+ All Categories
Home > Documents > Unified Threat Management (UTM) by BOO and OEM will

Unified Threat Management (UTM) by BOO and OEM will

Date post: 06-Apr-2022
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
9
Unified Threat Management (UTM) S/NO. SPECIFICATIONS Trial procedure suggested by BOO Result expected/desired Complied/not complied. ANTIVIRUS 1. Proposed Solution should be a “Leader’ in the Magic Quadrant for Endpoint Protection Platform. All features functionality to be physically checked by BOO and OEM will Antivirus must be as per the requirement mentioned in the QRs. 2. The antivirus solution should provide enhanced antivirus protection for desktops, laptops & servers of all the attacks originating from places inside/outside of the network due to virus and/or other malicious programming code and should give appropriate warning messages. provide the certificate. 3. Solution should able to Detects and blocks malicious software in real time, including viruses, worms, Trojan horses, spyware, adware, rootkit or others. 4. The Antivirus solution must automatically scan external devices (Floppy disks, Compact disks, USB devices and Network shares in real time when accessed) as soon as they are attached to PC, Server, laptop etc. 5. Solution should provide network, file, reputation, behaviour and repair layers of defense to create the fastest, most effective solution. 6. Solution should leverage Global Intelligence Network to identify more threats, provide superior file reputation and automate responses to
Transcript
Page 1: Unified Threat Management (UTM) by BOO and OEM will

Unified Threat Management (UTM)S/NO. SPECIFICATIONS Trial procedure

suggested by BOOResult expected/desired Complied/not complied.

ANTIVIRUS1. Proposed Solution should be a

“Leader’ in the Magic Quadrant for Endpoint Protection Platform.

All features functionality to be physically checked by BOO and OEM will

Antivirus must be as per the requirement mentioned in the QRs.

2. The antivirus solution should provide enhanced antivirus protection for desktops, laptops & servers of all the attacks originating from places inside/outside of the network due to virus and/or other malicious programming code and should give appropriate warning messages.

provide the certificate.

3. Solution should able to Detects and blocks malicious software in realtime, including viruses, worms, Trojan horses, spyware, adware, rootkit or others.

4. The Antivirus solution must automatically scan external devices (Floppy disks, Compact disks, USB devices and Network shares in real­time when accessed) as soon as they are attached to PC, Server, laptop etc.

5. Solution should provide network, file, reputation, behaviour and repair layers of defense to create the fastest, most effective solution.

6 . Solution should leverage Global Intelligence Network to identify more threats, provide superior file reputation and automate responses to

Page 2: Unified Threat Management (UTM) by BOO and OEM will

-

new threats. It should monitor applications in real-time to detect and prevent malicious behaviour and provide zero-day defense. It should regularly update.

7. Solution should provide Early launch anti-malware (ELAM) protection for the computers in network when they start up and before third-party drivers initialize.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Antivirus must be as per the requirement mentioned in the QRs.

8. Solution should provide Clean Wipe tool or equivalent to remove itself only on demand.

9. Solution should able to block devices based on Windows Class ID and should include USB, Infrared, Bluetooth, Serial, Parallel, fire wire, SCSI and PCMCIA. Solution should also be able to block and give read/write/execute permission for mentioned devices.

10. Desktop Firewall rules should be configurable depending upon the state of screen saver on or off.

11. It should be possible to deploy the licenses at multiple locations with client-server architecture.

12. Antivirus Software must have the capability to scan, Quarantine and delete viruses and should be able to detect new classes of viruses by normal virus definition update mechanisms.

Page 3: Unified Threat Management (UTM) by BOO and OEM will

“ 03 . The Antivirus solution must scan all compressed file format and should be capable of cleaning or deleting infected filed within compressed file.

14. The Antivirus solution should have a centralized Management Console & Shall manage the anti-virus programs on the network from a single web- based console.

15. Antivirus solution should support integration with active directory for directory structure of computers for better management & should have logical group bases on IP addresses (Subnets).

16. Antivirus should be capable of pushing client installation from a centralized location and it should also support manual installation of client via network share.

17. Antivirus should be capable of forwarding logs to SI EM solution for centralised even logging.

18. Solution should provide application privilege control to regulate the activities of the running programs, namely, access to the file system and registry as well as interaction with other programs.

19. Solution should provide temper protection features i.e. user who does not know the password may not able to change the existing policy, exit or uninstall the antivirus solution.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Antivirus must be as per the requirement mentioned in the QRs.

Page 4: Unified Threat Management (UTM) by BOO and OEM will

" “20. Alerts on virus activity should be passed on to administrator

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Antivirus must be as per the requirement mentioned in the QRs.. 21. Antivirus Solution should provide web

control module with the ability to monitor and filter users browser activities by category, content and data type regardless o f workstation location. It should also provide the safety rating and content type o f a URL suspected of being a phishing site, etc.

22. Should have support with Windows Operating Systems (Versions to be decided by the user department at the time of indent) with 32 bit and 64 bit both.

Unified Threat Management (UTM)1. Technical Specification

The Firewall should be Hardware based, Reliable, purpose-built security appliance with hardened operating system that eliminates the security risks associated with general-purpose operating systems. Firewall appliance should have 4 Gigabit Ethernet or higher. (To be decided by the user department) Firewall throughput should be 20 Gbps or higher.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

Firewall should have 3DES IP Sec throughput of 140 MbpsFirewall should support 200 or more site-to-site VPN Tunnels.

Page 5: Unified Threat Management (UTM) by BOO and OEM will

- -

Firewall should have integrated SSL VPN gateway functionality and should support atleast 500 concurrent SSL users.Firewall should support 1,00,000 or higher New sessions per second.Firewall should support 2 Million or higher concurrent sessions.The Firewall should be supplied with unlimited IPSEC 8s SSL VPN Clients.Firewall should support Active/Passive with State Synch and Active/Active complete UTM features in HA Mode.The administrator authentication to be facilitated by local database, PKI 85 remote services such as Radius, LDAP and TACAS+ with option of 2 factor authentication.The Firewall shall support profile base login account administration, offering gradual access control such as only to Policy Configuration 85 Log Data Access.The proposed system shall be able to operate on either Transparent (bridge) mode to minimize interruption to existing network infrastructure or NAT/Route mode. Both modes can also be available concurrently using Virtual Contexts.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified ThreatManagement (UTM)must be as per the requirement mentioned in the QRs.

Page 6: Unified Threat Management (UTM) by BOO and OEM will

- -

The physical interface shall be capable of link aggregation, otherwise known as the IEEE 802.3ad standard, allows the grouping of interfaces into a larger bandwidth ‘trunk’. It also allows for high availability (HA) by automatically redirecting traffic from a failed link in a trunk to the remaining links in that trunk.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

The system shall provide soft switch configuration that enables administrator to create a virtual switching interface that is bases on the physical interface available on the unitThe system shall be able to operate as a Protocol Independent Multicast (PIM) version 2 router.

2. The system shall be able to provide outbound Wan link load­balancing capabilities using ECMP with optional methods of:

a) Source based (also source IP based) All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

b) Weighted (also called weight-based)c) Spill-over (also called usage-based)

3.The proposed system should have

a) Capable of enable and disable traffic shaping per firewall policy.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned

b) Capable of setting guarantee bandwidth per firewall policy

Page 7: Unified Threat Management (UTM) by BOO and OEM will

integratedTrafficShapingfunctionalityincludingthesefeatures:

c) Capable setting maximum bandwidth allocated per firewall policy.________________d) Capable of setting levels of prioritization

minimally 3

e) Ability to pass differentiated service tagging_________________________________f) Ability to tag packet for DiffServ. The proposed Stateful Inspection Firewall should include:a) Policy based Network Address Translation (dynamic and static NAT)b) Port ForwardingUser Authentication Disclaimer 85 URL redirect should be configurable on Firewall Policies.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

in the QRs.Unified ThreatManagement (UTM)must be as per the requirement mentioned in the QRs.

4. Theproposedsystem shallcomply/supportindustrystandards,supportswithoutadditionalexternalsolution,hardware ormodules:

a) IPSEC VPNb) PPTP VPNc) L2TP VPNd) SSL VPN

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified ThreatManagement (UTM)must be as per the requirement mentioned in the QRs.

5. The device shall utilize inbuilt

a) IPSEC (DES, 3DES, encryption / decryptionb) SSL encryption /decryption.

AES) All features functionality to be physically checked by BOO and OEM will

Unified ThreatManagement (UTM)must be as per the

Page 8: Unified Threat Management (UTM) by BOO and OEM will

hardware VPN acceleration:

provide the certificate. requirement mentioned in the QRs.

6. .The system shall support the following IPSECVPN capabilities:

a) Multi-zone VPN supportsb) IPSec, ESP securityc) Supports Aggressive and Dynamic moded) Hardware accelerated encryption using IPSEC, DES, 3DES, AES 'e) Support perfect forward secrecy group 1 and group 2 configurationf) MD5 or SHA1 authentication and data integrityg) Automatic IKE (Internet Key Exchange) and Manual Key exchange.h) Supports NAT traversali) Supports Extended Authenticationj) Supports Hub and Spoke architecturek) Supports Redundant gateway architecture. The system shall support IPSEC and PPTP VPN pass through so that computers or subnets on internal network can connect to a VPN gateway on the Internet.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

7. System shall support 2 forms of site-to-site VPNconfiguration:

a) Route based IPSec tunnelb) Policy based IPSec tunnel

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

8. The system shall be able to support virtualization

a) Firewallb) IPSEC &SSLVPNc) IPS settingsd) Antivirus settings

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned

Page 9: Unified Threat Management (UTM) by BOO and OEM will

o f the following feature components:

e) Antispam settingsf) Web Filtering Settingsg) DLP settingsh) Application Control Settingsi) Routingj) Log & report configurationsThe system shall provide SSL VPN tunnel mode that supports Windows Vista and with 64-bit Windows operating systems.

in the QRs.

9. ShouldSupportIntrusionPreventionSystem

IPS throughput should be minimum 500 Mbps.

All features functionality to be physically checked by BOO and OEM will provide the certificate.

Unified Threat Management (UTM) must be as per the requirement mentioned in the QRs.

clcfqftcfr fcf^rwf q> Rq qRT 4? Pi 5* Rid f RTT T[zn t fcp Vqd ’JUTlcfW STI^Wf^TT q T 3fR[q %cR qRTP q> feTT fTF FRlcRf qq RRTT TIWI qR q?ltq R T fq T ? f ^ 'd l 3 # / W $ ^ n q - MFcT 4 R p 15 f M ^ fe R 3FlelW RtRTT RTq I

qtq - ypfr fc)cj3cii3tT/ qqft qf fPcfqq f ' Rq snip ^gfnqr ^ ynv PnleiRsid qqqqrrq Pt Tfcqq qRp qq qq qp:—

1. q q rrq qP <=i i >i-ci Rl <q? fpcRvr q ^q q q i2. WTTq qp RTf%fcqq> RqqT qq szfRr |3 . jjuiMHcb aqq^qqqqatf ^ w r q r o f^ q °M i


Recommended