community REANNZ. Design Statement: NEN Edge Device

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

NEFSIS DEDICATED SERVER

Barracuda Load Balancer Online Demo Guide

QUESTION: 1 Which of the following are valid authentication user group types on a FortiGate unit? (Select all that apply.)

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Cisco RV215W Wireless-N VPN Router

Assuring Your Business Continuity

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

SonicWALL PCI 1.1 Implementation Guide

Huawei Eudemon200E-N Next-Generation Firewall

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

SonicWALL Advantages Over WatchGuard

APV x600 Series. Application Delivery Controller APV1600, APV2600, APV4600, APV5600, APV6600, APV8600, APV9600

Securing Networks with PIX and ASA

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Cisco RV110W Wireless-N VPN Firewall

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

INVITATION OF TENDERS

Simple security is better security Or: How complexity became the biggest security threat

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Improving Network Efficiency for SMB Through Intelligent Load Balancing

we secure YOUR network we secure network security English network security

Transcription:

27-12-05/2011-12/Res Dated 30.12.2011 INVITATION FOR BIDS Sub: Supply and installation of Internet Load balancing Switch and Firewall Security Appliance at RRII. The RRII invites sealed tenders for the supply and installation of Internet Load balancing switch and Firewall Security Appliances from reputed vendors The details are given below: Tender Reference 27-12-05/2011-12/Res dated 21.12.2011 Price of Tender Document NIL Bid Security(EMD) NIL Last Time and Date for receipt of tender 15.00 Hrs on 20.01.2012 offers Time and Date of Opening of tender 15:30 Hrs on 20.01.2012 offers Venue of the acceptance and opening of bids and address for communication Rubber Research Institute of India, Rubber Board P.O., Kottayam, Contact Telephone Numbers Kerala 686 009. Phone:0481-2353311, Fax: 0481-2353327 List enclosures 1. General work description & terms 2. Schedule of requirement Please read the general instructions attached carefully and furnish appropriate details. Tenderer who satisfy the pre-qualification criteria need only to submit their proposals. The Board reserves the right to accept or reject any tender offer without assigning any reason thereof.. Assistant Secretary (Res)

GENERAL INFORMATION 2 GENERAL WORK DESCRIPTION & TERMS Data cabling work at RRII Rubber Research Institute of India (RRII) under Rubber Board, a statutory body constituted under Rujbber Act 1947, functioning under the Ministry of Commerce & Industry of the Government of India. The RRII campus is a hill top nearly 8km away from Kottayam town. Buildings in the RRII campus are fully networked through optic fibre and copper for data connectivity. SCOPE Scope of the work include design, fabrication & supply of items at RRII, Kottayam-9, handling at site, storage under safe custody, erection, testing and commissioning and handing over of all items described in the SCHEDULE as per relevant standards of installation. Scope of the work includes a. Obtaining all statutory approvals if required from M/s. BSNL/PWD/Other service providers if required. b. All Civil works including materials required for items such as chipping of wall/ floor grouting, earth work excavations etc. to complete the installation in all respects. Work has to be performed as per the specifications and instructions given by the Engineer-in-charge from time to time. a. All terms and conditions listed in general instructions are covered. CONTRACTOR EXPERIENCE & OBLIGATIONS The bidder should be reputed supplier of networking components and Security appliances to the public sector for a period of 3 years with contact offices in Thiruvananthapuram Kochi area and having certified Engineers to configure networking and security appliances OUTLINE OF THE WORK: The request for the supply and maintenance of (1) Internet Load Balancing Switch, to connect multiple leased line internet connections from different ISPs in load balancing mode (2) Unified Thread Management (UTM) appliance with Firewall, IPS, Gateway Antivirus, Antispam, Content filtering, Link Load Balancing and failover, support for VPN. A schedule for the execution plan shall be submitted against each work order. Service escalation matrix and all contact details should be included in the basic proposal. WARRANTY Warranty expected is 5 years onsite comprehensive mode from the date of installation All material/ equipment supplied should be guaranteed by the contractor for satisfactory performance and all defective items shall be replaced from time to time.

3. All the material/ equipment supplied should be guaranteed by the vendor for satisfactory performance. Should any item not perform as intended or should design material or workmanship proved to be defective the item/ work should be promptly corrected by the contractor to the satisfaction of the Board without delay and at no extra cost failing which the Board will be free to take such corrective action at the contractors expense and risk. RoHS compliance and other standards complied by the components shall be clearly stated in the offer. TERMS AND CONDITIONS 1. Validity: The offer should be valid for acceptance for a period of 60 days from the date of opening. 2. Price, taxes and duties: Price quoted shall be all inclusive of sales taxes and other duties. Prices in the tender will kept firm and no escalation on any ground will be admissible. 3. EMD charges: Rs.5000/- in the form of Demand draft in favour of Director (Research), RRII, Rubber Board payable at Kottayam. Tender not accompanying EMD will be rejected. On acceptance of the Tender, EMD of the successful bidder shall be treated as Security Deposit. 4. Completion period of work: Normal course of completion of work is 30 days but will change from time to time, based on work order in the case of repeat order. 5. Delay in completion: Time is the essence of the contract and period of completion stipulated should be strictly adhered to. If contractor fails to complete the work as per order in all respects and hand over the same within the stipulated time, we may at our option either recover liquidity damages @ ½% of the contract value per day of such delay with a maximum of 10% of the contract value or terminate the order wholly or partially 6 PAYMENT TERMS: a. 90% against supply and satisfactory completion of the work and b. 10% against BG as performance security for the warranty period 7.AGREEMENT: The successful tender if so required by the RRII, shall execute an agreement with the RRII in the form prescribed by the Board soon after the acceptance of the tenders failing which the EMD will be forfeited and the acceptance of the tender shall be treated as cancelled. 8. The Director (Research) RRII deserves the unrestricted right to reject any or all of the tenders or to accept any tender in whole or part without assigning any reason thereof.

4 SCHEDULE OF REQUIREMENT Sl. No. Item 1. Internet Load Balancing Switch with monitoring application software 2. Security Appliance with monitoring software / Unified Thread Management appliance Quantity 1 No. 1 No. SPECIFICATION : Internet Load Balancing Switch 19 Rack mountable Internet load balancer with 2 GB or above RAM Capacity Minimum 200 Mbps throughput Unlimited simultaneous sessions WAN port links 4 nos. or above WAN uplink using full duplex Gigabit Ethernet through SM OFC Modules to support the Fibre uplink Minimum 4 LAN Ethernet ports OSPF, RIP, RIP II or equivalent routing protocols Load balancing and failover algorithms Support for VPN, RADIUS, LDAP etc NAT and IP forwarding capability Integrated application level security support Integrated intrusion prevention Application smart routing SNMP support, Web / GIU based configuration and Monitoring, RS 232 based command line support, VPN Support Bandwidth usage statistics, ISP health monitoring Access permission management etc. Indian standard 100 250 V power input EN 60950, UL 19050, EN 55022, CE etc. certifications 5 year onsite same business day replacement warranty support Same series unit must be spared for one month performance testing before final selection.

SPECIFICATION OF SECURITY APPLIANCE 5 Unified Thread Management Appliance Sl. Features Compliance Remarks Comments No. 1.1 General Requirements: 1 The Firewall must be appliance based and rack mountable 2 It should be modular to accommodate disk based storage or future interface growth. 3 Appliance should have provision for redundant power supply 4 Licensing: should be per device license for unlimited users for Firewall/ VPN (IPSec & SSL) and other features. There should not be any user/ip/host based licenses Please specify if the product does not follow the required licensing policy 5 Support for Virtualization (ie Virtual Systems / Virtual Domains). Please mention what is the maximum number of virtual instances supported 6 Should support USB interfaces for config. Backup / restore, upgrading images and for connecting 3 G Modems as fall-back. 7 Should support more than one ISP with automatic ISP failover as well as ISP load sharing for outbound traffic. 8. Should have support for Explicit Proxy with Web Caching (especially for the purpose of having session based policies for Citrix/ Terminal Server users) 1.2 Interface and Connectivity Requirements: 1 The platform must be capable of supporting a minimum of 8 gigabit interfaces with auto sensing 10/100/1000 capability 2 It should also support 8 x 10/100 Fast Ethernet interfaces 3 The platform should support the standards based Multi Link aggregation technology (IEEE 802.3ad) to achieve higher bandwidth 4 The platform should support VLAN tagging (IEEE 802.1q) with about 4096 VLANs supported ( in NAT / Route mode) 1.3 Performance Requirements: 1. Firewall must support at least 500,000 concurrent connections

2 The Firewall must support at least 15,000 new sessions per second processing 6 3 The Firewall should support throughputs of minimum 4 Gbps for all packet sizes (1518 byte packet, 512 byte packet and 64 byte packet) 4 The firewall should support a minimum of 2.5 Gbps of IPSec VPN Throughput and should be hardware accelerated 5 The Firewall should support a minimum of 500 Mbps of IPS Throughput 1.4 Network / Routing Requirement: 1 Static routing must be supported 2 Policy based Routing must be supported 3 Dynamic Routing (RIP,OSPF,BGP & IS- IS) must be supported for IPv4 4 Should support RIPng, OSPFv3 and BGP4+ 5 Multicast Routing must be supported 1.5 Firewall Features Requirement: 1 The Firewall should be ICSA Labs certified for Enterprise Firewall or EAL 4 certified, if not the same model 2. It should be possible to operate the firewall in bridge mode or transparent mode apart from the standard NAT mode 3 The Firewall must provide NAT functionality, including PAT 4 Should support Policy-based NAT 5 The Firewall should provide advanced NAT capabilities, supporting NAT Traversal for services like SIP/H.323/SCCP 6 Firewall should support Voice based protocols like H.323, SIP, SCCP,MGCP etc and RTP Pinholing 7 The Firewall should support User-Group based Authentication (Identity based Firewalling) & Scheduling 8 IPv6 support for both NAT and Transparent Mode 1.6 Authentication Requirements: 1 Support for authentication for Users and Firewall Administrators (Local and Remote RADIUS, LDAP & TACACS+) 2 Support for RSA Secure ID or other Token based products 3 Support for Native Windows Active Directory or Novell edirectory Integration

Should support PKI / Digital Certificate 4 based two-factor Authentication for both Users and Firewall Administrators 1.7 Encryption / VPN Requirements 1 The VPN should be integrated with firewall and should be ICSA Labs certified for both IPSec and SSL-TLS. Should support the following protocols a DES & 3DES b MD5, SHA-1 & the more secure SHA 256 authentication c Diffie Hellman Group 1, Group 2, Group 5 & the more secure Group 14 d Internet Key Exchange (IKE) vi as well as IKE v2 algorithm e The new encryption standard AES 128,192 & 256 (Advanced Encryption Standard) 2 IPSec VPN should support XAuth over RADIUS and RSA Secur ID or similar product 3 Should have integrated SSL. VPN with no user license restriction. Please specify if the product does not follow the required licensing policy 4 Should support SSL Two-factor Authentication with Digital Certificates 5 Should support Single Sign-On Bookmarks for SSL Web VPN 6 Should support Windows, Linux and MAC OS for SSL VPN (should have always on clients for these OS apart from browser based access) 7 Should support NAT within IPSec/SSL VPN tunnels 8 Should also support PPTP and L2TP over IPSec VPN protocols 1.8 High Availability Requirements 1 The device must support Active Active as well as Active-Passive redundancy 2 The Firewall must support stateful failover for both firewall and VPN sessions 3 The HA Architecture should have the ability for Device Failure Detection and Notification as well as Link Status Monitor 4 Should support VRRP and Link Failure Control 1.9 Data Center Optimization: 1. Should support Server Load Balancing with features like HTTP persistence 2 Should support TCP Multiplexing 3 Should support HTTPS Offloading with flexible Digital Certificate Management

4 Should have support for WCCP protocol 8 1.1 0 IPS,AV and Web Filtering 1 Should have integrated Network Intrusion Prevention System (NIPS) and should be ICSA Labs certified 2 Should have a built-in Signature and Anomaly based IPS engine on the same unit 3 Should have protection for 3000+ signatures 4 Able to prevent denial of service and Distributed Denial of Service attacks 5 Supports user-defined signatures (ie Custom Signatures)with Regular Expressions 6 Should Identify and control over 1000+ applications (ie Application control feature) 7 Should perform Traffic shaping of popular P2P applications like KaZaa, Gnutella, Bit Torrent, WinNY, edonkey etc 8 Should control popular IM/P2P applications regardless of port/protocol like Yahoo, MSN, Skype, AOL,ICQ etc 9 The appliance should facilitate embedded anti virus support which is ICSA Labs certified 10 Gateway AV should be supported for real-time detection of viruses and malicious code for HTTP,HTTPS, FTP, SMTP, SMTPS, POP3 and IMAP, NNTP and IM 11 Should have configurable policy options to select what traffic to scan for viruses 12 Should have options to prevent user downloads based on file extension as well as file type 13 Should have an ability of Antivirus scanning for IPv6 traffic 14 The appliance should facilitate embedded Web Content Filtering feature 15 Web content filtering solution should work independently without the need to integrate with External proxy server 16 URL database should have more than 2 billion URLs under 70+ categories 17 Should be able to block different categories / sites based on User Authentication. 1.1 Other Requirements 1

1 Provision to create secure zones / DMZ (ie Multi Zone support) 2 Should support DiffServ (Differentiated Services) 3 Should support Gateway Data Loss Prevention (DLP) feature for popular protocols like HTTP, HTTPS, FTP, POP3, IMAP, SMTP, POP3S, IMAPS, SMTPS 4 The DLP feature should support popular file types like MS-Word, PDF etc 5 Should have support WAN Optimization from day 1 for common applications like HTTP, HTTPS, MAPI, FTP, CIFS etc 6 WAN Optimization should be supported for bi-directional traffic in Gateway-to- Client / Gateway-to-Gateway topology 7 Should support Web caching for Explicit proxy traffic 8 Should Support Packet Capture / sniffer to capture and examine the contents of individual data packets that traverse the firewall appliance for troubleshooting, diagnostics and general network activity 9 The vendor should supply a separate logging platform 10 The vendor should take the responsibility of supplying a licensed OS and Hardware if it is software based Logging solution 11 The logging platform should have a capacity of 1 TB 12 The logging platform should have atleast 2 x 10/100/1000 Gigabits ports 1.1 Certifications - Mandatory 2 1 Should have support for the following certifications: a FIPS 140-2 for Client VPN software b OS should be IPv6 Phase II Ready certified War rant y of the unit Firewall / VPN /IPS/ AV/Web Filtering Appliance with Unlimited user licenses with 3 year warranty and Signature / Firmware / OS updates for 3 years 2 Logging, Statistics and Reporting Platform with 3 year warranty 3 Warranty extension / AMC rate for additional 2 years after the 3 year std. warranty 9