procurement, installation, commissioning and testing of wi

PROCUREMENT, INSTALLATION, COMMISSIONING AND TESTING OF WI-FI SYSTEM
OFC BACKBONE UPTO SWITCH AT SBIM, RAJARHAT
REF :SBI/ITS/KOL/2017-18/03 DATED 30.06.2017, CORRIGENDUM-I DATED 07.07.2017
AND CORRIGENDUM-II DATED 10.07.2017
CORRIGENDUM-III DATED 11.07.2017
Sr
N
o
1
Clause No
Existing Clause
Revised Clause
RFP-3.1.1
Supply, installation, testing and
commissioning Structured Wireless
LAN with OFC back bone connection
for Wi-Fi connectivity will be used at
SBIM, Rajarhat, Kolkata.
2
RFP – Ann5.3
SLA Terms & Conditions
3
RFP -Scope
of Work
The bidder should provide and
maintain high speed uninterrupted
wireless Internet across the SBIM
campus, except few areas/rooms, for
a period of 5 years. The areas/rooms
where access to Internet is not
required is marked at the building
plans (Annexure – ABC). All other
areas, including the open spaces,
should be covered with high speed
wireless Internet.
Supply, installation, testing
and commissioning and
maintenance(including FMS
and Internet link) of
Structured Wireless LAN with
OFC back bone connection
for Wi-Fi connectivity will be
used at SBIM, Rajarhat,
Kolkata for a period of 5
years.
The Annexure Number
should be treated as 3.2
(Eligibility Criteria)
The bidder should provide and
maintain
high
speed
uninterrupted
wireless
Internet
services,
as
mentioned in the RFP, across
the SBIM campus, including
the open spaces, for a period
of 5 years.
4
RFP -Scope
of Work
The bidder should conduct Site
Survey to finalize the Network
Diagram and the Bill of Materials
(BoM), subject to approval of the
Bank.The bidder will prepare the
drawings, cable route plans and laying
of cables, rack, node and AP
locations/placement,
etc.
in
consultation with Bank. The bidder will
try & reuse the items already available
at the location to the extent possible
subject to its functionality & feasibility
without any adverse effect to the
The bidder should conduct
Site Survey to understand the
exact
requirement.
To
maintain the uniformity among
the bidders, Bank has
finalized the BOM/BOQ as
mentioned at the bottom. The
bidder will prepare the
drawings, cable route plans
and laying of cables, rack,
node
and
AP
locations/placement, etc. The
bidder will try & reuse the
existing utility. The bidder should
submit simulation report / Wi-Fi survey
report including heat maps as per the
survey conducted at site, at least 7
days before bid submission. Required
changes/modification
in
architecture/quantity should be made
to meet Bank’s requirement.
items already available at the
location to the extent possible
subject to its functionality
&feasibility
without
any
adverse effect to the existing
utility. The bidder should
submit simulation report / WiFi survey report including heat
maps as per the survey
conducted at site along with
the bid. The bidder will remain
responsible
for
any
changes/modification
required
in
architecture/quantity to meet
Bank’s requirement.
5
RFP -Scope
of Work
Onsite engineer should be available Onsite engineer should be
for 24 * 7 * 365 days per year.
available for 24 * 7 * 365/366
days per year.
6
RFP -Uptime
and Penalty
Faulty Hardware
/
Appliances
replacement: The bidder should
provide replacement of the faulty
hardware/appliances within 24 hours
from time of detection/identification by
the onsite support team. In case of
delay beyond 24 hours, penalty will be
charged as under.
Sr
No
1
2
Equipment
Access Points
For Other
Equipment
Penalty per
day
Rs.1000/Rs.10000/-
This amount of penalty so calculated
shall be deducted at the time of
making payments to the bidder.
Onsite Helpdesk for the day-to-day
operation
/
Management
and
Technical Support Teams: Due to
some reason on the day, if any onsite
support personnel is/are not available,
the service integrator shall arrange for
the backup onsite support persons
accordingly. If on the day number of
Faulty Hardware / Appliances
replacement: The bidder
should provide replacement of
the
faulty
hardware/appliances within
24 hours from time of
detection/identification by the
onsite support team. In case
of delay beyond 24 hours,
penalty will be charged as
under.
Sr
N
o
1
2
Equipme
nt
Penalty
per day
Access
Rs.1000/Points
For Other Rs.10000
Equipme /nt
This amount of penalty so
calculated shall be deducted
at the time of making
payments to the bidder.
onsite support persons available is
less than 07 then SBI shall be entitled
to reduce amount(s) @ Rs.2500/- per
day per support person.
Onsite Helpdesk for the dayto-day
operation
/
Management and Technical
Support Teams: Due to some
reason on the day, if any
onsite support personnel
is/are not available, the
service
integrator
shall
arrange for the backup onsite
support persons accordingly.
If on the day number of onsite
support persons available is
less than 07 then SBI shall be
entitled to reduce amount(s)
@ Rs.2500/- per day per
support person.
UPTIME AND PENALTIES
FOR DOWNTIME:
Levy of penalties is without
prejudice to other rights and
remedies available under
this agreement:
Level
of Downtime
Network
Penalty
uptime
per
month
Committed
-NILSLA>=99.99%
>=99.95% but
<99.99%
10% of
Monthly
Bandwidth
+ FMS
Charges
>=99.50% but
<99.95%
20% of
Monthly
Bandwidth
Charges
>=99.00% but
<99.50%
30% of
Monthly
Bandwidth
+ FMS
Charges
>=98.50% but
<99.00%
40% of
Monthly
Bandwidth
+ FMS
Charges
50%
of
Monthly
Bandwidth
+
FMS
charges
and the
<98.50
Bank also
reserves
the right to
terminate
the
contract.
Further if
the
number of
link down
instances
during a
month
exceeds
3, Bank
reserves
the right to
terminate
the
contract.
PENALTIES FOR DELAY
IN UPGRADES:
The vendor should also
undertake to upgrade the
link within 4 days from
the date of Purchase
Order for up-gradation.
The Bank shall be
entitled to charge penalty
2% of the additional upgradation cost per day of
delay with a maximum of
20% of the additional upgradation cost beyond
the
scheduled
upgradation date.
If the successful bidder
fails
to
commission/upgrade the
link as mentioned above,
the Bank has rights to
cancel the business
offered to the bidder and
will recommend to IBA to
blacklist the bidder from
participating in any IBA
member bank’s business
offer.
7
Corrigendum
Uptime and
Penalty
Uptime Penalty will be as under.
Event
Time
period
Failure of
Wireless
equipme
nt
Failure of
Hardwar
e
equipme
nt
Penalty
5 Mnts-25
Rs.50,000
Mnts>upt
/- or Rs.1
o 1 hours
Lakh
25 Mnts60
Mnts>upt
o 2 hours
60 Mnts-2
Failure of
Hours
system
>upto 12
hours
Rs.50,000
/- or Rs.1
Lakh
Rs.2 Lakh
or Rs.4
Lakh
Please treat the Clause as
CANCELLED.
12 hours
Failure of
system
to 24
Rs. 5 Lakh
hours>upt
or Rs.6
o 48
Lakh
hours
8
RFP
Typo mistake. The clause
*** Uptime and other Penalty clauses should be treated as
DELETED.
should be incorporated in the RFP
*** Complete site plans and building
plans with marking of exempted
areas/rooms should be included in the
RFP. All AC Rooms/Electrical rooms
etc should be excluded from WiFiinternet network.
9
Corrigendum
– 4.11.3
Payment clause as against the
Payment clause as against
following heads,
the following heads,
Software: 50 % payment will be
Software: 50 %
released immediately after
payment will be released
installation, testing and
immediately after installation,
commissioning and another 50 % will
testing and commissioning
be paid after 3 months on
and another 50 % will be
satisfactory performance. paid after 3 months on
satisfactory performance. Hardware: 70% payment will be
released immediate after installation,
Hardware: 70% payment
testing and commissioning and
will be released immediate
remaining 30% will be paid in next
after installation, testing and
five years warranty period on equal
commissioning and remaining
instalment.
30% will be paid in next five
Installation – Normally will be paid
years warranty period on
equal installment.
100% after successful commission
and testing.
Warranty Charge – Annually in
Installation – Will be paid
100% after successful
commission and testing.
arrears. Warranty Charge –
FMS – Quarterly in arrears. Annually in arrears. FMS –
arrears. Quarterly
in
Link Charges – Quarterly
in arrears. 10
Corrigendum
Bidders will arrange for Internet
The successful bidder has to
connection from two different ISP
arrange for the links as
vendors and Bank will pay to ISP
mentioned in the RFP. Bank
vendor directly (if required) as per the
will not pay directly to any
agreement (payment will be made
ISP. Bank will pay to the
quarterly basis) and PO to be issued
bidder only as per the rates
to ISPs by Bank only at the Banks
mentioned in the RFP.
approved rate (already shared in
RFP)
11
Corrigendum
**As discussed in pre-bid meeting,
Please treat the clause as
Non-telco companies will not be able
DELETED.
to procure link on our behalf. In that
case Bank have to procure the links
separately and the RFP will be for
Hardware (with AMC),
Commissioning, Maintenance, FMS
etc. The solution should be capable
to handle 100 Mbps to 10 Gbps
Internet bandwidth.
12 RFP&
Corrigendu
m
Redundancy in hardware level as
Redundancy in hardware
well as in link level will be
implemented. To ensure the
availability of Internet link, the
bidder should provide two Internet
links with dual last mile from
different ISPs in ring architecture.
Switching over from one link to
other (in case of active link is
down) should be seamless without
level as well as in link level
will be implemented. To
ensure the availability of
Internet link, the bidder
should provide the Internet
link with dual last mile. The
second last mile should be
from different ISPs in ring
architecture. Switching
any downtime.
over from one link to other
(in case of active link is
down) should be seamless
without any downtime.
Bank may procure second
link in future, if required.
The system should be
capable to configure both
the links.
Total Wi-Fi BOQ
Sl
No.
Item Description
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
L3 Switch 24 port 10G IP Base with 24 Nos SFP 10G populated
12 Port Switch L3 with 4Nos 10G SFP and 1G populated
L2 Managed 24 Port with 4 SFP with 4 Nos 10 G populated
Router
Network Access Control
Link Load Balancer with Five years support
UTM Firewall with three years subscription 24X7 support. With
five Years
Redundant WLAN Controller with 4 GigE ports and 530 AP
management license from day one.
Omni, outdoor access point, 802.11ac 2x2:2 , dual band
concurrent, one Ethernet port, PoE input, includes mounting
bracket.
Dual-band 802.11abgn/ac (802.11ac Wave 2), Wireless Access
Point, 2x2:2 streams, MU-MIMO, dual ports, 802.3af PoE
support.
Cat 6 UTP Cable (305 Mtrs / Box )
Outdoor Cat 6 Cable
Information Outlet ,CAT6 RJ45, Unshielded
24 Port CAT6 UnShielded Jack Panel Loaded
Workstation/ Equipment end CAT 6 Patch Cords 1Mtrs
Workstation/ Equipment end CAT 6 Patch Cords 2Mtrs
Face Palate Single port
12 core Central loose tube 50 micron MM OM4 cable
12/24 Port LIU
Pigtail LC PC, beige, 50 micron,grade OM4, 1.5 m
LC-LC Duplex Multimode 50 micron patch cord
Adapter LC-Duplex PC, beige, OM4
Fiber splice Shelf(LIU) -12 LC Duplex
OFC Multi Mode 10G
12 U Wall Mount Rack with all accessories
6 U Wall Mount Rack with all accessories
42 U Floor Mount Rack with all accessories
HDPE Pipe 1"
UOM
Qty
No
Nos
Nos
No
No
No
2
12
35
2
2
2
No
2
Nos
2
Nos
40
Nos
Box
Box
Nos
Nos
Nos
Nos
Nos
Mtrs
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Mtrs
460
60
5
500
28
500
500
500
6000
50
600
50
50
50
50
24
13
1
6000
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Sr.
No.
A
A1
A2
A3
A4
A7
A8
A9
A10
B
B1
Service
L3 Switch 24 Port Installation & Commissioning Charge
12 Port Switch Installation & Commissioning Charge
12 Port Switch Installation & Commissioning Charge
Router Installation & Commissioning Charge
Link Load Balancer Installation Charge
Wireless Controller Installation & Commissioning Charge
Wireless AP Installation & Commissioning Charge
Cat 6 UTP Cable laying charge through condute.
I/O Installation and commissioning charge
Fluke Test Report for Cat 6 UTP Cable
Jack pannel Installation and Punching charge
Laying of OFC through HDPE Pipe including Digging, refilling of
hard/soft soil and Road crossing.
Pigtail splicing Charge
LIU Installation Charges
OTDR Testing Report for OFC
L2 Engineers yearly charges ( For Five Years)
L1 Engineers yearly charges ( For Five Years)
25 Years site certification
Project Management Charge
UTM Firewall Installation & Commissioning Charge
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
Nos
2
13
35
2
2
2
530
19200
500
500
28
Mtrs
Nos
Nos
Nos
Nos
Nos
Lot
Lot
Nos
6000
600
50
600
2
5
1
1
2
Feature Set
Solution Requirement
The router should support a throughput of 10 Gbps
The router architecture should be based on hardware based forwarding
and switching. System should be multi processor based architecture for
enhanced performance
The router should have data plane and control plane hardware level of
redundancy for providing self redundency and should not disrupt the
system functionality at the time of any data plane or control plane
hardware failure
The router should support granular traffic detection and management
using QoS features and should allocate network resources on
application priority and requirement
Router should support RFC 4012 for future implementation and Multicast
Support.(Desirable)
Router should support the complete STACK of IP V4 and IP V6 services
The router should support Operating System (OS) redundancy in 1:1
mode to ensure high-availability of the system. In the event of running
OS failure router should switchover to the redundant OS without
disturbing the traffic flow. There should not be any impact on the
performance in the event of active processing engine failure
The router should support on line hot insertion and removal of power
supply and connected modules. Any insertion line card/power supply
should not require for router rebooting nor should disrupt the functionality
of the system
Hardware and Interface Requirement
Router should have the following interfaces:
Complied
B2
Router should have 4 x 10 G ports & 4 X 1 G Ports or higher.
B3
B4
B5
B6
Router should have console port
Router should have management interface for Out of Band Management
Router should be rack mountable and support side rails if required
Router should have redundant power supplies (at least dual)
Router should have hardware health monitoring capabilities and should
provide different parameters through SNMP
Router should support VLAN tagging (IEEE 802.1q)
Router should support IEEE Link Aggregation and Ethernet Bonding
functionality to group multiple ports for redundancy
Router should have the capability of holding multiple OS images to
support resilience & easy rollbacks during the version upgrades etc and
should support inservice software upgrade including:
a. Multiple System image
b. Multiple system configuration
c. Option of Configuration roll-back
Router should support for different logical interface types like loopback,
GRE and IPIP tunnel, VLAN etc
Performance Requirement
The router should support minimum 3,000,000 IPv4 and IPv6 routes
entries including multicast routes
Router should support Graceful Restart for OSPF, BGP, MP-BGP etc.
Router should support required as mentioned throughput of crypto IMIX
WAN traffic including the services
a. Hardware based encryption acceleration (IPSec VPN)
b. IPSec Encryption (ESP-AES 256 ESP-SHA-HMAC)
c. IP Routing (Static/Dynamic)
d. IP Forwarding
f. NAT
g. QoS
h. ACL and Other IP Services
i. MPLS with VRF Edge Routing
j. IP V.6 host and IP V.6 routing
The router should support secured connectivity using point to point and
any to any dynamic IPSec VPN for secured data transfer:
a. Hardware based IPSec Encryption
c. Any to Any Dynamic IPSec VPN using the GDOI Protocol should be
supported
d. IPSec Idle Timeout and Dead Peer detection
e. Support Multicast traffic over any to any dynamic VPN
The router should support uninterrupted forwarding operation for OSPF,
BGP etc. routing protocol to ensure high-availability during primary
controller failure
Layer2 Features
Spanning Tree Protocol ( IEEE 8201.D, 802.1S)
VLAN Trunking (802.1q)
System should provide basic Layer 2 WAN protocols as:
b. GRE
c. Ethernet
Layer3 Features
The router should support IPSec Framework for Secured Data tansfer
a. IPSec Data Encapsulation AH and ESP
B7
B8
B9
B10
B11
B12
B13
B14
C
C2
C5
C6
C6.1
C6.2
C6.3
C6.4
C6.6
C6.7
C6.8
C6.9
C6.10
C7
C7.1
C7.3
C7.4
C7.5
C8
D
D1
D2
D3
D3.2
D3.3
E
E1
E1.1
E1.2
E1.3
E1.4
E1.5
E1.7
E1.8
E2
E2.1
E2.2
E2.3
E2.4
E2.5
E3
E4
E4.1
E4.2
E4.3
E4.4
E4.5
E4.6
E4.7
E5
E5.1
E5.2
E5.3
E5.4
E5.5
E6
E7
E8
E9
E9.1
E9.2
E9.3
E9.4
E9.5
E9.6
E9.7
F
F1
b. Key Exchange : Internet Key Exchange (IKE), IKEv2, Pre-Shared
Keys (PSK), Public Key Infrastructure PKI (X.509), RSA encrypted
noncesetc
c. Encryption Algorithm: DES, 3DES, AES-128/192/256
d. Authentication Algorithm: SHA1 and SHA2
e. Group: Diffie-Hellman (DH) Group 1, 2, 5
g. Different mode of communication: Tunnel mode and Transport mode
h. IPSec NAT Traversal
The router should support IPSec framework standard RFC:
a. IPSec (RFCs 2401 to 2410)
b. IPSec ESP using DES and 3DES (RFC 2406)
c. IPSec authentication header using MD5 or SHA (RFCs 2403 to 2404)
d. IKE (RFCs 2407 to 2409) and 7296
e. GDOI Group Domain of Interpretation
Router should provide basic routing feature i.e. IP Classless and default
routing
Router should provide static and dynamic routing using:
a. Static routing
b. RIP V.2 with MD5 Authentication
d. OSPF V.2 using MD5 Authentication
e. ISIS using MD5 Authentication
f. BGP V.4 using MD5 Authentication
g. Should support route redistribution between these protocols
h. Should be compliant to RFC 4760 Multiprotocol Extensions for BGP-4
(Desirable)
Router should support for policy based routing for providing different
path selection for different applications and also should support best
path selection using realtime parameters like:
a. Jitter
b. Minimum cost
c. Network path availability
d. Network Response Time
e. Packet loss
The router should re converge all dynamic routing protocol at the time of
routing update changes i.e. Non-Stop forwarding for fast re-convergence
of routing protocols
Router should connecting multiple MPLS service provider using multi
instance routing using VRF and do VRF Edge routing
Router should be capable to work as DHCP server and relay
Router should provide multicast traffic reachable using:
PIM-SM
PIM-SSM
Bi-Directional PIM
MBGP, DVMRP or equivalent
Support RFC 3618 Multicast Source Discovery Protocol (MSDP)
Support Any cast Rendezvous Point (RP) mechanism using PIM and
Multicast Source Discovery Protocol (MSDP) as defined in RFC 3446
IGMP V.1, V.2 and V.3
Availability
Router should have provisioning for connecting to dual power system
F2
F3
F3.1
F3.2
F3.3
F3.4
F4
G
G1
G1.1
G1.2
G1.3
G1.4
G1.5
G1.6
G2
G3
G3.1
G3.2
G3.3
G4
G4.1
G4.2
G5
G5.1
G5.2
G5.3
G6
G7
H
H2
H3
H4
H5
H5.1
H5.2
Router should support to dynamically discover and cope with differences
in the maximum allowable maximum transmission unit (MTU) size of the
various links along the path, using multiple interconnected for end to end
network connectivity and usability
Router should automatically failover of primary interface status change
or remote network not reachable to the secondary link connectivity using
following realtime parameters (IP SLA):
Jitter
Network path availability
Network Response Time
Packet loss
Router should provide gateway level of redundancy in Ip V.4 and IP V.6
using HSRP/VRRP & NHRP/equivalent for Dynamic VPN
Quality of Service
Router system should support 802.1P classification and marking of
packet using:
a. CoS (Class of Service)
b. DSCP (Differentiated Services Code Point)
c. Source physical interfaces
d. Source/destination IP subnet
e. Protocol types (IP/TCP/UDP)
f. Source/destination TCP/UDP ports
Router should support methods for identifying different types of traffic for
better management and resilience under network attacks
Router should support for different type of QoS features for ream time
traffic differential treatment using
Weighted Fair Queuing
Weighted Random Early Detection
Priority queuing
Router should support controlling incoming and outgoing traffic using
a. Traffic Shaping
b. Traffic Policing
Router should support for managing congested network connectivity
using:
a. TCP congestion control
b. IP Precedence
c. Ingress and Egress Rate Limiting
Router should support for packet classification and fragmentation before
applying IPSec security encryption for providing end to end QoS
treatment
Router should support hierarchical QoS for providing granular policy per
application basis for providing bandwidth provisioning and management
Security
Router should support for deploying different security for each logical
and physical interface using Port Based access control lists of Layer-2 to
Layer-4 in IP V.4 and IP V.6
Router processor and memory Protection from unnecessary or DoS
traffic by control plane protection policy
Router should support for strigent security policies based on time of day
of Layer-2 to Layer-4
Router should support for external database for AAA using:
a. TACACS+
b. RADIUS
H6
H7
H8
H9
I
I1
I2
I3
I3.1
I3.2
I4
I5
I5.1
I5.2
I5.3
I5.4
I6
I6.1
I6.2
I7
I8
I9
I10
I11
I12
J
J1
J2
J2.1
J2.2
J2.3
J2.4
J2.5
J2.6
J2.7
J2.8
Router should support dynamic inspection of ARP for the locally
connected network system
Router should support for multiple service provider using edge VRF and
IPSec traffic encryption
Router should support GRE and IPSec WAN traffic encapsulation and
encryption
The router shall support unicast RPF (uRPF) feature to block any
communications and attacks that are being sourced from Randomly
generated IP addresses.
Manageability
Router should support for embedded RMON for central NMS
management and monitoring
Router should support for sending logs to multiple centralised syslog
server for monitoring and audit trail
Router should provide remote logging for administration using:
a. Telnet
b. SSH V.2
Router should support for capturing packets for identifying application
performance using remote port mirroring for packet captures
Router should support for management and monitoring status using
different type of Industry standard NMS using:
a. SNMP V1 and V.2
b. SNMP V.3
c. Filtration of SNMP using Access list
d. SNMP MIB support for QoS
Router should support for basic administrative tools like:
a. Ping
b. Traceroute
Router should support central time server synchronisation using Network
Time Protocol NTP V.4
Router should support for collecting real-time traffic statistics for analysis
and troubleshooting using Netflow or Ipfix or equivalent
Router should support for providing granular MIB support for different
statistics of the LAN and WAN interface
Router should support for predefined and customised execution of script
for device mange for automatic and scheduled system status update for
monitoring and management
Router should provide different privileged for login in to the system for
monitoring and management
Router should support to dynamically change in configuration or
operating system by using diffent local and central tools and scripts
IPv6 features
Router should support IP V.6
Router should support for IP V.6 connectivity and routing required for
network reachability using different routing protocols such as:
a. RIP NG
b. OSPF V.3
c. BGP with IP V.6
d. IP V.6 Policy based routing
e. IP V.6 Dual Stack etc
f. IP V.6 Static Route
g. IP V.6 Default route
h. Should support route redistribution between these protocols
J3
J3.1
J3.2
J3.3
J4
J4.1
J4.2
J5
J6
J6.1
J6.2
J6.3
J7
J8
J9
J9.1
J9.2
J9.3
J9.4
J9.5
J9.6
J10
J10.1
J10.2
J10.3
J10.4
J10.5
Router should support different types of IP V6 tunnelling mechanism,
such as:
a. Automatic IPV 6 to IPV4 tunnels/IPv4 to IPv6 IP Tunnels
b. Automatic IP v4 compatible tunnels/IPv4 to IPv6 IP Tunnels
c. IPv6 over IPv4 tunnelling
Router should support different types of multicast routing in IP V.6
network using:
a. PIMv2 Sparse Mode
2. PIMv2 Source-Specific Multicast
Router should support for QoS in IP V.6 network connectivity
Router should support for monitoring and management using different
versions of SNMP in IP V.6 environment such as:
a. SNMPv1, SNMPv2c, SNMPv3
b. SNMP over IP V.6
c. RFC4292/RFC4293 MIBs for IPv6 traffic
Router should support syslog for sending system log messages to
centralised log server in IP V.6 environment
Router should support NTP to provide an accurate and consistent
timestamp over IPv6 to synchronized log collection and events
Router should support for IP V.6 different type of application usage like:
a. HTTP
b. HTTPS
c. ICMP
d. TCP/UDP
e. DNS lookup
f. DHCP
Router should support for IP V.6 different types of tools for administration
and management such as:
a. Ping
b. Traceroute
c. VTY
d. SSH
e. TFTP
Firewall
Sr.
No.
A
A1
A2
A3
A4
Features
Solution Requirement
Make and Model (Palo Alto/Checkpoint/Fortinet and Cisco Only)
Details of the proposed solution: name, version, date of release, date of
release of next version, application/product development path, etc.
Proposed solution framework should be scalable to support large scale
deployment and reduce the time and effort to deploy the entire set up.
Bidder should clearly illustrate various tools and methodologies used to
achieve the same
Please submit a list of all features provided by proposed solution in
addition to the specifications mentioned in this document, that will be
available to the bank without any additional charges and will be under
support. These features will be treated at par with other features
mentioned in the RFP.
Compliance
(Yes/No)
A5
A6
A7
A8
A9
A 10
A 11
A 12
A 13
A 14
A 15
A 16
A 17
A 18
A 19
A 20
A 21
A 22
A 23
A24
B
B1
Solution should support Firewall, Intrusion Prevention System,
Application Visibility, SSL Inspection (in & out) functions etc.
Solution should support "Stateful” policy inspection technology. It should
also have application intelligence for commonly used TCP/IP protocols,
not limited to telnet, ftp, http, https etc
Not applicable
Firewall & IPS should have Recommended rating in 2015/last released
respective Group tests of NSS
The communication between all the components of solution (firewall
module, logging & policy and Web GUI Console) should be encrypted
with SSL or PKI
Management of the entire solution including real-time monitoring, event
logs collection, policy enforcement etc should be from a single device
only (mgt server/appliance), however solution should have
management devices at both locations
Firewall should be supplied with the support for static routing and
dynamic routing with protocols, like RIP v2, OSPF, & BGP etc.
Firewall should support the multicast protocols like IGMP and PIM-DM /
PIM-SM etc
Solution should support Identity Access for Granular User/ Group,
location and machine based visibility
Solution should provide stateful failover among devices for all
components and should be completely automatic without any sort of
manual intervention
Solution should have hardened OS for both appliance and management
platform
Solution Should provide protection against various types of cyber
attacks evasive attacks, scripting attacks etc
Solution should have capability to store Logs and configuration of all
devices, centrally in the solution and should also have capability to send
logs of all devices to the generic central log collection servers
Solution should be IPV6 ready. It should have IPV6 ready logo or similar
certification from any other reputed third party. No extra cost will be
borne by bank for IPV6 implementation
Solution must support the complete STACK of IP V4 and IP V6 services
Solution should have capability to analyse the impact of any new policy
prior to making it live.
Solution should support for multiple security levels/zones like internal,
DMZ and external etc.
Independent administrative controls for all the major functions like
Firewall, IPS, SSL offloading etc should be in place. Compromise with
any component either by connecting with it physically or remotely should
not impact other components of the solution
Not applicable
Patches & updates being received from OEM should be from trusted
sites
Hardware and Interface Requirements
Each appliance of solution requires at least 6 x 10G & 2 x 1G interfaces
including ports for sync, HA and other functionalities. System should
support 4x40G for future requirement
B2
B3
Each appliance should have management interface for Out of Band
Management
B4
B5
B6
B7
B8
B9
B 10
B.10.1
B.10.2
B.10.3
B 11
B 12
B 13
B 14
C
C1
C1.1
C1.2
C1.3
C2
C3
C4
C5
D
D1
D2
D3
Each appliance should be rack mountable and support side rails if
required
Each appliance should have redundant power supplies (atleast dual)
and management system should have HDD/SSD with RAID enabled.
Each appliance should have hardware health monitoring capabilities
and should provide different parameters through SNMP
Solution should support VLAN tagging (IEEE 802.1q)
Solution should support IEEE Link Aggregation and Ethernet Bonding
functionality to group multiple ports for redundancy
Solution should Support DHCP Relay
Solution should support and not limited to:
Active-Active & Active- Failover Load Balancing: The firewall must
support Stateful active-active & Active-Failover architecture for Firewall,
VPN & IPS functions and high availability for redundancy. Appliance
failover should be complete Stateful.
Solution should provide stateful failover for Firewall and VPN
functionalities
Solution should not require any downtime/reboot for failover
Solution should have the capability of holding multiple OS images to
support resilience & easy rollbacks during the version upgrades etc
Centralized Management Solution should provide high availability at site
level for enabling DR deployment
It should be possible to manage the entire solution from Primary &
Secondary management server/appliance placed at DC and DR.
Management solution should have the capability to be deployed in
geographically different location enabling DR deployment
The firewall system should have adequate local storage in order to keep
the various logs in the event of management server connection failure
etc
Performance Requirements
Each of Appliance of Solution should be properly sized for following
given parameters, with all features enabled at the same time:
Handling minimum 10 Gbps of user traffic (Incoming 10 Gbps and
Outgoing 10 Gbps traffic simultaneously) and other application Zones.
Please change this to "Should support at least10 Gbps of real world
performance throughput (includes Firewall, Application Visibility &
IPS)"
Running all internet protocols etc, traffic flowing through different zones
in the solution with all the features enabled and running
Request you to change this to 20 million concurrent session with
AVC considering NGFW firewall and 10 Gbps real world throughput
Request you to change this to more than 1,60,000 new sessions per
second
Solution should not impact the application response by adding latency.
Maximum permissible latency of firewall is 50 mili second and for the
complete solution at each site is 100 millisecond with all the services
enabled together as asked in this RFP at any point of time
The Firewall must provide filtering capability using FQDN and URL
Network Standards/Protocols and Firewall System Requirements
Solution should support at least 250+ protocols
Solution should have a capability to support for more than 500 VLAN
Solution should support the filtering of TCP/IP based applications with
standard TCP/UDP ports or deployed with customs ports etc
D4
D 4.1
D 4.2
D 4.3
D 4.4
D 4.5
D5
D6
D 6.1
D 6.2
D7
D 7.1
D 7.2
D 7.3
D 7.4
D8
D9
D 9.1
D 9.2
D 9.3
D 9.4
D 9.5
D 10
D 11
D 12
D 13
D 14
D 14.1
D 14.2
D 14.3
Firewall Modules should support the deployment in Routed as well as
Transparent Mode & should also support following:
Solution should mask the internal network from the external world.
Multi-layer, stateful, application-inspection-based filtering should be
done
It should provide network segmentation features with powerful
capabilities that facilitate deploying security for various internal, external
and DMZ (Demilitarized Zone) sub-groups on the network, to prevent
unauthorized access
Ingress/egress filtering capability should be provided for internal,
external and DMZ (Demilitarized Zone) zones
Solution should support detection of reconnaissance attempts such as
IP address sweep, port scanning etc
Solution should provide NAT functionality, including dynamic and static
NAT translation etc
IPSec should have the functionality of PFS (perfect forward secrecy)
and NAT-T and should support:
Network Address Translation (NAT) should be configurable as 1:1, 1:
many, many: 1, many:many, flexible NAT (overlapping IP addresses).
Reverse NAT or equivalent should be supported
Port address translation/Masquerading should be provided for all
internet based applications should be supported and not limited to for
filtering like Telnet, FTP, SMTP, http, DNS, ICMP, DHCP, ARP, RPC,
SNMP, Lotus Notes, MS-Exchange etc
Solution should support integration with following standards :
X.509 Digital certificates
RSA Secure ID Certified
Two Factor Authentication
Radius/Tacacs+
Solution should support RADIUS/TACACS+ authentication protocol for
Local access to devices
Solution should support PKI with:
PKCS 7/PKCS 10/ PKCS 12 and PEM
Self-signed Certificates
External CA support
Certificate Revocation List Import
Embedded Certificate Authority
IPSec ISAKMP methods should support Diffie-Hellman Group 1 & 2,
MD5 & SHA, SHA2 , RSA & Manual Key Exchange Authentication,
3DES/AES-256 Encryption of the Key Exchange Material and
algorithms like RSA-1024 / 1536
Not applicable
Firewall system should support virtual tunnel interfaces to provision
Route-Based IPSec VPN
Dynamic Host Configuration Protocol (DHCP) over Virtual Private
Network (VPN) should be supported for dynamic allocation of IP
addresses
Solution should support to features and not limited to:
The firewall should support Internet Protocol Security (IPSec)
Key exchange with latest Internet Key Exchange (IKE), IKEv2, Public
Key Infrastructure PKI (X.509)
Site-to-site VPN tunnels: full-mesh / star topology should be supported
D 14.4
D 14.5
D 14.6
D 14.7
D 14.8
D 14.9
D 15
D 15.1
D 15.2
D 15.3
D 15.4
D 15.5
D 15.6
D 16
D 17
D 18
D 19
D 20
D 21
D 22
D 22.1
D 22.2
D 22.3
D 22.4
D 22.5
D 22.6
E
E1
E2
E3
Support
Latest
Encryption
algorithms
including
AES
128/192/256(Advanced Encryption Standards), 3DES(Data Encryption
Standard) etc
Support Latest Authentication algorithms including SHA-1(Secure Hash
Algorithm-1), SHA- 2(Secure Hash Algorithm-2) etc
IPSec NAT traversal should be supported
Not applicable
It must include the ability to establish VPNs with gateways with dynamic
public IP's
Not applicable
The Firewall must provide filtering capability that includes parameters
like source addresses, destination addresses, source and destination
port numbers, protocol type with other parameters to configure rules
based on following parameters:
Source/Destination IP/Port
Not applicable
User/group role (Integration with AD)
Customizable services
Not applicable
Combination of one or multiple of above mentioned parameter
The Firewall should be able to filter traffic even if the packets are
fragmented
It should be able to block Instant Messaging like Yahoo, MSN, ICQ,
Skype (SSL and HTTP tunnelled) etc
It should enable blocking of Peer-Peer applications, like Kazaa,
Gnutella, Bit Torrent, IRC (over HTTP) /HTTPS etc
The Firewall should support database related filtering and have support
for Oracle, MS-SQL, and SQL-Net etc
Should support CLI & GUI based access to the firewall modules
Solution should support Access for Granular user, group & machine
based visibility and policy enforcement etc
Should support basic attack protection features listed below but not
limited to :
Maximum no of protections against attacks that exploit weaknesses in
the TCP/IP protocol suite
It should enable rapid detection of network attacks
TCP reassembly for fragmented packet protection
SYN cookie protection , SYN Flood, Half Open Connections and NUL
Packets etc
Protection against IP spoofing
Malformed packet protection
IPS Feature Requirements
intrusion detection and prevention systems (IDPS), should monitor
network and/or system activities for malicious activities and identify
them, log information about the activities, attempt to block/stop it, and
report it
It should be possible to deploy the product as an Intrusion Detection
system (with logs and alerts suspected attacks) and/or as an Intrusion
Prevention System located in line and which drops packets that are
suspicious.
It should perform deep packet inspection up to layer-7 and take desired
action based on findings
E4
E5
E 5.1
E 5.2
E6
E7
E8
E9
E 10
E 11
E 12
E 13
E 14
E 15
E 16
E 17
E 18
E 19
E 20
E 21
E 22
E 23
E 24
Advanced detection techniques with stateful application & Protocol
intelligence
IPS should capture (but not limited to) the following important parameter
about attack:
Identifying Network Characteristics (IP Address Src&Dst, Port Address
Src&Dst and protocols etc)
Raw data packet, and Raw data information should be converted into
the format that is compatible with the most popular sniffers, like Wire
shark, etc. for the forensics.
A wide range of response options from logging and raising alarms to
blocking traffic should be supported.
System should have capability to turn on or off the as and when
required.
The IPS should be constantly updated with new defences against
emerging threats.
IPS updates should have an option of Automatic downloads and
scheduled updates so that it can be scheduled for specific days and time
Should have flexibility to define newly downloaded protections will be
set in Detect or Prevent mode
Solution should provide details of Performance Impact on Signatures
along with the Vulnerability severity and should have options for new
signatures for avoiding false positives
The product should have signature based as well as anomaly based
analysis and prevention facility
The IPS should provide easy updating of signatures to remain current
with latest attacks prevention
IPS Engine should support Vulnerability and Exploit signatures, Protocol
validation, Anomaly detection, Behaviour-based detection, Multielement correlation etc
IPS processes should be hardened so as to be resistant to attacks
including DoS/DDoS attacks and advance attacks from time to time.
Product should offer features that make them resistant to failure due to
advance attacks & emerging threats modes
IPS should have Resistance to Evasion and protection from anti-NIPS
techniques
IPS Profile should have an option to select or re-select specific
signatures that can be deactivated
Intrusion Prevention should have and option to add exceptions for
network and services
IPS should have the functionality of Geo Protection to Block the traffic
country wise and direction
IPS events/protection exclusion rules can be created and view packet
data directly from log entries with RAW Packets and if required can be
sent to Wire shark for the analysis
Application Intelligence should have controls for Instant Messenger,
Peer-to-Peer, Malware Traffic etc
NIPS should have facility to blocking options of File Transfer, Block
Audio, Block Video using Instant Messenger and other facility like
Application Sharing and Remote Assistance etc
IPS should have an option to create your own signatures with an open
signature language
Detailed IPS Logs to be provided post detection of attacks. The logs
should have the attack Name, the Severity, Industry Reference,
Confidence Level etc
E 25
E 26
E 27
E 28
E 29
E 30
E 31
E 32
E 33
E 34
E 35
E 36
E 37
F
F1
F2
F5
F 5.2
F6
F7
Advanced capabilities that detect and prevent attacks launched against
the Web infrastructure
Malicious code protector for Buffer Overflow, Heap overflow and other
malicious executable code attacks that target Web servers and other
applications without the need of signature
Monitor all communication for potential executable code, confirms the
presence of executable code and identifies whether the executable
code is malicious
Application layer protections for Cros site scripting, LDAP injection, SQL
Injection, Command Injection, Directory traversal, OWASP (Open Web
Application Security Project) etc
Spoofing attacks, Directory listing options and error concealment etc
attacks should be prevented
NIPS should support HTTP Protocol Inspections for HTTP format size
enforcement, ASCII-only request enforcement, ASCII-only response
header enforcement, header rejection definitions, HTTP method
definitions etc
Solution Should provide infrastructure and ways to test new
signatures/version update/OS update in SBI environment before
deploying the same in to prevention mode etc
Enforcements options with Active, Monitor-only, Disabled etc
The IPS should be able to monitor all of the major TCP/IP protocols,
including IP, Internet Control Message Protocol (ICMP), TCP, and User
Datagram Protocol (UDP). And detect latest attacks (not limited to) port
scanning, unusual packet fragmentation, SYN
The IPS should be able to inspect SSL,https,SFTP,SSHetc traffic
Should have support for frequently analyzed network layer protocols
such as IPv4, IPv6, ICMP (Internet Control Message Protocol).etc
Solution Should send notifications on a real time basis in the form of
Session Packet Log, Session Summary, E-mail, SNMP, and any other
configurable mode etc
IPS system should be capable to reconnaissance to get victimized
Administration, Management and Logging Functionality Feature
Requirements
The bidder must propose two management devices for real time
monitoring, management and log collection to manage these Firewalls.
All the logs should be retain in these 2 management devices. in case if
primary manegement device fails, complete logs should be available at
secondary management device
A centralized monitoring and management system with multiple
administrators who have administrative rights based on their roles,
should provide Audit Trail of the Changes etc
Solution should be able to support large scale WAN deployment with
following important Criteria for Real-Time Monitoring, Management &
Log Collection etc
To ensure business continuity all the solutions/hardware proposed
should be in HA
Any changes or commands issued by an authenticated user should be
logged to a database of the management system
Firewall Management system should also provide the real time health
status of all the firewall modules on the dashboard for CPU & memory
utilization, state table, total number of concurrent connections and the
connections/second counter etc
F8
F9
F 10
F 11
F 12
F 13
F 14
F 15
F 16
F 17
F 17.1
F 17.2
F 17.3
F 18
F 19
F 20
F 20.1
F 20.2
F 21
F 21.1
F 21.2
F 21.3
F 22
F 23
F 24
G
G1
G2
It should support SNMP (Simple Network Management Protocol) v 2.0
and v 3.0 and NTP V.4 with all new versions of present and future
release
Firewall must send mail or SNMP traps to Network Management
Servers (NMS) in response to system failures or threshold violations of
the health attributes.
Firewall should support the user based logging. Log levels must be
configurable based on severity
Not applicable
The Firewall must provide simplified provisioning for addition of new
firewalls where by a standard firewall policy could be pushed into the
new firewall
The Firewall administration station must provide a means for exporting
the firewall rules set and configuration
Support for role based administration of firewall
The Firewall administration software must provide a means of viewing,
filtering and managing the log data
The Firewall logs must contain information about the firewall policy rule
that triggered the log
Centralized Security Management should include for all the proposed
security controls but not limited to:
Real Time Security Monitoring
Logging
Reporting functions
The solution must provide a minimum basic statistics about the health
of the firewall and the amount of traffic traversing the firewall
Solution should support for configuration rollback
Solution should support Real time traffic statistics & Historical report with
Attacks and threat reports, etc.
Customized reports on HTML and CSV format etc
Solution Audit T rail should contain at a minimum:
The name of the administrator making the change
The change made
Time of change made
Management system should provide detailed Event analysis for Firewall
and IPS and also should provide Syslog output to integrate with other
major SIEM tools and specifically should support RSA SIEM tool current
and future versions
Solution should support for real time analysis of all traffic the firewall
may encounter (all possible SOURCE, DEST, SERVICE, including
groups) etc
Provide geographic distribution of data collection from devices,
processed locally, compressed and then transferred to the central
manager
Licensing Requirements
Solution should have enterprise license without any restrictions. If
during the contract, solution is not performing as per specifications in
this RFP, bidder has to upgrade/enhance the devices or place additional
devices and reconfigure the system without any cost to bank
Solution and its various components like Firewall, IPS, VPN etc should
not have any licensing restriction on number of users, concurrent
connections, total connections, new connections, number of vlan,
zones, number of policies, number of appliances, other network
parameters, number of equipments / servers etc
G3
G4
H1
H2
H3
H 3.1
H 3.2
H 3.3
H 3.4
H4
I1
I2
I3
I4
I5
The offered product part codes have to be General Availability Part
codes and not custom built Part Code for SBI. There should be cross
reference to the public website of the OEM
Any third party product required to achieve the functionality should be
provided with the necessary enterprise version license of
software/appliance and necessary hardware, database and other
relevent software or hardware etc should be provided with the s
URL FILTERING
The Proposed System Should have integrated Web Content Filtering
System without external solution, devices or hardware module.
The proposed solution should be able to enable or disable Web
Filtering per policy or based on firewall authenticated user, groups for
both HTTP & Https traffic
The proposed system shall provide web content filtering features:
1. Which block web plug-ins such as Active X, java applet and
cookies
2. Shall include Web URL block
3. Shall Include score based web keyword block
4. Shall include Web exempt List
The proposed system shall be able to query a real time database of
over 110 million + rated website categorised into 70+ unique content
categories.
Advance Malware Protection
Solution should be capable of blocking callbacks to CnC Servers
Solution should be capable of blocking threats based on both
signatures and behaviour
Detection rules should be based on an extensible, open language that
enables users to create their own rules, as well as to customize any
vendor-provided rules.
The solution should be capable to analysis& block TCP and UDP
protocols to identify attacks and malware communications. At a
minimum, the following protocols are supported for real-time
inspection, blocking and control of downloaded files: HTTP, SMTP,
POP3, IMAP, Netbios-ssn and FTP.
The solution should be capable of executing MS Office Documents,
Portable Documents, Archive Files, Multimedia Files and executable
binaries in a virtual sandbox environment
The solution should be capable of gathering Active Directory user
identity information, mapping IP addresses to username and passively
gathering information about network devices including but not limited
to:
● Operating system vendor
● Operating system version
● Network protocols used, e.g. IPv6, IPv4
● Network services provided, e.g. HTTPS, SSH
I6
● Open ports, e.g. TCP:80
● Client applications installed and type, e.g. Chrome - web browser
● Web applications access, e.g. Facebook, Gmail
● Risk and relevance ratings should be available for all applications
● Potential vulnerabilities
● Current User
● Device type, e.g. Bridge, Mobile device
● Files transferred by this device / user
The solution should be capable of white listing trusted applications
I7
from being inspected and not an entire segment to avoid business
applications from being affected & in turn productivity
The solution should be capable of blocking traffic based on geo
I8
locations to reduce the attack landscape and to protect communication
to unwanted destinations based on geography
The solution shall be able to detect attacks on 64-bit operating
I9
systems
The proposed solution must Detect, control access and inspect for
malware at least the following file types: Microsoft Office files,
I 10
executables, multimedia, compressed documents, Windows dump
files, pdf, jarpack, install shield.
The solution should allow real-time detection and prevention of
attacks in the following applications: Microsoft Internet Explorer,
I 11
Mozilla Firefox, Chrome, Adobe Acrobat Reader, Adobe Acrobat,
Microsoft Silverlight, Java SUN, Real Player, Microsoft Office and
Apple QuickTime.
The proposed solution must have capability to Analysis of malwares
must be performed in real-time using hybrid analysis capabilities, using
I 12
various analysis and control strategies, including simultaneously,
whether the local, remote or hybrid execution technology for the
determination of advanced malware.
The Advance Malware Protection should support retrospective alert so
I 13
that if a file turned to be malicious later on, it should provide alert and
block immediately traversing from the network
Distribution switches :


Switch must have 12 nos. of 1/10 GE SFP+ based interfaces and 4 nos. of 10 GE
SFP+ based uplink dedicated ports populated with 12 nos. of long range optics and 4
nos. of long range 10G optics respectively .
Switch should support switching capacity of 320 Gbps
Access (edge) switches:
Switch must have at least 24 nos. of multispeed 10/100/1000 Ethernet Copper
interfaces and 2 nos. of 10 GE SFP+ based uplink dedicated ports. Each of the switch
must be populated with 2 nos. of long range 10G optics.
Date of submission of Technical Bid: By 12.00 Noon on 17.07.2017 and Opening of
Technical Bid 1500 hrs on 17.07.2017
Date of Reverse auction
: Starts at 11.30 am on 20.07.2017
---------------------------------------------XXXXX---------------------------------------------------------------