FIREWALL 1455 Reply - Merged
FIREWALL 1455 Reply - Merged
e-Tenders are invited by the High Court of Madhya Pradesh for the
“Supply, Installation, Commissioning, Maintenance of Firewall, WAF with
Server Load Balancer and Network Monitoring System for the High
Court of Madhya Pradesh”. The last date of online tender submission is
14th October, 2024 before 06:00 P.M. (mandatory). The sealed tender
complete in all respect addressed to “Registrar General, High Court of
Madhya Pradesh, Jabalpur” must be submitted before 05:00 P.M. on
15th October, 2024 (mandatory). The technical bids of the tender shall
be opened online on 16th October, 2024 at 11:00 A.M. The detailed
tender document is available in the official website of the High Court of
Madhya Pradesh www.mphc.gov.in and Government e-procurement
portal www.mptenders.gov.in.
Sd/-
REGISTRAR GENERAL
HIGH COURT OF MADHYA PRADESH : JABALPUR
//TENDER//
Note: - This document contains total 59 pages including cover. No change and
modification in the document by the bidder is permissible.
2. INSTRUCTIONS TO BIDDERS 05 – 15
9. CERTIFICATES 59
All other terms and conditions for submission of tender are contained in this
document. If the date of submission/opening of the Bid is declared as holiday
then the bids shall be submitted / opened on next working day.
The Registrar General, High Court of Madhya Pradesh, Jabalpur (M.P.)
reserves the right to accept or reject any or all bids without assigning any
reason thereof.
2. INSTRUCTIONS TO BIDDERS:-
2.1 DEFINITIONS:-
a) “The Employer” or “The Purchaser” means the "Registrar General, High
Court of Madhya Pradesh, Jabalpur" and the "District Judge" of the District
Courts.
b) “The Bidder” means a firm which participates in the tender and submits
its proposal.
c) “Successful Bidder” means the Bidder, who, after the complete
evaluation process, gets the Letter of Award. The Successful Bidder shall
be deemed as “Contractor” appearing anywhere in the document.
d) “The Letter of Award” means the issue of a signed letter by the
Purchaser of its intention to award the work mentioning the total Contract
Value. The timeline for delivery of products and services will start from the
date of issue of Letter of Award.
e) “The Contract” means the agreement entered into between the Employer
and the Contractor, as recorded in the Contract Form signed by the
parties, including all attachments and appendices thereto and all
documents incorporated by reference therein.
f) “The Contractor” means the individual or firm or OEM supplying the
Goods / items and Services under this Contract.
g) “The Contract Price” means the price payable to the Successful Bidder
under the Letter of Award for the full and proper performance of its
contractual obligations. The Contract Price shall be deemed as “Contract
Value” appearing anywhere in the document.
h) “Site Acceptance Test (SAT)” is a process of testing the contracted
services provided by the Bidder at the locations specified by the Registrar
General, High Court of Madhya Pradesh. SAT comprises of Product
Acceptance Tests with respect to Technical Specifications and Bill of
Materials as specified in this tender, checking the installation,
2.2.2 The Bidder should carefully read all the instructions, terms and conditions,
specifications and various forms that are provided in the Bid Document.
The tender may be rejected if any or all of the information asked for in this
document are not furnished along with the tender or if the tender is not
responsive with the Bid Document.
3.4 Since the bidders are required to sign their bids online using class – III
Digital Signature Certificate, they are advised to obtain the same at the
earliest.
3.5 For further information regarding issue of Digital Signature Certificate, the
bidders are requested to visit website https://mptenders.gov.in/. Please
note that it may take upto 07 to 10 working days for issue of Digital
Signature Certificate. Department will not be responsible for delay in issue
of Digital Signature Certificate.
3.6 If bidder is going first time for e-tendering, then it is obligatory on the part
of bidder to fulfill all formalities such as registration, obtaining Digital
Signature Certificate etc. well in advance.
3.7 Bidders are requested to visit our e-tendering website regularly for any
clarification and / or due date extension.
3.9 Department shall not be responsible in any way for delay /difficulties
/inaccessibility of the downloading facility from the website for any reason
whatever.
3.11 Interested bidders may attend the free training programme in Bhopal at
their own cost. For further query please contact help desk.
3.12 The bidder who so ever is submitting the tender by his Digital Signature
Certificate shall invariably upload the scanned copy of the authority letter
as well as submit the copy of same in physical form with the offer of
particular tender.
3.13 The firms registered under NSIC and MSME (The vendor to be
registered with both NSIC and MSME for claiming exemption of
tender fees) are exempted for submission of tender fees only. But
they have to submit valid EMD as per the tender requirement.
6. SCOPE OF WORK:-
6.1 The Registrar General, High Court of Madhya Pradesh Jabalpur is
interested to assign the task for Supply, Installation, Commissioning,
Maintenance of Firewall, WAF with Server Load Balancer and Network
Monitoring System for the High Court of Madhya Pradesh.
6.2 SUPPLY:-
Supply of all equipments, materials, components, accessories, mounting
hardware, software, wires and cable for connection, etc. as per
requirement of High Court of Madhya Pradesh.
6.3 INSTALLATION & WIRING:-
6.3.1 Installation & wiring of all equipments, components and accessories.
Installation of all necessary software’s and drivers.
6.4 INSTALLATION PRACTICE AND METHOD OF WORK:-
6.4.1 The work shall be executed to the highest standards using best quality
material. The system design shall use state-of-the art techniques/tools.
The contractor shall ensure that the entire specification is complied with
the technical specifications. It shall be the responsibility of the contractor
to demonstrate compliance of technical as well as functional
specifications. Meeting individual requirements shall not be deemed as
meeting the overall efficient functioning of the total system.
6.4.2 The completed installation shall be subject to checks at all stages and
tests as prescribed in the bid or as deemed necessary by the Registrar
General. The same shall be done by the Purchaser and the contractor
shall be liable to rectify such defects as brought out by the Purchaser
during these checks and tests and make good all deficiencies at his own
cost.
6.5 COMPREHENSIVE WARRANTY:-
The contractor will be required to maintain the installed systems for the
period of FIVE years after the taking-over certificate / installation
certificate.
6.7.4 The various Service Level Requirements and related penalties for default
are given below:-
Parameter Details Measurement Penalties per day of
Criteria delay / per fault / per
occasion
Mean time to (i) Within 48 Calculation of (i) For High Severity
resolve working Hours fault duration events, Rs.1000/-.
(MTTR) from the call per instance (ii) For Low Severity
logging time – for based on Fault events, Rs.500/-
all High Severity Docket Delay will be counted
events in steps of one hour.
(ii) Within 72
working hours from
the time of
attending the
problem for all Low
severity events
7. TECHNICAL SPECIFICATIONS:-
(iv) The bidder has to quote only 01 product of single make / brand at a
time and not multiple brands for same item.
(v) The Original equipment manufacturer can authorize more than one
partner for participation in the bid.
“Specification – C”
Network Monitoring System
The proposed solution should be able to monitor the availability,
health and performance of physical servers, virtual servers, web
S. service (Apache), database service (MySQL & PGSQL), Network Compliance
No. devices like routers, switches, end point devices like desktop, Yes / No
Kiosks, display boards, URL monitoring, other snmp enabled
devices like UPS and AC from single dash board.
Discovery
The solution should be able to do a complete discovery of IT
environment across distributed (i.e., physical, virtual, network,
application, middleware, storage, databases) and heterogeneous
environment and provide a clear and visual mapping of IT infrastructure
1 to business services. This should be aided by 5000+ asset type
discovery signatures to detect the DC comprehensively. System should
have option for multiple options for discovery including IP address based
discovery, IP address range discovery, CSV based discovery for bulk
discovery.
Seal and Signature of the Bidder Page 43
The solution should automatically group servers that work closely
2
together based on analysis of communication between them
Discovery has to work intelligently by identifying the device in the
3 network by the given IP range and categorize into network devices and
servers with vendor and model details.
The solution should automatically build visualizations that shows
dependency between switches, routers, physical/virtual host,
Containers, storages, cluster software, business applications and other
4
entities. It should also have the capability to detect applications that
span from Datacenter and end in a public or a private cloud with
interconnects between them.
The discovery data should be fully auditable as to where it came from
5
and what the method to retrieve that data was.
The solution should show exactly how the discovery data is obtained
6 (i.e., Audit trail and mechanism to validate the quality of data
discovered)
The Discovery solution should come with real-time dashboards that
collate and present data that allows organizations to make decision on
7
consolidation, re-use of infrastructure, detecting infrastructure that has
never been used etc.
The solution should be able to automatically detect software’s that are
end of support, end of extended support and end of life. With respect to
OS , it should detect End of support and End of life as well. On Security
, It should be able to find the patches installed on servers along with
8
reports on vulnerable ports. . Lastly, it should integrate with a
vulnerability management solution to detect blind spots in security of
nodes missed out in vulnerability management that are found to be
active in discovery.
The discovery solution should have the ability to capture and report on
9
infrastructure drift in datacenter.
The solution should be able to do Virtual systems discovery (including
Microsoft Hyper-V, vmware, etc.) Furthermore, it should support
10 discovery of modern day DevOps platforms such as containers such as
Docker, Runc, AIX WPARs and management solutions such as
Kubernetes, Docker Swarm, Cloud Foundry and Open Shift.
Discovers in-depth configuration data for storage systems, pools,
11
volumes, disks drives, LUNS, File Systems
It should be possible to initiate complete discovery of an application and
connected components from anywhere in the tree. Therefore it should
12
support top down, bottom up and start anywhere discovery from any
node of the application.
The report of inventory of discovered devices should be available to
13
export in .csv format.
Automatically learn IP Networks and their segments, LANs, hosts,
14 switches, routers, firewalls etc. and to establish the connections and to
correlate
15 Provides provision to draw & map user specific network diagram
47 The solution should provide hardware health information for the storage
array.
48 The solution should show statistics like Total IO/sec, service time, IO
response time, queue length etc.
49 The solution should show storage growth rates and project when the
storage capacity will be reached
The solution should be able to analyze the data coming from Dell EMC
and Hitachi disk arrays, including:
- Storage units, Extent pools, Ranks, Storage volume.
- File Systems: Available and consumed capacity, list of CIFS shared,
list of NFS exports, number of operations, data traffic, and so on.
- Physical Disks: Disk time utilization, number of operations, presence,
50
traffic, response time, status, and so on.
- Storage Pools: Subscribed and consumed capacity, over subscription
operation, number of operations, data traffic, and so on.
- Storage Systems: Available and subscribed capacity, number of
operations, number of ports, number of operations, data traffic, status,
and so on.
Note:-
1. The specifications mentioned in tender document are minimum and the vendor can
quote higher specifications items.
2. All the network points’ connectivity shall be provided by respective High Court / offices;
however the vendor has to cooperate for completion of the said task / project.
3. All the pages of the bids and Annexure’s are to be sealed and signed by the authorized
officers of the company / vendor.
4. The bidder has to quote only 01 product of single make / brand at a time and not
multiple brands for same item.
5. The Original equipment manufacturer may authorize more than one partner for
participation in the bid.
6. Back-to-Back support letter is to be submitted by OEM regarding support of the
quoted products for the period of five years on their letter head duly sealed and
signed by authorized representative.
Seal and Signature of the Bidder Page 49
Section – VIII
Sales /
Service Total Unit
Tax Price (All
Unit GST (Rs.) inclusive) Total
S. Make Number of
Item Description Price Applicable as with 05 onsite Cost
No. and items
(Rs.) (Rs.) applicable warranty for (Rs.)
Model
any other items
duties / (Rs.)
taxes
09 =
01 02 03 04 05 06 07 08
08x07
Firewall Technical
01 Specifications 02
Specification – A
Web Application
Firewall with
02 Server Load 02
Balancer
Specification – B
Network
Monitoring System Lump
03
sum
Specification – C
Note:- The financial bids are to be submitted online and no hard sheet/ copy is to be submitted along
with the bid. The items may be considered on line item basis.
__________ (Location)
__________ (Date)
Ref.: ________________
Dear Sir/Madam,
Yours Sincerely,
__________ (Location)
__________ (Date)
Yours Sincerely,
(Signature of Authorized Signatory)
Name and Designation of the Authorized Signatory:
Name and address of the Bidder Company:
Seal:
Sl.
Clause no. Complied / Not complied
No.
The Bidder is required to provide the details of the deviations of the tender
clauses (in any section of the tender) in the following format.
The Bidder has to submit their queries (in any section of the tender/ technical
speculations) in the following format only.
Note: - Submit the pre-bid query as mentioned in the above format till
12.09.2024 through e-mail: regithcjbp@mp.gov.in. The pre-bid
query received after dated 12.09.2024 may not be considered.
To,
Respected Sir,
Witness .........................................
WE CERTIFY THAT:-
1. We will not LEAK / DISCLOSE any information of High Court of Madhya
Pradesh to any other institutions/organizations, bodies and also in the
market on the rates less than the prices quoted by us to the High Court.
2. The rate of TAXES / DUTIES mentioned in the tender is in accordance
with the provisions of the rules in all respects and the same is payable to
the Authorities.
3. The material / items and software offered shall be of the best quality
strictly in accordance with the specifications and particulars as detailed in
the tender.
4. The information furnished by us in the tender are true and correct to the
best of our knowledge and belief.
5. We have read and understood the rules, regulations, terms and conditions
of tender as applicable from time to time and agree to abide by them.
6. We will meet 100% Confidentiality and Integrity of High Court Database
and software.
Authorized Signatory
(Seal of the Company)
// CLARIFICATION //
Similar works
means: Supply,
installation and
System
Integration of
firewall, WAF,
NMS tool and
similar IT
equipments. .
2. M/s Check Point Software Technologies(I) Pvt. Ltd.
1 Section – 6 X 10G Please change to: "8 X 1G Please refer the
VII/Specific Copper/RJ45 Copper/RJ45 Day 1". revised
ations – Day 1 Justification: We support 1G specifications
A/3- Copper/RJ45 ports as is the industry given below.
Interface norm. 10G RJ45 ports are rarely used
and & in this context point to a specific
Connectivity OEM.
Requiremen
t /Page-32
2 Section – 8 X 1/10G Please change to: "4 X 1/10G Please refer the
VII/Specific SFP/SFP+ Day SFP/SFP+ Day 1 with 10G LR/SM revised
ations – 1 with LR/SM transceivers and 8x3m patch cords." specifications
Page 2 of 174
A/3- transceivers and Justification: Our appliance given below.
Interface 8x3m patch supports 4 Fiber ports which should
and cords. be sufficient for the customer needs
Connectivity for present & future & hence should
Requiremen be allowed for wider participation
t/Page-32
3 Section – 4X 10/25Gig Please change to: "2X 40/100G Please refer the
VII/Specific SFP28 Ports QSFP28 Ports with 2 nos. of LR revised
ations – with 4 nos. of LR transceivers and 4x3m patch cords specifications
A/3- transceivers and from Day one" given below.
Interface 4x3m patch Justification: As discussed in pre bid
and cords from Day meeting its better to invest in
Connectivity one 40G/100G ports from a future
Requiremen scalability perspective rather than
t/Page-32 25G. As 10G porsa are already
provide above, need to change this
clause into 40G/100G port.
4 Section – Minimum 2 x Please change to: "Minimum 1 x 1G Please refer the
VII/Specific 10G HA port in RJ45 HA port in addition to requested revised
ations – addition to data ports, Dedicated 1 X specifications
A/3- requested data 10/100/1000 RJ45 Management Port" given below.
Interface ports, Dedicated Justification: 1 HA port is required
and 1 X 10/100/1000 for this purpose-2nd port is
Connectivity RJ45 redundant. Hence please allow the
Requiremen Management change required for wider
t/Page-32 Port Participation.
5 Section – Should have Justification: Please remove this Yes removed.
VII/Specific support clause as 40G/100G ports can be
ations – 2x40/100G for provided against 10/25G ports as
A/3- future use. mentioned above. While our
Interface appliance supports 2x40/100G, one
and set of 10/25 card needs to be
Connectivity replaced. This future requirement
Requiremen blocks our participation & hence
t/Page-32 request to allow changes.
6 Section – The firewall Please change to "The firewall Please refer the
VII/Specific should have should have integrated redundant fan revised
ations – integrated and dual redundant power supply to specifications
A/4- redundant fan remove any single point of failure in given below.
Hardware and dual the solution".
Architecture redundant hot Justification: Hot swap feature not
/Page-32 swappable available on this category of Firewalls
power supply to in our portfolio. Please remove for
remove any participation
single point of
failure in the
solution
7 Section – The NGFW Please change to "The NGFW No change.
VII/Specific throughput of the throughput of the firewall should be a
ations – firewall should minimum 30 Gbps with application
A/5- be a minimum identification and firewalling enabled
Page 3 of 174
Performan 20 Gbps with with real world/enterprise/ production
ce& application traffic with logging enabled. The
Scalability identification and Threat Prevention/NGIPS throughput
/Page-32 firewalling after enabling IPS, AVC, antimalware,
enabled with real sandboxing with logging enabled
world/enterprise/ should be 11 Gbps."
production traffic Justification: Higher no of NGFW
with logging throughout is must to ensure higher
enabled. The IPS performance whereas minor
Threat change is needed in Threat
Prevention/NGIP Prevention throughput for wider
S throughput participation.
after enabling
IPS, AVC,
antimalware,
sandboxing with
logging enabled
should be 12
Gbps.
8 Section –VII NGFW Firewall Please change to: "NGFW Firewall No change.
/Specificatio should support should support at least 1,400,000
ns – A /5- at least Layer 7 Concurrent sessions
Performan 1400,000 Layer /connections"
ce& 7 Concurrent Justification: Checkpoint Firewalls
Scalability sessions are tested for performance in terms of
/Page-32 the number of concurrent connections
which are accessing instead of the
sessions. Request to include both
sessions/connections to allow
participation.
9 Section – Firewall should Please change to: "Firewall should Please refer the
VII/Specific support creating support creating security policies with revised
ations – security policies source/destination zones, network specifications
A/6-Next with source subnets/ranges, geo location objects, given below.
Gen /destination ports/protocols, applications, user
Firewall zones, network /group attributes, URL/URL
Features/Pa subnets/ranges, categories and actions on traffic. The
ge-33 and relocation actions on the traffic should be to
objects, ports accept, drop, ask, inform, reject, user
/protocols, auth, client auth. The firewall should
applications, provide time based polices with
user /group options for recurring schedule or one
attributes, URL time schedule."
/URL categories Justification: What are relocation
and actions on objects? It seems to be an OEM
traffic. The specific term- Can we change it to
actions on the geo location objects? Also, for
traffic should be actions, we support accept, drop, ask,
to allow, alert, inform, reject, user auth and client
block, block and auth options which provide the same
continue, reset. functionality but have different
Page 4 of 174
The firewall terminology. Please allow both set of
should provide terms for wider participation
time based
polices with
options for
recurring
schedule or one
time schedule.
10 Section – The firewall Please change to: "The firewall Please refer the
VII should supports should supports NAT's like source revised
/Specificatio NAT's like NAT, destination NAT , U-Turn specifications
ns – A /6- source NAT, /Hairpin/Loopback NAT. Firewall given below.
Next Gen destination NAT, should support Nat66, Nat 64 or
Firewall U-Turn NAT. Nat46 functionality".
Features Firewall should Justification: Please note that U-
/Page-33 support Nat66, Turn NAT is an OEM specific
Nat 64 or Nat46 terminology, which is also known as
functionality Hairpin NAT and Loopback NAT used
by other OEMs, providing same
functionality. Request to change to U-
Turn/Hairpin/Loopback to allow
participation.
11 Section –VII Should support Please change to: "Should support Please refer the
/Specificatio capability to capability to create multiple virtual revised
ns – A /6- create multiple context/instances" specifications
Next Gen virtual context Justification: In providing strict given below.
Firewall /instances with hardware resource reservations, it is
Features strict hardware not a recommended architecture.
/Page-33 resource (CPU, Instead, system architecture should
Memory & be flexible enough to manage any
Storage) increase or decrease in load and
reservation and efficiently utilize hardware resources.
ensure traffic Hence request to change the specs
isolation as suggested.
between virtual
context /instance
12 Section –VII The solution Please change to: "The solution Please refer the
/Specificatio should be able should be able to provide contextual revised
ns – A /6- to provide information about the hosts and the specifications
Next Gen contextual network subnets present such that given below.
Firewall information the admins are able to capture all the
Features/Pa about the hosts required information and build the
ge-33 and the network security profiles based on the details
subnets present shown on the solution. The details
such that the captured should consist of the
admins are able following: IOC’s, IP address,
to capture all the Applications, Ports & protocols,
required vulnerabilities etc."
information and Justification: While the solution
build the security provides detailed information about
profiles based the hosts and network subnets,
Page 5 of 174
on the details capturing IOC's, IP address,
shown on the applications, ports and protocols,
solution. The vulnerabilities, it is not recommended
details captured to capture MAC addresses as it is a
should consist of legacy way of managing security.
the following: Request to remove the same.
IOC’s, MAC
addresses, IP
address,
Applications,
Ports &
protocols,
vulnerabilities
etc.
13 Section – Should support Please change to: "Should support Please refer the
VII/Specific more than more than 15,000 (excluding custom revised
ations – 19,000 signatures) IPS signatures or more. specifications
A/6-Next (excluding Solution should be able to passively given below.
Gen custom detect endpoints and infrastructure
Firewall signatures) IPS for threat correlation and Indicators of
Features/Pa signatures or Compromise (IoC) intelligence. The
ge-33 more. Solution signatures should also have
should be able categorization based on MITRE
to passively TTP's.
detect endpoints Justification: Checkpoint supports
and more than 15000 IPS signatures
infrastructure for which is more than enough to combat
threat correlation known threats.
and Indicators of
Compromise
(IoC)
intelligence. The
signatures
should also have
categorization
based on MITRE
TTP's.
14 Section – The Please change to: "The solution
solution Optional.
VII/Specific should provide should provide traffic hit count, and
ations – traffic hit count,
policy warning for streamlining
A/6-Next Rule Conflict
firewall policies."
Gen Detection Justification: Rule Conflict Detection
Firewall (Redundant &
(Redundant & Shadowed) can
Features/Pa Shadowed) and currently be achieved through an
ge-34 policy warning
external dedicated solution like
for streamlining
alogsec. For Check Point this feature
firewall policies.
is in roadmap and expected as part of
R82 release.
15 Section – Should support Please change to "Should support Please refer the
VII/Specific the capability of the capability of providing network- revised
ations – providing based detection of malware by specifications
Page 6 of 174
A/8-Anti- network-based checking the disposition of unknown given below.
APT / detection of files using SHA-256 file-hash or
Malware malware by signature as they transit the network
Features/Pa checking the and capability to do dynamic
ge-35 disposition of analysis."
unknown files Justification: While we support this
using SHA-256 feature, putting a no on the timelines
file-hash or may not always hold true as it may
signature vary on the file size, bandwidth etc.,
(update to be hence request to retain the feature
provided in 300 without time constraint
seconds) as they
transit the
network and
capability to do
dynamic
analysis.
16 Section – The Solution Please change to: "The Solution Please refer the
VII/Specific should support should support DNS security. revised
ations – DNS security in Necessary licenses to be included specifications
A/11-DNS line mode and from day 1. given below.
Security/Pa not proxy mode. Justification: DNS security inline
ge-36 Necessary mode is specific to a particular OEM.
licenses to be Request to remove to allow
included from participation.
day 1.
17 Section – The solution Please change to "The solution Yes changed.
VII/Specific should have should have capabilities to neutralize
ations – capabilities to DNS tunneling".
A/11-DNS neutralize DNS Justification: What is the meaning of
Security/Pa tunneling and it blocking the parent domain for all
ge-37 should customers? The second part is not
automatically technically clear. Hence either
stop with the elaborate the use case or remove the
combination of second part for participation
policy on the
next-generation
firewall and
blocking the
parent domain
for all
customers.
18 Section – Integrated Traffic Please change to "Integrated Traffic Please refer the
VII/Specific Shaping Shaping functionality for outbound revised
ations – functionality for traffic" specifications
A/12- both inbound Justification: We do outbound, not given below.
SD_WAN/P and outbound inbound currently-hence needed for
age-37 traffic. participation
3. M/s DRS IT Consultancy Private Limited
1 Web Traffic Ports Traffic Ports support: As per the Please refer the
Application support: 4x10 present data centre/It infra revised
Page 7 of 174
Firewall GE Fiber, 4x1G requirement standard, 10G ports are specifications
with Server GE Fiber and recommended over 1G, As 10G is given below.
Load 4x1G Copper backward-compatible with 1G where
Balancer/Po Port from day-1. as vies-versa is not possible. And for
int 2/Page Additionally ADC/WAF/SLB deployment 8 x 10G
no.39 should have 8 x is more than sufficient because asked
1GE Fiber for throughput is 40G.please amending
future use this clause.
(Break-Out Layer 4 connections per second:
should not be Considering the asked Concurrent
used). All Connections and Layer 4 connections
transceivers per second requirement is lower side.
(SM) from day1. Please amend this clause.
Device L4 Layer 7 requests per second:
Throughput: 20 Considering the asked Concurrent
Gbps and Connections and Layer 7 requests
scalable upto 40 per second requirement is lower side.
Gbps Layer 7 Please amend this clause.
requests per It is suggested to amend the clause
second: as :
1300,000 Layer Traffic Ports support: 8 x 10 GE
4 connection per SFP+ from day-1 Device L4
second: 500,000 Throughput: 20 Gbps and scalable up
Concurrent to 40 Gbps
Connection: 38 Layer 7 requests per second: 5
Million RSA CPS million
(2K Key): 20,000 Layer 4 connections per second: 3
ECC CPS (EC- Million SA CPS (2K Key): 20,000
P256): 12,000 ECC CPS (EC-P256): 12,000 with
with TLS1.3 TLS1.3 Support Processor: Intel 12-
Support core CPU or equivalent or better
Processor: Intel Concurrent Connections: 40 Million
12-core CPU, Processor - Intel 12-core CPU, 64GB
64GB RAM, RAM, minimum 480GB SSD Disk and
minimum 480GB dual power supply.
SSD Disk and The appliance should have 1 x
dual power 1G RJ45 Management Port and
supply. The 1G RJ45 Console port.
appliance
should have 1 x
1G RJ45
Management
Port and 1G
RJ45 Console
port.
2 Web The proposed ap Different OEM has different Please refer the
Application pliance should s terminology and technique to achieve revised
Firewall upport the below similar function. We would like to specifications
with Server metrics: request the honorable tendering given below.
Load committee to use vendor agnostic
Balancer/Po — Minimum terminology for wider participation.
Page 8 of 174
int 6/Page Misses, — Minimum Misses,
no.40 — Hash, — Hash,
— Persistent — Persistent Hash,
Hash, — Tunable Hash/Equivalent
— Tunable — Weighted Hash/Equivalent
Hash, — Least Connections,
— Weighted — Least Connections Per Service,
Hash, — Round-Robin,
— Least — Response Time,
Connections, — Bandwidth, etc
— Least
Connections Per
Service,
— Round-Robin,
— Response
Time,
— Bandwidth,
etc
3 Web Following Load Virtual Matrix Architecture feature is Please refer the
Application Balancing specific to one ADC OEM. Kindly revised
Firewall Topologies remove this clause for wider specifications
with Server should be participation and for other points given below.
Load supported: please allow similar or equivalent
Balancer/Po • Virtual Matrix feature metrics for broader
int 7/Page Architecture participation.
no.40 • Client Network Following Load Balancing Topologies
Address should be supported:
Translation • Client Network Address Translation
(Proxy IP) (Proxy IP) /Equivalent
• Mapping Ports • Mapping Ports /Equivalent
• Direct Server • Direct Server Return /Equivalent
Return • One Arm Topology Application
• One Arm /Equivalent
Topology • Direct Access Mode /Equivalent
Application • Assigning Multiple IP Addresses
• Direct Access /Equivalent
Mode • Immediate and Delayed Binding
• Assigning /Equivalent
Multiple IP
Addresses
• Immediate and
Delayed Binding
4 Web The proposed For wider participation, We would like Please refer the
Application appliance/softwa to request the honorable tendering revised
Firewall re should be committee to amend the clause as specifications
with Server EAL2 certified. requested. given below.
Load "The proposed appliance/software
Balancer/Po should be EAL2 certified/Make in
int 31/Page India"
no.43
5 Web Capable of In order to switch over the Please refer the
Page 9 of 174
Application handling applications traffic like web app, email revised
Firewall complete Full app etc. the GSLB solution must specifications
with Server DNS bind understand all types of DNS records given below.
Load records including and not just A or AAAA. Kindly add
Balancer/Po A, AAAA, etc. for following functionality for complete
int 34/Page IPv4/IPv6 Solution. It is suggested to amend
no.43 this clause as :-
The Proposed Solution must have
Global Server Load Balancing and
should be able to host SRV Records,
AAAA Records, A , PTR , MX ,TXT
,SOA, NS, Dname, Dmarc Records
and should also support DNSSEC.
6 Web Application load IPS is completely different technology Please refer the
Application balance with even deployment is different. Kindly revised
Firewall functionality of remove the IPS feature in the specifications
with Server Application specifications s for the wider given below.
Load delivery features participations of OEM. It is suggested
Balancer/Po , to amend the clause as "Application
int 44 Antivirus, IP load balance with functionality of
a/Page Reputation, IPS, Application delivery features,
no.44 WAF Security, Antivirus, IP Reputation, WAF
Credential Security, Credential Stuffing Defense,
Stuffing Zero day prevention, DLP, Analytics,
Defense, Bot protection, logs, High Availability
Zero day and reporting from day 1. OEM
prevention , DLP should be present in India from at
, Analytics, Bot least 5 years and Proposed solution
protection ,logs, should support 24x7x365 OEM TAC
High Availability support and advance Next Business
and reporting Day Hardware replacement. The
from day 1. OEM proposed equipments must come
should be with 5 year warranty and onsite
present in India support. Installation, basic
from at least 5 configuration (at least 2 domains),
years and and six days of training on essential
Proposed aspects of the WAF/ADC for the IT
solution should team of the High Court of M.P.,
support Jabalpur. The WAF/ADC should
24x7x365 OEM support to store all log of minimum
TAC support 8months period on external storage
and advance such as NAS/SAN. The required
Next Business external storage (Hitachi VSP E590H
Day Hardware through) will be provided by High
replacement. Court of M.P"
The proposed
equipments
must come with
5 year warranty
and onsite
support.
Page 10 of 174
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum 8
months period
on external
storage such as
NAS/SAN. The
required external
storage (Hitachi
VSP E590H
through) will be
provided by High
Court of M.P.
4. M/s Everest IMS Technologies Private Limited
1 Section –VII The solution Request you to modify the OEM Please refer the
Clause No- should specific clause as: revised
7. Technical automatically The solution should automatically specifications
Specificatio group servers /Manually group servers that work given below.
ns s that work closely closely together based on analysis of
Specificatio together based communication between them
ns – C” on analysis of
Network communication
Monitoring between them
System
Page No.-
44
2 Section –VII The solution The required features is not the Please refer the
Clause No- should standard ask of EMS module and to revised
7. Technical automatically achieve this solution dedicated APM specifications
Specificatio build tool will be required so we request given below.
ns s visualizations you to remove this clause for wider
Specificatio that show participate
ns – C” dependency
Network between
Monitoring switches,
System routers,
Page No.- physical/virtual
Page 11 of 174
44 host, Containers,
storages, cluster
software,
business
applications and
other entities. It
should also have
the capability to
detect
applications that
span from
Datacenter and
end in a public
or a private
cloud with
interconnects
between them.
3 Section –VII The solution Request you to modify the specific Please refer the
Clause No- should be able clause as: revised
7. Technical to automatically The solution should be able to specifications
Specificatio detect software’s automatically /manually detect given below.
ns s that are end of software’s that are end of support,
Specificatio support, end of end of extended support and end of
ns – C” extended life. With respect to OS, it should
Network support and end detect End of support and End of life
Monitoring of life. With as well. On Security, It should be able
System respect to OS, it to find the patches installed on
Page No.- should detect servers along with reports on
44 End of support vulnerable ports. .Lastly, it should
and End of life integrate with a vulnerability
as well. On management solution to detect blind
Security, It spots in security of nodes missed out
should be able in vulnerability management that are
to find the found to be active in discovery.
patches installed
on servers along As multiple software does not provide
with reports on the required data on any standard
vulnerable ports. protocol so please modify the clause
.Lastly, it should as suggested
integrate with a
vulnerability
management
solution to detect
blind spots in
security of nodes
missed out in
vulnerability
management
that are found to
be active in
discovery.
Page 12 of 174
4 Section –VII Solution offers Request you to provide more details Please refer the
Clause No- multiple on the software/application from revised
7. Technical integration which EMS application need to specifications
Specificatio methods which integrate given below.
ns s can be used by
Specificatio customers for
ns – C” integrating their
Network own systems.
Monitoring Integration
System should provide
Page No.- the option in
45 both north as
well as south
bound
integration using
multiple options
like RestAPI,
XML, SOAP, etc.
on each module
level. Any fault
details should be
able to send to
third party CRM,
Customer Portal,
UNMS or even
EMS if needed
using the Trap,
XML
5 Section –VII The solution As per our understanding here need Please refer the
Clause No- should be able to monitor the latency of all the nodes revised
7. Technical to track from application server, please clarify specifications
Specificatio connectivity given below.
ns s between network
Specificatio endpoints and
ns – C” display the delay
Network between nodes
Monitoring
System
Page No.-
45
6 Section –VII Configurations: The required features is not the Please refer the
Clause No- create rules that standard ask of NMS solution and revised
7. Technical automatically can be achieved via ITSM solution, specifications
Specificatio assign deadlines so please confirm here whether new given below.
ns s to events based ITSM need to propose here or NMS
Specificatio on their impact will be integrated with existing
ns – C” on services or running ITSM solution.
Network on end-users, If Existing please provide OEM and
Monitoring create rules that version details of the ITSM solution.
System perform
Page No.- automated
Page 13 of 174
48 assignment of
events to the
corresponding
teams, create
rules that control
automated
notification of
interested
stakeholders
about events ,
automatically
handling
duplicate events,
provide event
correlation
capabilities to
combine a set of
different events
into one major
event
7 Section –VII It should be The required features is not the Please refer the
Clause No- possible to standard ask of EMS module and to revised
7. Technical initiate complete achieve this solution dedicated APM specifications
Specificatio discovery of an tool will be required so we request given below.
ns s application and you to remove this clause for wider
Specificatio connected participate.
ns – C” components
Network from anywhere
Monitoring in the tree.
System Therefore it
Page No.- should support
44 top down,
bottom up and
start anywhere
discovery from
any
node of the
application.
8 Additional Request you to please provide the Please refer the
required details of the IT revised
Infrastructure which will be monitored specifications
in NMS solution given below.
1) No. of servers:
i) Physical Server ii) VMs
iii) Physical server on which
virtualization platform running.
2) No. & Make Of Network devices
i) Router/Switches /Firewall
ii) Wireless Controller /Wi-Fi AP
iii) Storage
3) No. & Name Of Applications
Page 14 of 174
4) No. Of containers.
Or any other IP devices
5. M/s F5 Networks
1 “Specificatio 2. Traffic Ports Server load Balancer and WAF will
ns – B” support: 4 x 10 deploy for Application Security.
Web GE Fiber, 4 x 1G Application resides on Servers which
Application GE Fiber and 4 x are connected on 10gig fiber ports
Firewall 1G Copper Port with Server Farm switch. Asking 1gig
with Server from day-1. ports in Server load balancer is
Load Additionally creating a bottleneck in high speed
Balancer should have 8 x server farm connectivity. In today’s
Page no.39 1GE Fiber for deployments no data center is using
future use and connecting on 1gig copper or
(Break-Out fiber connectivity. Kindly consider
should not be 10gig or 25gig connectivity for using
used). All proposed solution for next 5-7 years.
transceivers Kindly modify clause as" Traffic Ports
(SM) from day1. support: 4 x 10 GE/25Gig Fiber and 4
x 1G/10gig Copper Port from day-1.
All transceivers (multimode) from
day1. 10gig interface should upgrade
to 25Gig speed by changing
transceivers only in future."
2 “Specificatio 6. The proposed Kindly allow Equivalent feature for Please refer the
ns – B” appliance should other reputed OEM's to participate. revised
Web support the specifications
Application below metrics: Kindly modify clause as" 6. The given below.
Firewall — Minimum proposed appliance should support
with Server Misses, the below metrics:
Load — Hash, — Minimum Misses,
Balancer — Persistent — Hash,
Page no.39 Hash, — Persistent Hash or Equivalent,
— Tunable — Tunable Hash or Equivalent,
Hash, — Weighted Hash or Equivalent,
— Weighted — Least Connections,
Hash, — Least Connections Per Service,
— Least — Round-Robin,
Connections, — Response Time,
— Least — Bandwidth, etc"
Connections Per
Service, —
Round-Robin,
— Response
Time, —
Bandwidth, etc
3 “Specificatio 7. Following Kindly allow Equivalent feature for Please refer the
ns – B” Load Balancing other reputed OEM's to participate. revised
Web Topologies Kindly modify clause as" 7. Following specifications
Application should be Load Balancing Topologies should be given below.
Firewall supported: supported:
with Server • Virtual Matrix • Virtual Matrix Architecture or
Page 15 of 174
Load Architecture Equivalent
Balancer • Client Network • Client Network Address Translation
Page no.39 Address (Proxy IP)
Translation • Mapping Ports or Equivalent
(Proxy IP) • • Direct Server Return
Mapping Ports • One Arm Topology Application
• Direct Server • Direct Access Mode
Return • Assigning Multiple IP Addresses
• One Arm • Immediate and Delayed Binding"
Topology
Application
• Direct Access
Mode
• Assigning
Multiple IP
Addresses
• Immediate and
Delayed Binding
4 “Specificatio 8. The proposed Appliance asked with 64GB RAMS. If Please refer the
ns – B” device should we create 4 x virtualized environment revised
Web have Hypervisor with minimum 16GB RAM only 4 specifications
Application (should not use virtual tenants can be created. given below.
Firewall Open Source)
with Server Based Kindly modify the clause, so reputed
Load Virtualization OEM's can participate" 8. The
Balancer feature (NO proposed device should have
Page no.40 Multi-Tenancy) Hypervisor (should not use Open
that virtualizes Source) Based Virtualization feature
the Device or Multi-Tenancy that virtualizes the
resources— Device resources—including CPU,
including CPU, memory, network, and acceleration
memory, resources. It should NOT use Open
network, and Source/3rd party Network Functions.
acceleration The proposed appliance should have
resources. It capability to run in Virtualized as well
should NOT use as Standalone mode (Bidder may be
Open Source asked to demonstrate this feature
/3rd party during Technical Evaluation). Should
Network be high performance purpose built
Functions. The next generation multi-tenant (min. 2
proposed virtual instances from Day 1 and
appliance should scalable upto 4 Virtual Instances)
have capability hardware. Platform must have
to run in multiple functions including Advance
Virtualized as application load balancing and global
well as server load balancing, Network
Standalone security functionality and complete
mode (Bidder application protection functionality.
may be asked to Each Virtual Instance contains a
demonstrate this complete and separated environment
feature during of the Following:
Page 16 of 174
Technical a) Resources, b) Configurations, c)
Evaluation). Management, d) Operating System"
Should be high
performance
purpose built
next generation
multi-tenant
(min. 5 virtual
instances from
Day 1 and
scalable upto 10
Virtual
Instances)
hardware.
Platform must
have multiple
functions
including
Advance
application load
balancing and
global server
load balancing,
Network security
functionality and
complete
application
protection
functionality.
Each Virtual
Instance
contains a
complete and
separated
environment of
the Following:
a) Resources, b)
Configurations,
c) Management,
d) Operating
System
5 “Specificatio 18. The "As far as we know, ICSA Labs is Please refer the
ns –B” Web proposed out of business. Few OEM's might revised
Application Solution should have older reports, but they likely specifications
Firewall have ICSA won’t be able to renew it. given below.
with Server Certified and Also Wikipedia mentions it:
Load PCI Compliant https://en.wikipedia.org/wiki/Internatio
Balancer WAF on the nal_Computer_Security_Association
Page no.41 same Hardware “ICSA Labs ceased operation in
from the same 2022, following closure by its parent
OEM. It must be company Verizon”.
Page 17 of 174
able to handle Also their website is down:
OWASP Top 10 https://www.icsalabs.com/"" ""Kindly
attacks and remove the ICSA certified as it no
WASC Web longer applies on new products."
Security Attack Kindly modify clause as “18. The
Classification. proposed Solution should be
mentioned in Secure IQ
/Koppengiercole report for WAF
Solution and PCI Compliant WAF on
the same Hardware from the same
OEM. It must be able to handle
OWASP Top 10 attacks with OWASP
Dashboard and WASC Web Security
Attack Classification."
6 “Specificatio 25. Auto Policy Kindly allow Equivalent feature for Please refer the
ns –B” Web Optimization other reputed OEM's to participate. revised
Application • Known Types Kindly modify clause as" 25. Auto specifications
Firewall of Attack Policy Optimization given below.
with Server Protection - • Known Types of Attack Protection -
Load Rapid Mode Rapid Mode or Equivalent
Balancer • Zero Day • Zero Day Attack Blocking -
Page no.41 Attack Blocking - Extended Mode or Equivalent
Extended Mode • Working in Learn Mode
• Working in • Auto Discovery"
Learn Mode
• Auto Discovery
7 “Specificatio 31 The proposed "EAL2 is now known as network Please refer the
ns –B” Web appliance/softwa device collaborative protection profile. revised
Application re should be A collaborative Protection Profile specifications
Firewall EAL2 certified. (cPP), developed and maintained in given below.
with Server accordance with CCRA Annex K, with
Load assurance activities selected from
Balancer Evaluation Assurance Levels up to
Page no.42 and including level 4 and ALC_FLR,
developed through an International
Technical Community endorsed by
the Management Committee;
https://commoncriteriaportal.org/prod
ucts/index.cfm
Kindly modify clause as"" 31. The
proposed appliance/software should
be EAL2/NDPP certified."
8 “Specificatio 33 Global loads Kindly modify clause to include DNS Please refer the
ns –B” Web balancing should /GSLB license from day one as" 33 revised
Application support advance Global load balancing should support specifications
Firewall functions advance functions Authoritative name given below.
with Server Authoritative sever, DNS proxy, DNS NAT, full
Load name sever, DNS server with DNS Sec, DNS
Balancer DNS proxy/DNS DDOS, application load balancing
Page no.42 NAT/ full DNS from day one with relevant Licenses.
server with
Page 18 of 174
DNSSec /DNS
DDOS/applicatio
n load balancing
from day one
with relevant
Licenses.
9 “Specificatio 34 Capable of Kindly include major DNS record Please refer the
ns –B” Web handling types for full function of DNS and revised
Application complete Full GSLB feature. specifications
Firewall DNS bind Kindly modify clause as" 34 Capable given below.
with Server records including of handling complete Full DNS bind
Load A, AAAA, etc. records including A, AAAA, CNAME,
Balancer for IPv4/IPv6 DNAME, HINFO, KEY, MX, NS, NXT,
Page no.42 PTR, SIG, SOA, SRV, TXR etc. etc.
for IPv4/IPv6
10 “Specificatio 35 Should have Kindly allow Equivalent feature for Please refer the
ns – B” a Web other reputed OEM's to participate. revised
Web Vulnerability specifications
Application Scanner feature Kindly modify clause as" 35 Should given below.
Firewall to detect existing have a integration with third party
with Server vulnerabilities Web Vulnerability Scanner to detect
Load like SQL existing vulnerabilities like SQL
Balancer Injection, Cross Injection, Cross Site Scripting, Source
Page no.42 Site Scripting, code disclosure, OS Commanding in
Source code the web applications."
disclosure, OS
Commanding in
the web
applications.
11 “Specificatio 44 Support WAF and SLB solution will provide Please refer the
ns – B” a Application certain features but not IPS, DLP and revised
Web load balance antivirus. specifications
Application with functionality Kindly modify clause as" 44 Support given below.
Firewall of Application a Application load balance with
with Server delivery features functionality of Application delivery
Load , Antivirus, IP features , Antivirus, IP Reputation,
Balancer Reputation, IPS, IPS, WAF Security, Credential
Page no.43 WAF Security, Stuffing Defense, Zero day
Credential prevention , DLP , Analytics, Bot
Stuffing protection ,logs, High Availability and
Defense, Zero reporting from day 1. OEM should be
day prevention , present in India from at least 5 years
DLP , Analytics and Proposed solution should support
,Bot protection 24x7x365 OEM TAC support and
,logs, High advance Next Business Day
Availability and Hardware replacement. The
reporting from proposed equipments must come
day 1. OEM with 5 year warranty and onsite
should be support. Installation, basic
present in India configuration (at least 2 domains),
from at least 5 and six days of training on essential
Page 19 of 174
years and aspects of the WAF/ADC for the IT
Proposed team of the High Court of M.P.,
solution should Jabalpur. The WAF/ADC should
support support to store all log of minimum
24x7x365 OEM 8months period on external storage
TAC support and such as NAS/SAN. The required
advance Next external storage (Hitachi VSP E590H
Business Day through) will be provided by High
Hardware Court of M.P. "
replacement.
The proposed
equipments
must come with
5 year warranty
and onsite
support.
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum
8months period
on external
storage such as
NAS/SAN. The
required external
storage (Hitachi
VSP E590H
through) will be
provided by High
Court of M.P.
12 “Specificatio Add Clause as The proposed solution should have Yes accepted.
ns – B” Key Web server stress based L7 Behavioral Please refer the
Web Application DOS detection and mitigation revised
Application Firewall L7 including the ability to create real time specifications
Firewall DDOS features L7 DOS signatures. given below.
with Server are missing.
Load Kindly
Balancer incorporate.
Page 20 of 174
Page no.43
13 “Specificatio Add Clause as The proposed solution should provide Please refer the
ns – B” Key Web behavioral DoS (BADoS) which revised
Web Application provides automatic protection against specifications
Application Firewall L7 DDoS attacks by analyzing traffic given below.
Firewall DDOS features behavior using machine learning and
with Server are missing. data analysis.
Load Kindly
Balancer incorporate.
Page no.43
14 “Specificatio Add Clause as The proposed solution must support The vendor can
ns – B” Key Web Single Sign-On functionality on the quote higher side
Web Application same appliance running on the same /proposed better
Application Firewall L7 OS version from the same OEM in solution.
Firewall DDOS features the future. The solution must protect
with Server are missing. against FTP, SMTP, HTTP, HTTPS,
Load Kindly and Application layer Dos and DDOS
Balancer incorporate. attacks including stress based DOS
Page no.43 and Heavy URL attacks.
15 “Specificatio Add Clause as The proposed solution should have The vendor can
ns – B” Key Web the capability of BOT detection and quote higher side
Web Application Protection beyond signatures and /proposed better
Application Firewall features reputation to accurately detect solution.
Firewall are missing. malicious and benign bots using
with Server Kindly client behavioral analysis, server
Load incorporate. performance monitoring, and
Balancer escalating JavaScript and CAPTCHA
Page no.43 challenges.
16 “Specificatio Add Clause as The proposed WAF should support of The vendor can
ns – B” Key Web prevention of theft as well as the quote higher side
Web Application mitigation of attacks that uses /proposed better
Application Firewall features previously stolen credentials. solution.
Firewall are missing.
with Server Kindly
Load incorporate.
Balancer
Page no.43
6. M/s iValue InfoSolutions Pvt. Ltd.
1 Device L4 Due to license capping the OEMs Please refer the
Throughput: have the advantage to quote higher revised
20 Gbps for the incremental license which is specifications
and not cost effective to customer. Hence given below.
scalable request you to amend the point as
upto 40 "The ADC+WAF should be fully
Gbps populated with the license throughput
of 40 Gbps from Day-1."
2 Processor: To derive the performance number Please refer the
Intel 12- from the specific compute numbers revised
core CPU, does not decide performance of the specifications
64GB RAM, device at all due to Different given below.
minimum architecture, ASICS, FTGA cards
Page 21 of 174
480GB SSD etchave different hardware
Disk and requirement which cannot be
dual power generalized for performance. Request
supply. you to change the required Processor
to Intel Xeon 8-core or higher.
7. M/s SonicWall
1 Hardware The proposed The proposed vendor must be Please refer the
Architecture vendor must be present in the Network Firewalls revised
in the Leader’s Gartner Magic Quadrant for latest specifications
or challenger year report. given below.
quadrant of the Required changes for Participate.
Network
Firewalls
Gartner Magic
Quadrant for
latest year
report.
2 Performanc High Availability: High Availability: Active/Active, Please refer the
e & Active/Active Active/Passive and should support revised
Scalability and session state synchronization among specifications
Active/Passive firewalls from day. given below.
and should Required changes for Participate.
support session
state
synchronization
among firewalls
from day 1
3 Performanc Should support Should support capability to create Please refer the
e & capability to multiple virtual context/instance with revised
Scalability create multiple strict hardware resource (CPU, specifications
virtual Memory & Storage) reservation and given below.
context/instance ensure traffic isolation between virtual
with strict context / instance.
hardware Make this point Optional - Required
resource (CPU, to participate
Memory &
Storage)
reservation and
ensure traffic
isolation
between virtual
context/instance
4 Next Gen Should support Should support more than 2000+ Please refer the
Firewall more than (excluding custom application revised
Features 4000+ signatures) distinct application specifications
(excluding signature as application detection given below.
custom mechanism to optimize security
application effectiveness and should be able to
signatures) create 40 or more application
distinct categories for operational efficiency.
application Required changes for Participate.
Page 22 of 174
signature as
application
detection
mechanism to
optimize security
effectiveness
and should be
able to create 40
or more
application
categories for
operational
efficiency
5 Next Gen Should support Should support more than 10,000 IPS 15000
Firewall more than signatures or more.
Features 19,000 Request to Start with Minimum.
(excluding
custom
signatures) IPS
signatures or
more.
6 DNS Should take Should take inputs from at least 25 The vendor can
Security inputs from at third-party sources of threat quote equivalent
least 25 third- intelligence. or better solution.
party sources of Make this point Optional – Required
threat to Participate
intelligence.
7 Interface 6 X 10G Minimum 4 X 10G Copper/RJ45 Day Please refer the
and Copper/RJ45 1 or more. 6 X 1/10G SFP/SFP+ Day revised
Connectivity Day 1 1 with LR/SM transceivers and 8x3m specifications
Requiremen 8 X 1/10G patch cords. 4 X 10/25Gig SFP28 given below.
t SFP/SFP+ Day Ports with 4 nos. of LR transceivers
1 with LR/SM and 4x3m patch cords from Day one.
transceivers and Minimum 2 x 1G/10G HA port in
8x3m patch addition to requested data ports,
cords. Dedicated 1 X 10/100/1000 RJ45
4 X 10/25Gig Management Port.
SFP28 Ports Required changes for Participate.
with 4 nos. of LR
transceivers and
4x3m patch
cords from Day
one.
Minimum 2 x
10G HA port in
addition to
requested data
ports, Dedicated
1 X 10/100/1000
RJ45
Management
Page 23 of 174
Port.
8 Next Gen The solution The solution should provide Change Optional.
Firewall should provide Management capability for the
Features Change organizations needs to implement
Management more formal processes for
capability for the configuration changes, including audit
organizations tracking and official approval before
needs to changes are deployed.
implement more Make this point Optional.
formal
processes for
configuration
changes,
including audit
tracking and
official approval
before changes
are deployed.
9 Next Gen The solution The solution must provide IP No Change.
Firewall must provide IP reputation feed that comprised of
Features reputation feed several regularly updated collections
that comprised of poor reparation of IP addresses
of several determined by the proposed security
regularly vendor. The solution should have the
updated capability to detect MD5, SHA256
collections of and SHA512 traffic hashes to detect
poor reparation any malicious traffic pattern.
of IP addresses We do have our own Capture threat
determined by labs – intel from here is used as of
the proposed now to trap zero day & ransomware.
security vendor.
Solution must
support IP
reputation
intelligence
feeds from third
party and
custom lists of IP
addresses
including a
global blacklist.
The solution
should have the
capability to
detect MD5,
SHA256 and
SHA512 traffic
hashes to detect
any malicious
traffic pattern
10 Next Gen The solution It should also provide configuration Please refer the
Page 24 of 174
Firewall should provide rollback capacity to the last good revised
Features Configuration configuration running on the firewall. specifications
Deployment Audit logs show the changes history given below.
History, with success/failed details.
Pending Requested to edit this clause as
Changes and Pending changes is feasible via
Policy Compare centralized management solution
capability before NSM.
the
security policies
are deployed on
the firewall. It
should also
provide
configuration
rollback capacity
to the last good
configuration
running on the
firewall.
11 URL Should must Should support URL threat No change.
Filtering support URL intelligence feeds to protect against
Features threat threats.
intelligence Make this point optional
feeds to protect
against threats
12 Logs & Solution should Solution should offer Centralized No Change.
Reporting offer NOC/SOC Visibility for the Attack
Centralized Surface.
NOC/SOC Remove this point or make it optional
Visibility for the as it seems to be OEM specific.
Attack Surface
8. XtraNet Technologies Private Limited
1 Page no.22 The successful We request the Department to amend No change.
4.8 TIME bidder shall the clause as below:
SCHEDULE complete the The successful bidder shall complete
TO assignment the assignment within 120 days from
COMPLET within 60 days the date of issue of Letter of
E THE from the date of Acceptance / Letter of Intent.
CONTRAC issue of Letter of
T:- Acceptance /
Point no. Letter of Intent.
4.8.1
2 Page no. 30 Details : We request the Department to amend No change.
WARRANT (i) Within 48 the clause as below:
Y SERVICE working Hours Details :
LEVEL from the call (i) Within 48 working Hours from the
REQUIREM logging time – call logging time – for all High
ENTS – for all High Severity events
SLA Severity events (ii) Within 72 working hours from the
6.7.4 The (ii) Within 72 time of attending the problem for all
Page 25 of 174
various working hours Low severity events.
Service from the time of Penalties per day of delay / per
Level attending the fault / per occasion
Requiremen problem for all (i) For High Severity events,
ts and
Low Rs.1000/-.
related severity events (ii) For Low Severity events, Rs.500/-
Penalties
penalties for per Delay will be counted in steps of 1
default day of delay / day.
per fault / per
occasion
(i) For High
Severity events,
Rs.1000/-.
(ii) For Low
Severity events,
Rs.500/-
Delay will be
counted in steps
of one hour.
3 Page No. 8 The proposal We request the department to allow No change.
2.5 should be the EMD in the form Bank Guarantee.
EARNEST submitted along
MONEY with only online
DEPOSIT application fee of
(EMD): Rs.5,000/- (Rs.
Five Thousand
only) and
Earnest Money
Deposit(EMD) of
Rs.03 Lakh
(Rupees Three
Lakh only) in the
form of online
mode through e-
procurement
4 Page no. 1 The sealed We request the department Remove No change.
Hardcopy tender complete hard copy submission of tender.
Submission in all respect
of tender addressed to
“Registrar
General, High
Court of Madhya
Pradesh,
Jabalpur” must
be submitted
before 05:00
P.M. on 15th
October, 2024
(mandatory).
5 Technical We request to consider our Quote as per
Query recommendation for dedicated tender.
Page 26 of 174
purpose built NIPS appliance.
Reason "Whenever throughput
increases, by default the box capacity
will decrease as it is working with all
the modules of FW, NIPS & Anti-APT
or in worst case NGFW will bypass
the NIPS & Anti-APT & will offer basic
Firewall functionality only"
6 Firewall - The SolutionWe request the department to Quote as per
Technical should support generalize these points for wider and tender and
Specificatio DNS security in more competitive participation as it clarifications
ns line mode and seems OEM Specific. published.
not proxy mode.
Necessary
licenses to be
included from
day 1.
9. AKS Information Technology Services Pvt. Ltd
PQC Queries
1 2.5.1 or EMD worth 3 Kindly provide exemption to MSME No change.
3.13 page lakh INR /NSIC Bidders.
no. 08 OR The firms
registered under
NSIC and
MSME (The
vendor to be
registered with
both NSIC and
MSME for
claiming
exemption of
tender fees) are
exempted for
submission of
tender fees only.
But they have to
submit valid
EMD as per the
tender
requirement.
2 2.15.2 page Three similar Relaxation in the % No change.
no. 12 completed work
costing not less
than the amount
equal to 40% of
the estimated
cost.
OR
Two similar
completed work
costing not less
Page 27 of 174
than the amount
equal to 50% of
the estimated
cost.
OR
One similar
completed work
costing not less
than the amount
equal to 80% of
the estimated
cost.
3 Phase 3 The Commercial Evaluation Type Evaluation will be
page no. 13 Proposal done on line item
Evaluation will basis.
be based on the
“individual cost”,
which would be
the total payouts
including all
taxes, duties and
levies for the
supply,
installation,
commissioning,
system
integration of
equipments and
Maintenance
cost.
4 2.20.3 page Successful Exemption for MP No change.
no.14 bidder must
ensure his
establishment in
India and in the
State of Madhya
Pradesh for
post-installation
services and
support of the
supplied
equipments.
5 2.22 page The Government Exemption in Firewall Category Quote as per
no. 15 of India had tender document.
amended the
General
Financial Rules
2017 to enable
the imposition of
restrictions
under Rule
Page 28 of 174
144(xi) on
bidders from
countries which
share a land
border with India
on grounds of
defense of India,
or matters
directly or
indirectly related
thereto including
national security.
The bidder has
to submit proper
documents in
this regards as
per the policy.
As per the
Public
Procurement
(Preference to
Make in India),
Order 2017, the
Class-I local
suppliers shall
get preference in
procurement of
goods, services
or works. In
furtherance of
the Revised
PPP-MII Order
dated
04.06.2020, the
Ministry of
Electronics &
Information
Technology
(MEIT) has
notified the
mechanism for
calculation of
local content for
the 13 electronic
products vide
Notification no.
43/4/2019IPHW-
MeitY dated
07.09.2020.
NMS Queries
6 Specificatio The solution Requesting authority to amend the Please refer the
Page 29 of 174
ns – C, should clause as follows: The solution should revised
Network automatically automatically group servers that work specifications
Monitoring group servers closely together based on an analysis given below.
System, that work closely of communication analysis or
Page No. together based grouping criteria such as tags and
44 on analysis of types between them.
communication
between them.
7 Specificatio The solution Requesting authority to kindly revise Please refer the
ns – C, should the clause as this is OEM Specific revised
Network automatically and restrictive for other OEM to specifications
Monitoring build participate in this tender, suggested given below.
System, visualizations revised clause: "The solution should
Page No. that show automatically build visualizations that
44 dependency shows dependency between
between switches, routers, physical/virtual
switches, host, Containers, storages, cluster
routers, software, business applications and
physical/virtual other entities"
host, Containers,
storages, cluster
software,
business
applications and
other entities. It
should also
have the
capability to
detect
applications
that span from
Datacenter and
end in a public
or a private
cloud with
interconnects
between them.
8 Specificatio The solution Kindly amend the clause as follows: Please refer the
ns – C, should support The solution should support extensive revised
Network extensive monitoring capabilities from an OS specifications
Monitoring monitoring (Linux, Windows) and platform given below.
System, capabilities from standpoint, and should provide
Page No. an OS (Linux, options to deploy customized
45-46 Windows)/ monitoring requirements.
platform
standpoint and
should provide
capabilities for
customer to
develop, deploy
customized
Page 30 of 174
monitoring
requirements
9 Specificatio Configurations: This clause is restrictive to our Yes Removed.
ns – C, create rules that participation. We kindly request
Network automatically authority to remove it.
Monitoring assign deadlines
System, to events based
Page No. on their impact
48 on services or
on end-users,
create rules that
perform
automated
assignment of
events to the
corresponding
teams, create
rules that control
automated
notification of
interested
stakeholders
about events ,
automatically
handling
duplicate events,
provide event
correlation
capabilities to
combine a set of
different events
into one major
event
10 Specificatio Consider optionsWe understand that the license used Yes.
ns – C, for transferringfor a network device should also be
Network licenses applicable to a server device when
Monitoring between devices needed, provided the network device
System, or reallocating
is removed from monitoring and
Page No. licenses as
provisioning on the server. This would
49 needs change. allow the same license to be used for
monitoring the server device. Could
you please confirm if our
understanding is correct?
11 Specificatio Suggestion to The proposed NMS solution should No.
ns – C, additional clause be aligned with ITIL framework
Network principles, certified with ITIL4 for
Monitoring Monitoring & Event Management and
System, Capacity & Performance
Page No. Management processes, and must
49 include comprehensive
documentation demonstrating
Page 31 of 174
compliance with these standards to
ensure best practices in service
management and operational
excellence
12 Specificatio Suggestion to The proposed NMS solution must Yes changed in
ns – C, additional clause comply with recognized security the specifications
Network standards, including ISO 27001:2013/ s given below.
Monitoring ISO 27034, and CIS (Center for
System, Internet Security) certifications, to
Page No. ensure robust security management,
49 secure software development, and
adherence to best practices in
information security.
WAF Queries
13 Section – The proposed As Haltdos is a Made in India firm, it Please refer the
VII Page Solution should does not qualify for ICSA revised
41, Point-18 have ICSA accreditation. Instead, it will provide specifications
Certified and an STQC certification. given below.
PCI Compliant Justification: Since Haltdos is a
WAF on the well-known Made in India (MII)
same Hardware company, we are not applicable for
from the same certifications like Gartner and ICSA.
OEM. It must be Instead, Haltdos will provide
able to handle certifications like EAL2+ and STQC.
OWASP Top 10
attacks and
WASC Web
Security Attack
Classification.
10. M/s Palo Alto Networks
1 “Specificatio Minimum 800GB Since these are hardware appliances, Please refer the
ns – A” SSD it comes with a fixed storage size, revised
Firewall different vendor models would have specifications
Technical different size of storage based on the given below.
Specificatio models. Also since the RFP is also
ns s asking for Management server which
15. Device would have more storage space to
Storage store the logs and configs a regular
Page 38 storage size SSD is adequate on the
firewall, it is recommended to change
the clause as below:
Minimum 400 GB SSD.
2 “Specificatio The Proposed These are the features generally part Please refer the
ns – A” system shall of the Security Automation tool such revised
Firewall support as SOAR and the Firewall specifications
Technical automation management could provide an insight given below.
Specificatio response based for the below events and alert the
ns s on following analysts. Please remove the section
14. events: or modify as below:
Automation Compromised Monitor and send email alerts for
& Incident Hosts detected below events:
Page 32 of 174
Response Configuration System
Page 37 Change Threats
Event Log Zero day / unknown malware
High CPU traffic logs
License Expiry
Email Alert
IP Ban
3 “Specificatio The NGFW Considering the current requirement No change.
ns – A” throughput of the and future scalability for MP High
Firewall firewall should Court, it is recommended to increase
Technical be a minimum the throughput of NGFW ad Threat
Specificatio 20 Gbps with Prevention. It would also take care of
ns s application the periodical spike in the traffic and
5. identification and higher throughput requirement for the
Performanc firewalling contract period as well. Request MP
e & enabled with real High Court to modify / amend the
Scalability world/enterprise/ clause as below:
Page 32 production traffic The NGFW throughput of the firewall
with logging should be a minimum 28 Gbps with
enabled. The 64 KB including application
Threat identification and firewalling enabled
Prevention/NGIP with real world/enterprise/ production
S throughput traffic with logging enabled. The
after enabling Threat Prevention/NGIPS throughput
IPS, AVC, after enabling IPS, AVC, antimalware,
antimalware, antispyware, sandboxing, user
sandboxing with identification, file blocking, DNS
logging enabled security and logging enabled should
should be 12 be 15 Gbps considering 64 KB HTTP
Gbps. transaction size.
4 “Specificatio NGFW Firewall For better throughput and No change.
ns – A” should support performance and to be in line with the
Firewall at least throughput, please amend the clause
Technical 1400,000 Layer as below:
Specificatio 7 Concurrent NGFW Firewall should support at
ns s sessions least 2.5 Million Layer 7 Concurrent
5. sessions measured utilizing HTTP
Performanc transactions or 20 Million Layer 3 / 4
e & concurrent sessions.
Scalability
Page 32
5 “Specificatio NGFW Firewall For better throughput and No change.
ns – A” should support performance and to be in line with the
Firewall at least 150,000 throughput, we recommend
Technical connections per amending the clause as below:
Specificatio second L3/L4 or NGFW Firewall should support at
ns s New Layer 7 least 2 Million connections per
5. connections per second L3/L4 or New Layer 7
Performanc second – Min connections per second – Min 225K
e & 90,000 measured with application override,
Scalability utilizing 1 byte HTTP transactions.
Page 33 of 174
Page 32
6 “Specificatio OEM should be For a better visibility of the various No Change.
ns – A” present in India licenses to be proposed / quoted,
Firewall from at least 5 please amend the clause as below:
Technical years and
Specificatio Proposed OEM should be present in India from
ns s solution should at least 5 years and should be
10.Support support proposed with 5 Years OEM support
Page 36 24x7x365 OEM bundle with 24x7x365 days TAC
TAC support and support, RMA (There should be at
advance Next least 4 RMA dept and one TAC for
Business Day support in India), software updates
Hardware and subscription update support. The
replacement. NGFW should be proposed with 5
The NGFW years subscription licenses for
should be NGFW, NGIPS, Anti-Virus , Anti
proposed with 5 Spyware, Threat Protection, APT
years onsite Protection (Zero Day Protection with
support and integrated Sandboxing), URL Filtering
subscription and DNS Security from day 1. The
license for solution shall support bidirectional
NGFW, NGIPS, control over the unauthorized transfer
Anti Virus, Anti of file types and Social Security
Spyware, URL numbers, credit card numbers, and
Filtering, DNS, custom data patterns for future use.
VPN and
Antibotnet
11. M/s Newgen It Technologies Limited
1 Page no:10 Experience in We kindly request the inclusion of Quote as per
& point no: Supply, experience in IT equipment, Data tender document.
2.15.2 Installation, Centers, and related infrastructure.
commissioning,
Maintenance of
firewall, WAF,
NMS tool and
similar IT
equipment’s
during last 05
years
2 Page No:15 Successful We propose allowing bidders to Yes changed.
& Point no: bidder must establish their office after the award
2.20.3 ensure his of the tender. To demonstrate
establishment in commitment, bidders can submit a
India and in the letter of undertaking to open an office
State of Madhya in Madhya Pradesh post award. This
Pradesh for flexibility will enable a wider range of
post-installation qualified bidders to participate without
services and compromising on service quality.
support of the
supplied
equipment’s
Page 34 of 174
3 Page No: Technical Tender specifications currently Please refer the
33 Specifications support a single OEM. We request a revised
relaxation of this restriction to specifications
accommodate multiple brands. This given below.
change will enhance competition,
potentially reduce costs, and provide
more options for high-quality
equipment and services.
12. M/s Sophos
1 3rd party The proposed Please remove. Please refer the
Test firewall vendor NSS Labs already closed and already revised
Certification must have over irrelevant since we are unable to get specifications
Page No. 97% of Exploit succeeding certification from them. given below.
32 Block rate in
latest NGFW
NSS Lab Test
report.
2 3rd party The proposed The proposed vendor must be in the Please refer the
Test vendor must be Gartner's Magic quadrant for the revised
Certification in the Leader’s network firewalls as per the latest specifications
Page No. or challenger report . given below.
32 quadrant of the OR
Network The proposed vendor should be
Firewalls qualified as a class 1 Make In India
Gartner Magic vendor as per DPIT guideline.
Quadrant for As per DPIT notification DPIIT
latest year Notification File No- P-45021/2/2017-
report. PP(BE-II) dated 16-09-2020 from the
Ministry of India , Make In India
product should be given privilege and
Gartner/ or any other 3rd party
international certificate are not
considered.
3 Interface 6 X 10G 6 X 10G Copper/ 10 G fiber with Please refer the
and Copper/RJ45 RJ45 Transreciever from Day 1. revised
Connectivity Day 1 Every OEM has it's standard specifications
Requiremen architecture, kindly make it more given below.
t Page No. generic feature to participate more
32 number of OEM in this bid.
4 Interface 4X 10/25Gig 4X 10/25/40 Gig SFP28/QSFP Ports Please refer the
and SFP28 Ports with 4 nos. of LR transceivers and revised
Connectivity with 4 nos. of LR 4x3m patch cords from Day one. specifications
Requiremen transceivers and Sir, your backend network ports are given below.
t Page No. 4x3m patch standard on 10G/ 40G/ 100G QSFP.
32 cords from Day Whereas, you have asked for
one 10G/25G which does not make sense
because your entire network is on
10G and after link aggregation on
your SD-WAN your capacity will
increase from 10G. Hence, You
should ask for "Minimum 40G of
Page 35 of 174
SFP28 Ports with 4 nos. of LR
transceivers and 4x3m patch cords
from Day one."
Today this will not increase your price
rather will make it standard for
everyone and you will get the best
product otherwise everybody will
quote 10G product only.
5 Next Gen Should support Should support capability to create Please refer the
Firewall capability to multiple virtual context/instance revised
Features create multiple /virtual zones with physical interfaces, specifications
Page No. virtual ensure traffic isolation between virtual given below.
33 context/instance context/instance /Virtual Zones.
with strict Every OEM has it's standard
hardware architecture, and parlance we request
resource (CPU, you to make it generic by putting
Memory & “Should support capability to create
Storage) multiple virtual context/instance
reservation and /virtual zones with physical interfaces,
ensure traffic ensure traffic isolation between virtual
isolation context/instance/Virtual Zones". Keep
between virtual it more generic because the definition
context/instance becomes very OEM specific.
6 Next Gen The solution The solution should provide Please refer the
Firewall should provide Configuration Deployment History revised
Features Configuration and Web Policy Compare/test specifications
Page No. Deployment capability before the policies are given below.
34 History, Pending deployed on the firewall. It should
Changes and also provide configuration rollback
Policy Compare capacity to the last good configuration
capability before running on the firewall. Every OEM
the security has its standard architecture, Sir; It is
policies are difficult to show what comparison
deployed on the means between different policies it is
firewall. It should always better to have web policy
also provide comparison /Testing capability. Kindly
configuration make it more generic feature to
rollback capacity participate more number of OEM in
to the last good this bid.
configuration
running on the
firewall.
7 Manageme The The management platform must be No change.
nt Page No. management capable of integrating third party
35 platform must be security information into data lake &
capable of correlate them to provide contextual
integrating third information & accelerated threat
party discovery and response.
vulnerability Every OEM has it's standard
information into architecture and feature set. In
threat policy today's highly evolved threat
Page 36 of 174
adjustment environment, security management
routines and console should have 3rd party
automated security product & logs integration
tuning workflows facility. In collaboration with 3rd party
security logs, threat can be
discovered quickly and response can
be more faster across all estates.
8 Logs & Bidder has to Bidder has to propose on premise No change.
Reporting propose on dedicated logging, analytics & Quote as per
Page No. premise reporting solution from (Virtual tender document.
38 dedicated /Physical Appliance/India Cloud) from
logging, day1, the logging solution to be
analytics & deployed at Data Center only.
reporting In Case of Virtual Appliance, bidder to
solution from consider Required computing /
same OEM hardware resource for the VM. The
(Virtual /Physical firewall should support to store all log
Appliance) from of minimum 8months period on
day1, the external storage such as NAS/SAN.
logging solution The required external storage (Hitachi
to be deployed VSP E590H through) will be provided
at Data Center by High Court of M.P.
only. Required Features:
In Case of Should Deliver single-pane visibility,
Virtual also have reporting facility to
Appliance, generate reports on virus detected
bidder to over different protocols, top sources
consider for viruses, destination for viruses,
Required top viruses etc. Should have options
computing / to generate Predefined or customized
hardware Advance reports in different formats.
resource for the The solution should have
VM. The firewall configurable options to schedule the
should support report generation. Log retention
to store all log of customization by category. Solution
minimum should offer Centralized NOC/SOC
8months period Visibility for the Attack Surface.
on external Bidder has to include any additional
storage such as license for analytics /event correlation
NAS/SAN. The from day1. The solution should
required external machine learning capability to detect
storage (Hitachi the exploit and not depend on the
VSP E590H vulnerabilities with trained models
through) will be and traffic classifiers. The same
provided by High should be available on public website
Court of M.P. to validate the capabilities.
Required Every OEM has its standard
Features: architecture, kindly make it more
Should Deliver generic feature to participate more
single-pane number of OEM in this bid. As per
visibility, also latest guideline by Cert-IN data
Page 37 of 174
have reporting should be reside within geographical
facility to border of India. Hence requesting ,
generate reports reports can be stored in India DC
on virus which is SOC2 certified and
detected over empanelled with MeitY for better and
different efficient management, feature rich
protocols, top SIEM like details reporting, flexibility
sources for in storage increment at any point of
viruses, time and saving more energy to
destination for encourage Go-Green policy.
viruses, top
viruses etc.
Should have
options to
generate
Predefined or
customized
Advance reports
in different
formats. The
solution should
have
configurable
options to
schedule the
report
generation. Log
retention
customization by
category.
Solution should
offer Centralized
NOC/SOC
Visibility for the
Attack Surface.
Bidder has to
include any
additional
license for
analytics /event
corelation from
day1. The
solution should
machine
learning
capability to
detect the exploit
and not depend
on the
vulnerabilities
with trained
Page 38 of 174
models and
traffic classifiers.
The same
should be
available on
public website to
validate the
capabilities.
13. M/s Microworld Infosol Pvt. Ltd., M/s Computer Bazar & M/s Veltronics India Pvt. Ltd.
FirewallTechnicalSpecifications
1 4-Hardware The appliance Security appliance should be Please refer the
Architecture hardware should evaluated based on their security revised
be multi core effectiveness, features, and specifications
CPU functionality, rather than their given below.
architecture and architecture. The current clause
should not be seems to favor PC-based
proprietary ASIC architecture, potentially excluding
based in nature ASIC OEMs from the tender. We
& should be would like to emphasize that ASIC
open technology is no longer proprietary,
architecture as many leading OEMs are adopting
based on multi- it for its superior performance. Please
core cpu's to refer to the URL below, which
protect & scale highlights that ASIC is not exclusive
against dynamic to Fortieth. Therefore, we request the
latest security removal of this clause and suggest
threats. The that MP High court to consider
appliance architectures based on their
hardware should performance and security
have a hardened effectiveness.
operating https://community.cisco.com/t5/netwo
system from the rking-blogs/the-new-era-of-wan-an-
OEM and should asic-innovation- story/ba-p/4175243
support https://www.paloaltonetworks.com/net
minimum of work- security/hardware-firewall-
64GB of RAM to innovations
make sure all https://blog.checkpoint.com/security/c
the security heck- point-software-introduces-the-
capabilities are worlds-fastest-firewall-delivering-20-
provided without times-better-price-performance-to-
degradation from the-worlds-most-demanding-
day one. datacenters/
The firewall The appliance hardware should be
should have multi core CPU architecture or should
integrated be proprietary ASIC based in nature
redundant fan & should be open architecture based
and dual on multi-core cpu's to protect & scale
redundant hot against dynamic latest security
swappable threats. The appliance hardware
power supply to should have a hardened operating
remove any system from the OEM.
Page 39 of 174
single point of The firewall should have integrated
failure in the redundant fan and dual redundant hot
solution swappable power supply to remove
any single point of failure in the
solution.
2 4-Hardware OEM and should OEM and should support minimum of Please refer the
Architecture support 64GB of RAM to make sure all the revised
minimum of security capabilities are provided specifications
64GB of RAM to without degradation from day one or given below.
make sure all should be proprietary ASIC based in
the security nature to make sure all the security
capabilities are capabilities are provided without
provided without degradation from day one.
degradation from
day one.
3 5 The NGFW Reason for change Every OEM has Please refer the
Performanc throughput of the different ways to measure the revised
e& firewall should throughput values. We request to specifications
Scalability be a minimum changes so all major OEM matches given below.
20 Gbps with this and can participate.
application The NGFW throughput of the firewall
identification and should be a minimum 15 (enterprise
firewalling mix /Real world with logging enabled)
enabled with real OR Application throughput measured
World with 64K http minimum 20Gbps.
/enterprise Threat prevention throughput
/production minimum 10Gbps (Enterprise Mix /
traffic with Real World with logging enabled)
logging enabled.
The Threat
Prevention
/NGIPS
throughput after
enabling IPS,
AVC,
antimalware,
sandboxing with
logging enabled
should be
12Gbps.
4 It is highly Minimum 10Gbps of SSL inspection No change.
recommended to throughput and 500K SSL inspection
ask SSL concurrent session support
inspection
throughput. This
is important
parameters to
size the right
box. Because
lower SSL
inspection
Page 40 of 174
throughput can
degrade the
performance
while
Complete
inspection of the
packet is
enabled.
5 NGFW Firewall Most of the OEM is publish the Please refer the
should support connection per second and revised
at least concurrent session in TCP. It's highly specifications
1400,000 Layer recommended on the basis of the given below.
7 Concurrent ports count that the connections
sessions requirement must be higher so device
not becomes bottle neck. Asking the
lower connections is favoring specific
OEM model.
6 6-Next Gen NGFW Firewall Min 500K Connection per Second No change.
Firewall should support and 5M concurrent connections.
Features at least 150,000
connections per
second L3/L4 or
New Layer 7
connections per
second –
Min 90000
7 6-Next Gen Should support Favoring to specific OEM signature Yes changed TO
Firewall more than count. 15000.
Features 19,000 Request to make changes and allow
(excluding min 10000 Signatures.
custom
signatures) IPS
signatures or
more. Solution
should be able
to passively
detect endpoints
and
infrastructure for
threat correlation
and Indicators of
Compromise
(IoC)
intelligence. The
signatures
should also have
categorization
based on MITRE
TTP's
8 Should support Every OEM has different counts and Yes changed.
Page 41 of 174
Reputation- and categories. This is favoring to specific
category- based OEM nos.
URL filtering Request to remove this clause
offering
comprehensive
alerting and
control over
suspect web
traffic and
enforces policies
on more than
250 million of
URLs in more
than 75+
categories from
day1.
9 11-DNS The Solution Favoring to Specific OEM. Please refer the
Security should support The Solution should support DNS revised
DNS security in security in line mode/proxy mode. specifications
line mode and Necessary licenses to be included given below.
not proxy mode. from day 1.
Necessary
licenses to be
included from
day 1.
10 DNS security Every OEM has different counts in Please refer the
should block threat intelligence asking specific revised
known bad favoring to specific OEM. specifications
domains and Request to remove 10M malicious given below.
predict with domain.
advanced
machine
learning
technology and
should have
global threat
intelligence of at
least 10 million
malicious
domains.
11 The solution Favoring to Specific OEM: Should The vendor can
should integrate have OEM human-driven adversary quote equivalent
and correlate to tracking and malware reverse or better solution.
provide effective engineering, including insight from
prevention globally deployed honey pots. Should
against. New C2 take inputs from at least 25 third-party
domains, file sources of threat intelligence.
download source Request to remove this clause.
domains, and
domains in
malicious email
Page 42 of 174
links.
Integrate with
URL Filtering to
continuously
crawl newfound
or uncategorized
sites for threat
indicators.
Should have
OEM human-
driven adversary
tracking and
malware reverse
Engineering,
including insight
from globally
deployed honey
pots. Should
take inputs from
at least 25 third-
party sources of
threat
intelligence.
Load Balancer + WAF
12 Clause No. Traffic Ports Every OEM has its own architecture. Please refer the
2 support: 4 x 10 Scalability ask within same appliance revised
GE Fiber, 4 x 1G is favoring specific OEM architecture. specifications
GE Fiber and 4 x We request MP high court specific given below.
1G Copper Port the required throughput values
from day-1. including scalability requirement and
Additionally it is highly recommended to Layer 7
should have 8 x throughput of the appliance now a
1GE Fiber for day's most off the applications are
future use HTTP and HTTPS. Ask parameters
(Break-Out are favoring specific OEM model and
should not be designed such a way to make
used). All competition model higher. For fair
transceivers participation we request relaxation in
(SM) from day1. parameters. ASIC technology does
Device L4 not required higher memory and
Throughput: 20 throughput to match the desired
Gbps and performance. So Request the
scalable upto 40 processor and memory clause. Also
Gbps Layer 7 request to relax ports here. Ask ports
requests per counts are favoring specific OEM
second: model.
1300,000 Layer Traffic Ports support: 4 x 10 GE
4 connection per Fiber, 4 x 1G GE Fiber and 4 x 1G
second: 500,000 From day 1 Device L7 Throughput:
Concurrent Minimum 20 Gbps Layer 7 CPS :
Connection: 38 Minimum: 200K Concurrent
Page 43 of 174
Million RSA CPS Connection : Minimum 25 Million SSL
(2K Key): 20,000 CPS : minimum 20,000 ECC CPS
ECC CPS (EC- (EC-P256): 12,000 with TLS1.3
P256): 12,000 Support OR SSL Bulk encryption
with TLS1.3 throughput min 10Gbps.
Support
Processor: Intel
12-core CPU,
64GB RAM,
minimum 480GB
SSD Disk and
dual power
supply. The
appliance should
have 1 x 1G
RJ45
Management
Port and 1G
RJ45 Console
port.
13 Clause No. Following Load Some of the topologies favoring to Please refer the
7 Balancing specific OEM architecture Suggest revised
Topologies relaxing this clause. specifications
should be Following Load Balancing Topologies given below.
supported: should be supported: Router Mode,
•Virtual Matrix One-Arm Mode, and Direct Server
Architecture Return Mode deployments, Direct
•Mapping Ports access Mode, Mapping Ports, Client
•Direct Server Network Address Translation (Proxy
Return IP), Assigning Multiple IP Addresses.
•One Arm
Topology
Application
•Direct Access
Mode
•Assigning
Multiple IP
Addresses
•Immediate and
Delayed Binding
14 Clause No. The proposed Hardware appliance also supports Please refer the
8 device should virtual context / domains. Request to revised
have Hypervisor allow the same. specifications
(should not use The proposed device should have given below.
Open Source) Hypervisor (should not use Open
Based Source) Based Virtualization feature
Virtualization (NO Multi-Tenancy) OR inbuilt
feature (NO support of virtual domain that
Multi-Tenancy) virtualizes the Device resources—
that virtualizes including CPU, memory, network, and
the Device acceleration resources. It should NOT
Page 44 of 174
resources— use Open Source/3rd party Network
including CPU, Functions. The proposed appliance
memory, should have capability to run in
network, and Virtualized as well as Standalone
acceleration mode (Bidder may be asked to
resources. It demonstrate this feature during
should NOT use Technical Evaluation). Should be high
Open performance purpose built next
Source/3rd party generation multi-tenant (min. 5 virtual
Network instances from Day 1 and scalable
Functions. The upto 10 Virtual Instances) hardware.
proposed Platform must have multiple functions
appliance should including Advance application load
have capability balancing and global server load
to run in balancing, Network security
Virtualized as functionality and complete application
well as protection functionality.
Standalone
mode (Bidder Each Virtual Instance contains a
may be asked to complete and separated environment
demonstrate this of the Following:
feature during a) Resources, b) Configurations, c)
Technical Management, d) Operating System.
Evaluation).
Should be high
performance
purpose built
next generation
multi-tenant
(min. 5 virtual
instances from
Day 1 and
scalable upto 10
Virtual
Instances)
hardware.
Platform must
have multiple
functions
including
Advance
application load
balancing and
global server
load balancing,
Network security
functionality and
complete
application
protection
functionality.
Page 45 of 174
Each Virtual
Instance
contains a
complete and
separated
environment of
the Following:
a)Resources,
b)Configurations
c)Management,
d)Operating
System
15 Clause WAF should Favoring to specific OEM Yes changed /
No.19 have the Request to remove - Out of Path removed.
flexibility to be (OOP)
deployed in the
following modes:
Reverse proxy
Out of Path
(OOP)
16 2.15 Bidders meeting Our Request: As the Original No change.
Eligibility ALL of the Equipment Manufacturer (OEM) is
/Pre- following pre- responsible for the maintenance and
Qualificatio qualification installation of the firewall, and we
n Criteria: criteria are coordinate directly with the OEM, we
eligible to apply: kindly request that you consider our
(i) Experience: experience in supplying IT equipment
Experience in as sufficient qualification.
the supply,
installation,
commissioning,
and
maintenance of
firewall, WAF,
NMS tools, and
similar IT
equipment
during the last 5
years, ending on
the last day of
the month
preceding the
publication of
this tender,
should meet
either of the
following:
[Details as per
your document.
14. M/s VSN International Pvt. Ltd.
1 Section – IV 4.2.1 The As the warranty asked in the bid is for Yes changed.
Page 46 of 174
4 Successful 5 years onsite, We would request to The Successful
GENERAL Bidder will be ask for Performance bank Guarantee Bidder will
CONDITIO required to for 5 years only at the time of release required to
NS OF THE furnish of purchase order this will bind bidder furnish
CONTRAC performance for warranty obligation and service performance
T (GCC):- guarantee in the support till the end of warranty period. guarantee in the
4.2 form of form of
PERFORM unconditional unconditional
ANCE Bank Guarantee Bank Guarantee
GUARANT issued by a issued by a
EE:- Nationalized / Nationalized /
Scheduled Bank Scheduled Bank
in India valid for a period
equivalent to of 60 months
05% of the within 30 days
Contract Value from the date of
initially valid for issue of Letter of
a period of 36 Award /
months within 30 acceptance.
days from the
date of issue of
Letter of Award /
acceptance. For
remaining 24
months Bidder
will submit fresh
BG before expiry
of the initial BG.
2 Section – I Estimated As per the clause the Budget The budget is
NOTICE project cost (In Projection mentioned in the NIT is revised to
INVITING Lakh Rs.): 1.50 very low as per the solution required approximately Rs.
TENDER Crore in the RFP. As per the requirement 05 Crore.
we assume that the budget for the
RFP should be at least 6-7 Cr. to
execute the Order properly.
We kindly request you to kindly revise
the budget projection as requested to
meet the tender requirement.
3 “Specificatio The appliance Justification:-Security appliance Please refer the
ns – A” hardware should should be evaluated based on their revised
Firewall be a multicore security effectiveness, features, and specifications
Technical CPU functionality, rather than their given below.
Specificatio architecture architecture. The current clause
ns s, Page and should not seems to favor PC-based
No.32, be proprietary architecture, potentially excluding
S.No.04- ASIC based in ASIC OEMs from the tender. We
Hardware nature & should would like to emphasize that ASIC
Architecture be technology is no longer proprietary,
open as many leading OEMs are adopting
architecture it for its superior performance. Please
based on multi- refer to the URL below, which
Page 47 of 174
core cpu's to highlights that ASIC is not exclusive
protect & scale to Fortinet. Therefore, we request the
against dynamic removal of this clause and suggest
latest security that MP High court to consider
threats. The architectures based on their
appliance performance and security
hardware should effectiveness.
have a hardened https://community.cisco.com/t5/netwo
operating rking-blogs/the-new-era-of-wan-an-
system from the asic-innovation-story/ba-p/4175243
OEM and should https://www.paloaltonetworks.com/net
support work-security/hardware-firewall-
minimum of innovations
64GB of RAM to https://blog.checkpoint.com/security/c
make sure all heck-point-software-introduces-the-
the security worlds-fastest-firewall-delivering-20-
capabilities are times-better-price-performance-to-
provided without the-worlds-most-demanding-
degradation from datacenters/
day one. Request for change:- The appliance
hardware should be a multicore CPU
architecture or can be ASIC based in
nature & should be open architecture
based on multi-core cpu's to protect &
scale against dynamic latest security
threats. The appliance hardware
should have a hardened operating
system from the OEM.
4 “Specificatio The appliance Justification:- ASCI solution do not Please refer the
ns – hardware should require higher memory and CPU to revised
A”Firewall be a multicore deliver the desire functionality. Only specifications
Technical CPU PC based architecture require high given below.
Specificatio architectureand memory. We suggest removing this
ns s, Page should not be clause as it is favoring single OEM
No.32, proprietary ASIC devices. We emphasize MP High
S.No.04- based in nature court team to evaluate the Firewall
Hardware & should beopen solution based on the performance
Architecture architecture parameters Not memory and CPU
based on multi- We would request to amend the
core cpu's to clause to "OEM and should support
protect & minimum of 64GB of RAM to make
scaleagainst sure all the security capabilities are
dynamic latest provided without degradation from
security threats. day one or or should be proprietary
The appliance ASIC based in nature to make sure
hardwareshould all the security capabilities are
have a hardened provided without degradation from
operating day one."
system from the
OEM andshould
support
Page 48 of 174
minimum of
64GB of RAM to
make sure all
thesecurity
capabilities are
provided without
degradation from
dayone
5 “Specificatio The NGFW Justification:- Every OEM have Please refer the
ns – A” throughput of the different ways to measured the revised
Firewall firewall should throughput values. We request for specifications
Technical be a minimum changes so all major OEM match this given below.
Specificatio 20 and can participate in the bid.
ns s, Page Gbps with We would request to amend the
No.32, application clause to" The NGFW throughput of
S.No.05- identification and the firewall should be a minimum 15
Performanc firewalling (enterprise mix /Real world with
e & enabled with logging enabled) OR Application
Scalability real throughput measured with 64K http
world/enterprise/ minimum 20Gbps. Threat prevention
production traffic throughput minimum 10Gbps
with logging (Enterprise Mix / Real World with
enabled. The logging enabled)".
Threat
Prevention/NGIP
S throughput
after enabling
IPS, AVC,
antimalware,
sandboxing with
logging enabled
should be 12
Gbps.
6 “Specificatio Additional Point It is highly recommended to ask SSL No change.
ns – A” inspection throughput. This is
Firewall important parameters to size the right
Technical box. Because lower SSL inspection
Specificatio throughput can degrade the
ns s, Page performance while complete
No.32, inspection of the packet is enabled.
S.No.05- We would request to add new clause
Performanc as "Minimum 10Gbps of SSL
e & inspection throughput and 500K SSL
Scalability inspection concurrent session
support."
7 “Specificatio NGFW Firewall Most of the OEM is publish the No change.
ns – A” should support connection per second and
Firewall at least 150,000 concurrent session in TCP. It's highly
Technical connections per recommended on the basis of the
Specificatio second L3/L4 or ports count that the connections
ns s, Page New Layer 7 requirement must be higher so device
Page 49 of 174
No.32, connections per not becomes bottle neck. Asking the
S.No.05- second – Min lower connections is favoring specific
Performanc 90,000 OEM model.
e & We would request to amend the
Scalability clause to "NGFW Firewall should
support at least Min 500K Connection
per Second and 5M concurrent
connections."
8 “Specificatio Should support This clause is favoring to specific Please refer the
ns – A” more than OEM signature count so, we would revised
Firewall 19,000 request to make changes and allow specifications
Technical (excluding min 10000 Signatures. given below.
Specificatio custom
ns s, Page signatures)
No.32, IPS signatures
S.No.06- or more.
Next Gen Solution should
Firewall be able to
Features passively detect
endpoints and
infrastructure for
threat correlation
and Indicators of
Compromise
(IoC)
intelligence. The
signatures
should also have
categorization
based on MITRE
TTP's
9 “Specificatio Should support Every OEM has different counts and Please refer the
ns – Reputation- and categories. This is favoring to specific revised
A”Firewall category-based OEM nos. Hence, We would request specifications
Technical URL filtering to kindly remove this clause. given below.
Specificatio offering
ns s, Page comprehensive
No.32, alerting and
S.No.07- control over
URLFilterin suspect web
g Features traffic and
enforces policies
on more than
250 million of
URLs in more
than 75+
categories from
day1.
10 “Specificatio The Solution This clause is favoring to Specific Please refer the
ns – A” should support OEM. Hence, we would request to revised
Firewall DNS security in amend the clause to "The Solution specifications
Page 50 of 174
Technical line mode and should support DNS security in line given below.
Specificatio not mode/proxy mode. Necessary
ns s, Page proxy mode. licenses to be included from day 1."
No.36, Necessary
S.No.11- licenses to be
DNS included from
Security day 1.
11 “Specificatio DNS security Every OEM has different counts in Please refer the
ns – A” should block threat intelligence asking specific revised
Firewall known Bad favoring to specific OEM. specifications
Technical domains and We would request to remove 10M given below.
Specificatio predict with malicious domain from the
ns s, Page advanced specifications .
No.36, machine
S.No.11- learning
DNS technology and
Security should have
global
threat
intelligence of at
least 10 million
malicious
domains.
12 “Specificatio The solution This clause is Favoring to Specific The vendor can
ns – A” should integrate OEM: Should have OEM human- quote equivalent
Firewall and correlate to driven adversary tracking and or better solution.
Technical provide effective malware reverse engineering,
Specificatio prevention including insight from globally
ns s, Page against. deployed honey pots.
No.36, New C2 Should take inputs from at least 25
S.No.11- domains, file third-party sources of threat
DNS download source intelligence
Security domains, and
domains in Hence, we would request to remove
malicious email this clause from the specifications s.
links.
Integrate with
URL Filtering to
continuously
crawl newfound
or
uncategorized
sites for threat
indicators.
Should have
OEM human-
driven adversary
tracking and
malware
reverse
engineering,
Page 51 of 174
including insight
from globally
deployed honey
pots.
Should take
inputs from at
least 25 third-
party sources of
threat
intelligence.
13 “Specificatio The proposed NSS Labs already closed and already Please refer the
ns – A” firewall vendor irrelevant since we are unable to get revised
Firewall must have over succeeding certification from them. specifications
Technical 97% of Exploit Hence, we would request to kindly given below.
Specificatio Block rate in remove this clause.
ns s, Page latest NGFW
No.32, NSS Lab Test
S.No.02- report.
3rd party
Test
Certification
Page 79 of 174
from day1.
9 Specificatio The Solution Reason for change: - Favouring to Please refer the
ns – A - should support Specific OEM. revised
Firewall DNS security in Request for Change (NEW CLAUSE): specifications
Technical line mode and - The Solution should support DNS given below.
Specificatio not proxy mode. security in line mode/proxy mode.
ns s/11- Necessary Necessary licenses to be included
DNS licenses to be from day 1.
Security included from
day 1.
10 DNS security Reason for change: - Every OEM has Please refer the
should block different counts in threat intelligence revised
known bad asking specific favoring to specific specifications
domains and OEM. given below.
predict with Request for Change (NEW CLAUSE):
advanced - Request to remove 10M malicious
machine domain
learning
technology and
should have
global threat
intelligence of at
least 10 million
malicious
domains.
11 The solution Reason for change: - Favoring to Please refer the
should integrate Specific OEM: Should have OEM revised
and correlate to human-driven adversary tracking and specifications
provide effective malware reverse engineering, given below.
prevention including insight from globally
against. New C2 deployed honey pots.
domains, file Should take inputs from at least 25
download source third-party sources of threat
domains, and intelligence
domains in Request for Change (NEW CLAUSE):
malicious email - Request to remove this clause
links.
Integrate with
URL Filtering to
continuously
crawl newfound
or uncategorized
sites for threat
indicators.
Should have
OEM human-
driven adversary
tracking and
malware reverse
engineering,
including insight
Page 80 of 174
from globally
deployed honey
pots. Should
take inputs from
at least 25 third-
party sources of
threat
intelligence.
12 Specificatio Traffic Ports Traffic Ports support: As per the Please refer the
ns – B support: 4 x present data centre/It infra revised
Web 10 GE Fiber, 4 requirement standard, 10G ports are specifications
Application x 1G GE Fiber recommended over 1G, As 10G is given below.
Firewall and 4 x 1G backward-compatible with 1G where
with Server Copper Port as vies-versa is not possible. And for
Load from day-1. ADC/WAF/SLB deployment 8 x 10G
Balancer/Po Additionally is more than sufficient because asked
int 2/Page should have 8 x throughput is 40G.please amending
no.39 1GE Fiber for this clause.
future use Layer 4 connections per second:
(Break-Out Considering the asked Concurrent
should not be Connections and Layer 4 connections
used). All per second requirement is lower side.
transceivers Please amend this clause.
(SM) from day1. Layer 7 requests per second:
Device L4 Considering the asked Concurrent
Throughput: 20 Connections and Layer 7 requests
Gbps and per second requirement is lower side.
scalable upto 40 Please amend this clause.
Gbps It is suggested to amend the clause
Layer 7 requests as :-
per second: Traffic Ports support: 8 x 10 GE
1300,000 SFP+ from day-1
Layer 4 Device L4 Throughput: 20 Gbps and
connection per scalable up to 40 Gbps
second: 500,000 Layer 7 requests per second : 5
Concurrent million
Connection: 38 Layer 4 connections per second: 3
Million RSA CPS Million
(2K Key): 20,000 RSA CPS(2K Key): 20,000
ECC CPS (EC- ECC CPS (EC-P256): 12,000 with
P256): 12,000 TLS1.3 Support
with TLS1.3 Processor: Intel 12-core CPU or
Support equivalent or better
Processor: Intel Concurrent Connections: 40 Million
12-core CPU, Processor - Intel 12-core CPU, 64GB
64GB RAM, RAM, minimum 480GB SSD Disk and
minimum 480GB dual power supply.
SSD Disk and The appliance should have 1 x
dual power 1G RJ45 Management Port and
supply. 1G RJ45 Console port.
The appliance
Page 81 of 174
should have 1
x 1G RJ45
Management
Port and 1G
RJ45 Console
port.
13 Specificatio The proposed ap Different OEM has different Please refer the
ns – B pliance should s terminology and technique to achieve revised
Web upport the below similar function. We would like to specifications
Application metrics: request the honorable tendering given below.
Firewall — Minimum committee to use vendor agnostic
with Server Misses, terminology for wider participation.
Load — Hash, — Minimum Misses,
Balancer/Po — Persistent — Hash,
int 6/Page Hash, — Persistent Hash,
no.40 — Tunable — Tunable Hash/Equivalent
Hash, — Weighted Hash/Equivalent
— Weighted — Least Connections,
Hash, — Least Connections Per Service,
— Least — Round-Robin,
Connections, — Response Time,
— Least — Bandwidth, etc
Connections Per
Service,
— Round-Robin,
— Response
Time,
— Bandwidth,
etc
14 Specificatio Following Load Virtual Matrix Architecture feature is Please refer the
ns – B Balancing specific to one ADC OEM. Kindly revised
Web Topologies remove this clause for wider specifications
Application should be participation and for other points given below.
Firewall supported: please allow similar or equivalent
with Server • Virtual Matrix feature metrics for broader
Load Architecture participation. Following Load
Balancer/Po • Client Network Balancing Topologies should be
int 7/Page Address supported:
no.40 Translation • Client Network Address Translation
(Proxy IP) (Proxy IP) /Equivalent
• Mapping Ports • Mapping Ports /Equivalent
• Direct Server • Direct Server Return /Equivalent
Return • One Arm Topology Application
• One Arm /Equivalent
Topology • Direct Access Mode /Equivalent
Application • Assigning Multiple IP Addresses
• Direct Access /Equivalent
Mode • Immediate and Delayed Binding
• Assigning /Equivalent
Multiple IP
Addresses
Page 82 of 174
• Immediate and
Delayed Binding
15 Specificatio The proposed For wider participation, We would like Please refer the
ns –B Web appliance/softwa to request the honorable tendering revised
Application re should be committee to amend the clause as specifications
Firewall EAL2 certified. requested. given below.
with Server "The proposed appliance/software
Load should be EAL2 certified/Make in
Balancer/Po India"
int 31/Page
no.43
16 Specificatio Capable of In order to switch over the Please refer the
ns –B Web handling applications traffic like web app, email revised
Application complete Full app etc. the GSLB solution must specifications
Firewall DNS bind understand all types of DNS records given below.
with Server records including and not just A or AAAA. Kindly add
Load A, AAAA, etc. for following functionality for complete
Balancer/Po IPv4/IPv6 Solution. It is suggested to amend
int 34/Page this clause as :-
no.43 The Proposed Solution must have
Global Server Load Balancing and
should be able to host SRV Records,
AAAA Records, A , PTR , MX ,TXT
,SOA, NS, Dname, Dmarc Records
and should also support DNSSEC.
17 Specificatio Application load IPS is completely different technology Please refer the
ns – B balance with even deployment is different. Kindly revised
Web functionality of remove the IPS feature in the specifications
Application Application specifications s for the wider given below.
Firewall delivery participations of OEM. It is suggested
with Server features, to amend the clause as "Application
Load Antivirus, IP load balance with functionality of
Balancer/Po Reputation, IPS, Application delivery features ,
int 44 WAF Security, Antivirus, IP Reputation, WAF
a/Page Credential Security, Credential Stuffing Defense,
no.44 Stuffing Zero day prevention , DLP , Analytics,
Defense, Bot protection ,logs, High Availability
Zero day and reporting from day 1. OEM
prevention, DLP, should be present in India from at
Analytics, Bot least 5 years and Proposed solution
protection, logs, should support 24x7x365 OEM TAC
High Availability support
and reporting and advance Next Business Day
from day 1. OEM Hardware replacement. The
should be proposed equipments must come
present in India with 5 year warranty and onsite
from at least 5 support. Installation, basic
years and configuration (at least 2 domains),
Proposed and six days of training on essential
solution should aspects of the WAF/ADC for the IT
support team of the High Court of M.P.,
Page 83 of 174
24x7x365 OEM Jabalpur.
TAC support The WAF/ADC should support to
and advance store all log of minimum 8months
Next Business period on external storage such as
Day Hardware NAS/SAN. The required external
replacement. storage (Hitachi VSP E590H through)
The proposed will be provided by High Court of
equipments M.P"
must come with
5 year warranty
and onsite
support.
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum
8months period
on external
storage such as
NAS/SAN. The
required external
storage
(Hitachi VSP
E590H through)
will be provided
by High Court of
M.P.
18 Specificatio The solution Please rephrase this as “The solution Please refer the
ns – C” should be able should be able to do Virtual systems revised
Network to do Virtual discovery (including Microsoft Hyper- specifications
Monitoring systems V, vmware, etc.) Furthermore, it given below.
System discovery should support discovery of modern
(including day DevOps platforms such as
Microsoft Hyper- containers and management
V, vmware, etc.) solutions such as Kubernetes, Docker
Furthermore, it Swarm, and Open Shift."
should support
discovery of
Page 84 of 174
modern day
DevOps
platforms such
as containers
such as Docker,
Runc, AIX
WPARs and
management
solutions such
as Kubernetes,
Docker Swarm,
Cloud Foundry
and Open Shift.
19 Specificatio Discovers in- This section is related to Storage Yes removed.
ns – C” depth Device management and it is written
Network configuration under "Network Monitoring System"
Monitoring data for storage section, hence requesting you to
System systems, pools, remove this point from Network
volumes, disks Monitoring System section and be
drives, LUNS, included in "Storage Device
File Systems requirement", where Element
Management System is embedded &
packaged by OEM, along with the
Storage devices for monitoring
physical and virtual storage
infrastructure.
20 Specificatio The solution Please rephrase this as “The solution Yes changed.
ns – C” should support should support monitoring various
Network monitoring attributes in Tomcat, Web Sphere
Monitoring various MQ, Apache HTTP, IIS, and WAS."
System attributes (at
least 50+) in
Tomcat, Web
Sphere MQ,
Apache HTTP,
IIS, and WAS.
21 Specificatio The solution The Hardware Element Manager is No change. The
ns – C” should be able embedded & packaged by OEM vendor can quote
Network to report on which is benchmarked by OS to better solution.
Monitoring hardware details capture the core elements in the
System (like CPU, event of hardware or software
memory, fan malfunctions, crashes, failures etc.
state, power Hence, requesting you to remove
etc.) of servers these points from Network Monitoring
from multi System section and be included in
vendors like "Server Hardware requirement". In
IBM, order to have single pane of glass,
HP, Cisco, Dell the meaningful events from Hardware
and also Element Manager can be integrated
VMware Hosts. into Network Monitoring System for
event consolidation purposes.
Page 85 of 174
22 Specificatio The solution Please rephrase this as "The solution Yes changed.
ns – C” should be able should be able to gather capacity
Network to gather data from vCenter, Physical servers,
Monitoring capacity data etc. Generate report and provide
System from vCenter, recommendation."
HMC,
Physical servers,
etc. Generate
report and
provide
recommendation
.
23 Specificatio The solution The Hardware Element Manager is The vendor can
ns – C” should be able embedded & packaged by OEM quote better
Network to monitor disk which is benchmarked by OS to solution / option.
Monitoring elements like capture the core elements in the
System RAID event of hardware or software
controllers, hard malfunctions, crashes, failures etc.
disks, RAIDs, Hence, requesting you to remove
failure these points from Network Monitoring
prediction, System section and be included in
availability of the "Server Hardware requirement". In
volumes. order to have single pane of glass,
the meaningful events from Hardware
Element Manager can be integrated
into Network Monitoring System for
event consolidation purposes.
24 Specificatio The solution The Hardware Element Manager is The vendor can
ns – C” should be able embedded & packaged by OEM quote better
Network to monitor which is benchmarked by OS to solution / option.
Monitoring environment capture the core elements in the
System metrics like event of hardware or software
temperature, malfunctions, crashes, voltage
internal voltages, failures etc. Hence, requesting you to
power supplies, remove these points from Network
fans. Monitoring System section and be
included in "Server Hardware
requirement". In order to have single
pane of glass, the meaningful events
from Hardware Element Manager can
be integrated into Network Monitoring
System for event consolidation
purposes.
25 Specificatio The solution The Hardware Element Manager is The vendor can
ns – C” should be able embedded & packaged by OEM quote better
Network to monitor critical which is benchmarked by OS to solution / option.
Monitoring hardware capture the core elements in the
System components like event of hardware or software
processors, malfunctions, crashes, ECC failures,
memory voltage etc. Hence, requesting you to
modules, ECC remove these points from Network
Page 86 of 174
errors, failure Monitoring System section and be
prediction. included in "Server Hardware
requirement". In order to have single
pane of glass, the meaningful events
from Hardware Element Manager can
be integrated into Network Monitoring
System for event consolidation
purposes.
26 Specificatio Storage This section is related to Storage The vendor can
ns – C” Monitoring Device management and it is written quote better
Network under "Network Monitoring System" solution.
Monitoring section, hence requesting you to
System remove this point from Network
Monitoring System section and be
included in "Storage Device
requirement", where Element
Management System is embedded &
packaged by OEM, along with the
Storage devices for monitoring
physical and virtual storage
infrastructure.
27 Specificatio Logging/Reporti This section is related to Log No change.
ns – C” ng/Alert/threshol management and it is written under
Network d "Network Monitoring System" section,
Monitoring hence requesting you to remove
System these point from Network Monitoring
System section and be included in
"Additional Capability requirement"
28 Specificatio Capacity The Hardware Element Manager is Optional.
ns – C” Reservations: embedded & packaged by Server /
Network tool should allow Storage / Network OEM which is
Monitoring management of benchmarked by OEM to capture the
System resource core elements like Hardware alerts,
allocations and crashes, capacity reserves etc.
reservations (for Hence, requesting you to remove
services, these points from Network Monitoring
applications or System section and be included in
other needs), "Additional Capability requirement". In
identify resource order to have single pane of glass,
shortages and the meaningful events from Hardware
provide Element Manager can be integrated
information for into Network Monitoring System for
further analysis event consolidation purposes.
or procurement
29 Specificatio Suggestion: - The proposed EMS The vendor can
ns – C” solution should adhere to Micro quote better
Network services and thus be built on modern solution / higher
Monitoring container technologies, and have an side.
System options to deploy on classic mode
(non-containerized) as well as
containerized (like Docker,
Page 87 of 174
Kubernetes) mode. The solution
should either support built-in
Kubernetes technology or Bring Your
Own Kubernetes (BYOK) platform
provided by the bidder.
+D36 Reason for Suggestion: -
Containers are a newer technology
and it run isolated from each other,
with each of them possessing its own
level of security and remaining
unharmed. Traditional applications
are not properly isolated from each
other within a VM, giving scope for a
malicious program to penetrate and
control others. As the government
has some of the most sensitive
information in the devices, services,
and other products used by them
must be at the highest level of
security at all times.
30 Specificatio Suggestion: - The proposed EMS Please refer the
ns – C” OEM must have necessary ISO revised
Network 27001, ISO 27034 certification and specifications
Monitoring FIPS 140-2 compliance to ensure given below.
System security compliances.
Reason for Suggestion: - The
proposed EMS OEM must have
necessary ISO certifications and
FIPS compliance to ensure security
compliances. FIPS 140-2 compliant,
which ensures that cryptographic-
based security systems are to be
used to provide protection for
sensitive or valuable data.
31 Specificatio Suggestion: - The proposed NMS The vendor can
ns – C” solution should provide out of the box quote higher side
Network Risk Visibility Dashboards of network /better solution.
Monitoring infrastructure. With this risk visibility
System dashboard, we see the most
offending devices in the group along
with the types of unauthorized access
attempts, and the percentage of non-
compliant devices.
Please confirm if the stated network
compliance requirement is desired as
part of NMS specifications s?
32 Specificatio Suggestion: - The proposed NMS The vendor can
ns – C” solution should have diagnostic quote higher side
Network analytics capability that able to /better solution.
Monitoring visually correlate performance and
System configuration changes of all network
Page 88 of 174
issues. It overlays real-time network
configuration change events on
network performance graphs to
correlate and reduce troubleshooting
time. Please confirm if the stated
network diagnostics requirement is
desired as part of NMS specifications
s?
33 Specificatio Suggestion: - The proposed NMS The vendor can
ns – C” solution should be capable of quote higher side
Network managing upto 30K devices from a /better solution.
Monitoring single instance , should be able to
System have 1 mil discovered interfaces.
Please confirm if the proven network
scalability is desired as part of NMS
specifications s?
34 Specificatio Suggestion: - The solution provides The vendor can
ns – C” ready-to-use, out-of-the-box network quote higher side
Network focused orchestration content built /better solution.
Monitoring using industry standards and vendor
System best practices that can be easily
ported between dev, test and
production environments.
Please confirm if the stated network
automation requirement is desired as
part of NMS specifications s?
19. M/s Intek Micro Systems Pvt. Ltd.
1 Web Traffic Ports Traffic Ports support: As per the Please refer the
Application support: 4 x present data center /It infra revised
Firewall 10 GE Fiber, 4 requirement standard, 10G ports are specifications
with Server x 1G GE Fiber recommended over 1G, As 10G is given below.
Load and 4 x 1G backward-compatible with 1G where
Balancer/Po Copper Port as vies-versa is not possible. And for
int 2/Page from day-1. ADC/WAF/SLB deployment 8 x 10G
no.39 Additionally is more than sufficient because asked
should have 8 x throughput is 40G.please amending
1GE Fiber for this clause.
future use Layer 4 connections per second:
(Break-Out Considering the asked Concurrent
should not be Connections and Layer 4 connections
used). All per second requirement is lower side.
transceivers Please amend this clause.
(SM) from day1. Layer 7 requests per second:
Device L4 Considering the asked Concurrent
Throughput: 20 Connections and Layer 7 requests
Gbps and per second requirement is lower side.
scalable upto 40 Please amend this clause.
Gbps It is suggested to amend the clause
Layer 7 requests as :-
per second: Traffic Ports support: 8 x 10 GE
1300,000 SFP+ from day-1
Page 89 of 174
Layer 4 Device L4 Throughput: 20 Gbps and
connection per scalable up to 40 Gbps
second: 500,000 Layer 7 requests per second : 5
Concurrent million
Connection: 38 Layer 4 connections per second: 3
Million Million
RSA CPS (2K RSA CPS(2K Key): 20,000
Key): 20,000 ECC CPS (EC-P256): 12,000 with
ECC CPS (EC- TLS1.3 Support
P256): 12,000 Processor: Intel 12-core CPU or
with TLS1.3 equivalent or better
Support Concurrent Connections: 40 Million
Processor: Intel Processor - Intel 12-core CPU, 64GB
12-core CPU, RAM, minimum 480GB SSD Disk and
64GB RAM, dual power supply.
minimum 480GB The appliance should have 1 x
SSD Disk and 1G RJ45 Management Port and
dual power 1G RJ45 Console port.
supply.
The appliance
should have 1
x 1G RJ45
Management
Port and 1G
RJ45 Console
port.
2 Web The proposed ap Different OEM has different Please refer the
Application pliance should s terminology and technique to achieve revised
Firewall upport the below similar function. We would like to specifications
with Server metrics: request the honorable tendering given below.
Load — Minimum committee to use vendor agnostic
Balancer Misses, terminology for wider participation.
/Point 6 — Hash, — Minimum Misses,
/Page no.40 — Persistent — Hash,
Hash, — Persistent Hash,
— Tunable — Tunable Hash/Equivalent
Hash, — Weighted Hash/Equivalent
— Weighted — Least Connections,
Hash, — Least Connections Per Service,
— Least — Round-Robin,
Connections, — Response Time,
— Least — Bandwidth, etc
Connections Per
Service,
— Round-Robin,
— Response
Time,
— Bandwidth,
etc
3 Web Following Load Virtual Matrix Architecture feature is Please refer the
Application Balancing specific to one ADC OEM. Kindly revised
Page 90 of 174
Firewall Topologies remove this clause for wider specifications
with Server should be participation and for other points given below.
Load supported: please allow similar or equivalent
Balancer/Po Virtual Matrix feature metrics for broader
int 7/Page Architecture participation
no.40 • Client Network Following Load Balancing Topologies
Address should be supported:
Translation • Client Network Address Translation
(Proxy IP) (Proxy IP) /Equivalent
• Mapping Ports • Mapping Ports /Equivalent
• Direct Server • Direct Server Return /Equivalent
Return • One Arm Topology Application
• One Arm /Equivalent
Topology • Direct Access Mode /Equivalent
Application • Assigning Multiple IP Addresses
• Direct Access /Equivalent
Mode • Immediate and Delayed Binding
• Assigning /Equivalent
Multiple IP
Addresses
• Immediate and
Delayed Binding
4 Web The proposed For wider participation, We would like Please refer the
Application appliance/softwa to request the honorable tendering revised
Firewall re should be committee to amend the clause as specifications
with Server EAL2 certified. requested. given below.
Load "The proposed appliance/software
Balancer should be EAL2 certified/Make in
/Point India"
31/Page
no.43
5 Web Capable of In order to switch over the Please refer the
Application handling applications traffic like web app, email revised
Firewall complete Full app etc. the GSLB solution must specifications
with Server DNS bind understand all types of DNS records given below.
Load records including and not just A or AAAA. Kindly add
Balancer/Po A, AAAA, etc. for following functionality for complete
int 34/Page IPv4/IPv6 Solution. It is suggested to amend
no.43 this clause as :-
The Proposed Solution must have
Global Server Load Balancing and
should be able to host SRV Records,
AAAA Records, A, PTR, MX, TXT,
SOA, NS, Dname, Dmarc Records
and should also support DNSSEC.
6 Web Application load IPS is completely different technology Please refer the
Application balance with even deployment is different. Kindly revised
Firewall functionality of remove the IPS feature in the specifications
with Server Application specifications s for the wider given below.
Load delivery features participations of OEM. It is suggested
Balancer/Po , to amend the clause as "Application
Page 91 of 174
int 44 Antivirus, IP load balance with functionality of
a/Page Reputation, IPS, Application delivery features,
no.44 WAF Security, Antivirus, IP Reputation, WAF
Credential Security, Credential Stuffing Defense,
Stuffing Zero day prevention, DLP, Analytics,
Defense, Bot protection, logs, High Availability
Zero day and reporting from day 1. OEM
prevention , DLP should be present in India from at
, Analytics ,Bot least 5 years and Proposed solution
protection ,logs, should support 24x7x365 OEM TAC
High Availability support and advance Next Business
and reporting Day Hardware replacement. The
from day 1. OEM proposed equipments must come
should be with 5 year warranty and onsite
present in India support. Installation, basic
from at least 5 configuration (at least 2 domains),
years and and six days of training on essential
Proposed aspects of the WAF/ADC for the IT
solution should team of the High Court of M.P.,
support Jabalpur.
24x7x365 OEM The WAF/ADC should support to
TAC support store all log of minimum 8months
and advance period
Next Business on external storage such as
Day Hardware NAS/SAN. The required external
replacement. storage
The proposed (Hitachi VSP E590H through) will be
equipments provided by High Court of M.P"
must come with
5 year warranty
and onsite
support.
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum
8months period
on external
Page 92 of 174
storage such as
NAS/SAN. The
required external
storage
(Hitachi VSP
E590H through)
will be provided
by High Court of
M.P.
20. M/s CCS Computers Pvt Ltd.
1 Section – The solution Request you to modify the OEM Please refer the
VII should specific clause as: revised
Clause No- automatically The solution should specifications
7. Technical group servers automatically/Manually group servers given below.
Specificatio that work closely that work closely together based on
ns s together based analysis of communication between
Specificatio on analysis of them
ns – C” communication
Network between them
Monitoring
System
Page No.-
44
2 Section – The solution The required features is not the Please refer the
VII should standard ask of EMS module and to revised
Clause No- automatically achive this solution dedicated APM specifications
7. Technical build tool will be required so we request given below.
Specificatio visualizations you to remove this clause for wider
ns s that shows participate
Specificatio dependency
ns – C” between
Network switches,
Monitoring routers,
System physical/virtual
Page No.- host, Containers,
44 storages, cluster
software,
business
applications and
other entities. It
should also have
the capability to
detect
applications that
span from
Datacenter and
end in a public
or a private
cloud with
interconnects
between them.
Page 93 of 174
3 Section – The solution Request you to modify the specific Please refer the
VII should be able clause as: revised
Clause No- to automatically The solution should be able to specifications
7. Technical detect software’s automatically/manually detect given below.
Specificatio that are end of software’s that are end of support,
ns s support, end of end of extended support and end of
Specificatio extended life. With respect to OS, it should
ns – C” support and end detect End of support and End of life
Network of life. With as well. On Security, It should be able
Monitoring respect to OS, it to find the patches installed on
System should detect servers along with reports on
Page No.- End of support vulnerable ports. Lastly, it should
44 and End of life integrate with a vulnerability
as well. On management solution to detect blind
Security, It spots in security of nodes missed out
should be able in vulnerability management that are
to find the found to be active in discovery.
patches installed
on servers along As multiple software does not provide
with reports on the required data on any standard
vulnerable ports. protocol so please modify the clause
.Lastly, it should as suggested
integrate with a
vulnerability
management
solution to detect
blind spots in
security of nodes
missed out in
vulnerability
management
that are found to
be active in
discovery.
4 Section –VII Solution offers Request you to provide more details The bidder is
Clause No- multiple on the software/application from requested to visit
7. Technical integration which EMS application need to the High Court of
Specificatio methods which integrate M.P., Jabalpur for
ns s can be used by getting the real
Specificatio customers for time detail of
ns – C” integrating their same before the
Network own systems. submission of bid
Monitoring Integration document.
System should provide
Page No.- the option in
45 both north as
well as south
bound
integration using
multiple options
like RestAPI,
Page 94 of 174
XML, SOAP, etc.
on each module
level. Any fault
details should be
able to send to
third party CRM,
Customer Portal,
UNMS or even
EMS if needed
using the Trap,
XML
5 Section – The solution As per our understanding here need Quote as per
VII should be able to monitor the latency of all the nodes tender document.
Clause No- to track from application server, please clarify
7. Technical connectivity
Specificatio between network
ns s endpoints and
Specificatio display the delay
ns – C” between nodes
Network
Monitoring
System
Page No.-
45
6 Section – Configurations: The required features is not the Removed.
VII create rules that standard ask of NMS solution and
Clause No- automatically can be achieved via ITSM solution,
7. Technical assign deadlines so please confirm here whether new
Specificatio to events based ITSM need to propose here or NMS
ns s on their impact will be integrated with existing
Specificatio on services or running ITSM solution.
ns – C” on end-users,
Network create rules that If Existing please provide OEM and
Monitoring perform version details of the ITSM solution.
System automated
Page No.- assignment of
48 events to the
corresponding
teams, create
rules that control
automated
notification of
interested
stakeholders
about events ,
automatically
handling
duplicate events,
provide event
correlation
capabilities to
Page 95 of 174
combine a set of
different events
into one major
event
7 Section – It should be The required features is not the No change.
VII possible to standard ask of EMS module and to
Clause No- initiate complete achieve this solution dedicated APM
7. Technical discovery of an tool will be required so we request
Specificatio application and you to remove this clause for wider
ns s connected participate
Specificatio components
ns – C” from anywhere
Network in the tree.
Monitoring Therefore it
System should support
Page No.- top down,
44 bottom up and
start anywhere
discovery from
any
node of the
application.
8 Additional Request you to please provide the Already clarified
required details of the IT above.
Infrastructure which will be monitored
in NMS solution.
1) No. Of servers :
i) Physical Server
ii) VMs
iii) Physical server on which
virtualization platform running.
2) No. & Make Of Network devices
i) Router/Switches/Firewall
ii) Wireless Controller /Wi-Fi AP
iii) Storage
3) No. & Name Of Applications
4) No. Of containers.
Or any other IP devices
9 Web Traffic Ports Traffic Ports support: As per the Please refer the
Application support: 4 x present data centre/IT infra revised
Firewall 10 GE Fiber, 4 requirement standard, 10G ports are specifications
with Server x 1G GE Fiber recommended over 1G, As 10G is given below.
Load and 4 x 1G backward-compatible with 1G where
Balancer/Po Copper Port as vies-versa is not possible. And for
int 2/Page from day-1. ADC/WAF/SLB deployment 8 x 10G
no.39 Additionally is more than sufficient because asked
should have 8 x throughput is 40G.please amending
1GE Fiber for this clause.
future use Layer 4 connections per second:
(Break-Out Considering the asked Concurrent
should not be Connections and Layer 4 connections
Page 96 of 174
used). All per second requirement is lower side.
transceivers please amend this clause.
(SM) from day1. Layer 7 requests per second:
Device L4 Considering the asked Concurrent
Throughput: 20 Connections and Layer 7 requests
Gbps and per second requirement is lower side.
scalable upto 40 Please amend this clause.
Gbps It is suggested to amend the clause
Layer 7 requests as :-
per second: Traffic Ports support: 8 x 10 GE
1300,000 SFP+ from day-1
Layer 4 Device L4 Throughput: 20 Gbps and
connection per scalable up to 40 Gbps
second: 500,000 Layer 7 requests per second : 5
Concurrent million
Connection: 38 Layer 4 connections per second: 3
Million Million
RSA CPS (2K RSA CPS(2K Key): 20,000
Key): 20,000 ECC CPS (EC-P256): 12,000 with
ECC CPS (EC- TLS1.3 Support
P256): 12,000 Processor: Intel 12-core CPU or
with TLS1.3 equivalent or better
Support Concurrent Connections: 40 Million
Processor: Intel Processor - Intel 12-core CPU, 64GB
12-core CPU, RAM, minimum 480GB SSD Disk and
64GB RAM, dual power supply.
minimum 480GB The appliance should have 1 x
SSD Disk and 1G RJ45 Management Port and
dual power 1G RJ45 Console port.
supply.
The appliance
should have 1
x 1G RJ45
Management
Port and 1G
RJ45 Console
port.
10 Web The proposed ap Different OEM has different Please refer the
Application pliance should s terminology and technique to achieve revised
Firewall upport the below similar function. We would like to specifications
with Server metrics: request the honorable tendering given below.
Load — Minimum committee to use vendor agnostic
Balancer/Po Misses, terminology for wider participation.
int 6/Page — Hash, — Minimum Misses,
no.40 — Persistent — Hash,
Hash, — Persistent Hash,
— Tunable — Tunable Hash/Equivalent
Hash, — Weighted Hash/Equivalent
— Weighted — Least Connections,
Hash, — Least Connections Per Service,
— Least — Round-Robin,
Page 97 of 174
Connections, — Response Time,
— Least — Bandwidth, etc
Connections Per
Service,
— Round-Robin,
— Response
Time,
— Bandwidth,
etc
11 Web Following Load Virtual Matrix Architecture feature is Please refer the
Application Balancing specific to one ADC OEM. Kindly revised
Firewall Topologies remove this clause for wider specifications
with Server should be participation and for other points given below.
Load supported: please allow similar or equivalent
Balancer/Po • Virtual Matrix feature metrics for broader
int 7/Page Architecture participation.
no.40 • Client Network Following Load Balancing Topologies
Address should be supported:
Translation • Client Network Address Translation
(Proxy IP) (Proxy IP) /Equivalent
• Mapping Ports • Mapping Ports /Equivalent
• Direct Server • Direct Server Return /Equivalent
Return • One Arm Topology Application
• One Arm /Equivalent
Topology • Direct Access Mode /Equivalent
Application • Assigning Multiple IP Addresses
• Direct Access /Equivalent
Mode • Immediate and Delayed Binding
• Assigning /Equivalent
Multiple IP
Addresses
• Immediate and
Delayed Binding
12 Web The proposed For wider participation, We would like Please refer the
Application appliance/softwa to request the honorable tendering revised
Firewall re should be committee to amend the clause as specifications
with Server EAL2 certified. requested. given below.
Load "The proposed appliance/software
Balancer should be EAL2 certified/Make in
/Point 31 India"
/Page no.43
13 Capable of In order to switch over the Please refer the
Web handling applications traffic like web app, email revised
Application complete Full app etc. the GSLB solution must specifications
Firewall DNS bind understand all types of DNS records given below.
with Server records including and not just A or AAAA. Kindly add
Load A, AAAA, etc. for following functionality for complete
Balancer/Po IPv4/IPv6 Solution. It is suggested to amend
int 34/Page this clause as :-
no.43 The Proposed Solution must have
Global Server Load Balancing and
Page 98 of 174
should be able to host SRV Records,
AAAA Records, A , PTR , MX , TXT,
SOA, NS, Dname, Dmarc Records
and should also support DNSSEC.
14 Web Application load IPS is completely different technology Please refer the
Application balance with even deployment is different. Kindly revised
Firewall functionality of remove the IPS feature in the specifications
with Server Application specifications s for the wider given below.
Load delivery features participations of OEM. It is suggested
Balancer/Po , to amend the clause as "Application
int 44 Antivirus, IP load balance with functionality of
a/Page Reputation, IPS, Application delivery features,
no.44 WAF Security, Antivirus, IP Reputation, WAF
Credential Security, Credential Stuffing Defense,
Stuffing Zero day prevention, DLP, Analytics,
Defense, Bot protection ,logs, High Availability
Zero day and reporting from day 1. OEM
prevention , DLP should be present in India from at
, Analytics ,Bot least 5 years and Proposed solution
protection ,logs, should support 24x7x365 OEM TAC
High Availability support and advance Next Business
and reporting Day Hardware replacement. The
from day 1. OEM proposed equipments must come
should be with 5 year warranty and onsite
present in India support. Installation, basic
from at least 5 configuration (at least 2 domains),
years and and six days of training on essential
Proposed aspects of the WAF/ADC for the IT
solution should team of the High Court of M.P.,
support Jabalpur.
24x7x365 OEM The WAF/ADC should support to
TAC support store all log of minimum 8months
and advance period on external storage such as
Next Business NAS/SAN. The required external
Day Hardware storage (Hitachi VSP E590H through)
replacement. will be provided by High Court of
The proposed M.P"
equipments
must come with
5 year warranty
and onsite
support.
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
Page 99 of 174
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum
8months period
on external
storage such as
NAS/SAN. The
required external
storage
(Hitachi VSP
E590H through)
will be provided
by High Court of
M.P.
21. M/s ITSC
1 Specificatio The proposed DDoS protection should be provided The vendor may
ns – B” appliance should with the help of stateless appliance provide DDoS
Web be a dedicated as it doesn't maintain any session Protection with
Application ADC/WAF/SLB table, this is first and foremost criteria the help of any
Firewall appliance having to choose DDoS protection appliance. devices /software
with Server DDoS ADC/WAF/SLB is state full appliance; if the DDoS
Load protection, SSL hence DDoS should not be part of protection not
Balancer inspection, and ADC/WAF/SLB. Suggested Clause: available in
Clause No real-time threat The proposed appliance should be a dedicated
1 Page 39 intelligence, it dedicated ADC/WAF/SLB appliance ADC/WAF/SLB
should not be having SSL inspection, and real-time appliance.
part of any threat intelligence. It should not be
Firewall or UTM. part of any Firewall or UTM
2 Specificatio Traffic Ports Layer-7 RPS is not in line with the Please refer the
ns – B” support: 4 x 10 requirement of Layer-4 CPS, both revised
Web GE Fiber, 4 x 1G should be in line with the requirement specifications
Application GE Fiber and 4 x asked. As these appliances are given below.
Firewall 1G Copper Port purpose-built appliance, asking the
with Server from day-1. unnecessary RAM and Hard disk will
Load Additionally, not help for anything, it will
Balancer should have 8 x unnecessarily increase the overall
Clause No 1GE Fiber for cost without any requirement.
2 Page 39 future use Suggested Clause: Traffic Ports
(Break-Out support: 4 x 10 GE Fiber, 4 x 1G GE
should not be Fiber and 4 x 1G Copper Port from
used). All day-1. Additionally, should have 8 x
transceivers 1GE Fiber for future use (Break-Out
(SM) from day1. should not be used). All transceivers
Device L4 (SM) from day1. Device L4
Throughput: 20 Throughput: 20 Gbps and scalable
Gbps and upto 40 Gbps Layer 7 requests per
Page 100 of 174
scalable upto 40 second: 900,000 Layer 4 connection
Gbps Layer 7 per second: 500,000 Concurrent
requests per Connection: 38 Million RSA CPS (2K
second: Key): 20,000 ECC CPS (EC-P256):
1300,000 Layer 12,000 with TLS1.3 Support
4 connection per Processor: Intel 12-core CPU, 32GB
second: 500,000 RAM, minimum 100GB SSD Disk and
Concurrent dual power supply. The appliance
Connection: 38 should have 1 x 1G RJ45
Million RSA CPS Management Port and 1G RJ45
(2K Key): 20,000 Console port.
ECC CPS (EC-
P256): 12,000
with TLS1.3
Support
Processor: Intel
12-core CPU,
64GB RAM,
minimum 480GB
SSD Disk and
dual power
supply. The
appliance should
have 1 x 1G
RJ45
Management
Port and 1G
RJ45 Console
port.
3 Specificatio The proposed ICSA certification is no longer Please refer the
ns – B” Solution should available, it is discontinued now. revised
Web have ICSA Suggested Clause: The proposed specifications
Application Certified and solution should be PCI Compliant given below.
Firewall PCI Compliant WAF on the same Hardware from the
with Server WAF on the same OEM. It must be able to handle
Load same Hardware OWASP Top 10 attacks and WASC
Balancer from the same Web Security Attack Classification.
Clause No OEM. It must be
18 Page 41 able to handle
OWASP Top 10
attacks and
WASC Web
Security Attack
Classification.
4 Specificatio Application load Signature protection, Anti-Virus Please refer the
ns – B” balance with should be part of dedicated solution; revised
Web functionality of it can’t be added on top of ADC. specifications
Application Application Suggested Clause: Application load given below.
Firewall delivery balance with functionality of
with Server features, Application delivery features, IP
Load Antivirus, IP Reputation, WAF Security, Credential
Page 101 of 174
Balancer Reputation, IPS, Stuffing Defense, Zero-day
Clause No WAF Security, prevention, DLP, Analytics, Bot
44 a Page Credential protection, logs, High Availability and
43 Stuffing reporting from day 1. OEM should be
Defense, Zero- present in India from at least 5 years
day prevention, and Proposed solution should support
DLP, Analytics, 24x7x365 OEM TAC support and
Bot protection, advance Next Business Day
logs, High Hardware replacement. The
Availability and proposed equipment’s must come
reporting from with 5-year warranty and onsite
day 1. OEM support. Installation, basic
should be configuration (at least 2 domains),
present in India and six days of training on essential
from at least 5 aspects of the WAF/ADC for the IT
years and team of the High Court of M.P.,
Proposed Jabalpur. The WAF/ADC should
solution should support to store all log of minimum
support 8months period on external storage
24x7x365 OEM such as NAS/SAN. The required
TAC support and external storage (Hitachi VSP E590H
advance Next through) will be provided by High
Business Day Court of M.P.
Hardware
replacement.
The proposed
equipment’s
must come with
5 year warranty
and onsite
support.
Installation,
basic
configuration (at
least 2
domains), and
six days of
training on
essential
aspects of the
WAF/ADC for
the IT team of
the High Court of
M.P., Jabalpur.
The WAF/ADC
should support
to store all log of
minimum
8months period
on external
storage such as
Page 102 of 174
NAS/SAN. The
required external
storage (Hitachi
VSP E590H
through) will be
provided by High
Court of M.P.
5 Specificatio The proposed The NSS lab has last published the Removed.
ns - A firewall vendor report in 2019. The Lab is no longer
Firewall must have over operational. Hence we request you to
Technical 97% of Exploit modify the clause as suggested.
Specificatio Block rate in Suggested Clause: "The firewall
ns Clause latest NGFW solution be should be NSS labs
no 2 Pg 32 NSS Lab Test recommended / SE Labs
report. recommended or equivalent"
6 Specificatio 6 X 10G The asked interfaces are high in Please refer the
ns - A Copper/RJ45 number and this will lead to price revised
Firewall Day 1 8 X 1/10G escalation. We request you to modify specifications
Technical SFP/SFP+ Day the clause as suggested to allow us given below.
Specificatio 1 with LR/SM to participate and be price
ns s Clause transceivers and competitive. Suggested Change:
no 3 Pg 32 8x3m patch 8x1G Copper / RJ45 Day 1,
cords. 4X 8x1/10G/25G SFP/SFP+ Day 1 with
10/25Gig SFP28 4x10G and 4x25G SR / MM
Ports with 4 nos. transceivers and 8 x 3m patch cords
of LR from day 1. The firewall should have
transceivers and a free slot for future expansion to
4x3m patch support 40/100 interfaces as needed.
cords from Day
one Minimum 2
x 10G HA port in
addition to
requested data
ports, Dedicated
1 X 10/100/1000
RJ45
Management
Port
7 Specificatio "Bidder has to Our logging appliance has certain The syslog server
ns - A propose on storage. The log size will depend on will be provided
Firewall premise the type of logging enabled and the by the High
Technical dedicated volume of logs. For exporting the logs Court.
Specificatio logging, to external storage, there is a need
ns s Clause analytics & for syslog server. We request you to
no 16 Pg 38 reporting provide a syslog server which will be
solution from mapped to the external storage.
same OEM
(Virtual /Physical
Appliance) from
day1, the
logging solution
Page 103 of 174
to be deployed
at Data Center
only. In Case of
Virtual
Appliance,
bidder to
consider
Required
computing /
hardware
resource for the
VM. The firewall
should support
to store all log of
minimum
8months period
on external
storage such as
NAS/SAN. The
required external
storage (Hitachi
VSP E590H
through) will be
provided by High
Court of M.P.
Required
Features:
Should Deliver
single-pane
visibility, also
have reporting
facility to
generate reports
on virus
detected over
different
protocols, top
sources for
viruses,
destination for
viruses, top
viruses etc.
Should have
options to
generate
Predefined or
customized
Advance reports
in different
formats. The
solution should
Page 104 of 174
have
configurable
options to
schedule the
report
generation. Log
retention
customization by
category.
Solution should
offer Centralized
NOC/SOC
Visibility for the
Attack Surface.
Bidder has to
include any
additional
license for
analytics /event
correlation from
day1. The
solution should
machine
learning
capability to
detect the exploit
and not depend
on the
vulnerabilities
with trained
models and
traffic classifiers.
The same
should be
available on
public website to
validate the
capabilities”.
Pre-Bid Query For The Network Monitoring System
1 “Specificati The solution Please consider remove "2008.2012", Please refer the
ons – C” should allow Only OEM supported O.S can be revised
Network monitoring of supported specifications
Monitoring Server Status given below.
System/ and Availability,
Servers CPU Utilization,
&System Memory
Monitoring/ Utilization,
35/Pg Process
No.45 Monitoring, File
System
Monitoring, Disk
Page 105 of 174
Utilization of
RHEL/Centos,
SUSE, Ubuntu
servers/Window
s 2008,
2012,2016,2019,
2022.
2 “Specificatio Solution offers Please consider removing "XML, Please refer the
ns – C” multiple SOAP& Trap" as RestAPI based revised
Network integration integration is the industry best specifications
Monitoring methods which practice and modify the point to given below.
System/ can be used by "Solution offers multiple integration
Servers & customers for methods which can be used by
System integrating their customers for integrating their own
Monitoring/ own systems. systems. Integration should provide
17/Pg Integration the option in both north as well as
No.45 should provide south bound integration using
the option in multiple options like RestAPI on each
both north as module level. Any faultdetails should
well as south be able to send to third party CRM,
bound Customer Portal,UNMS or even EMS
integration using if needed."
multiple
options like
RestAPI, XML,
SOAP, etc. on
each module
level. Any fault
details should be
able to send to
third party CRM,
Customer Portal,
UNMS or even
EMS if needed
using the Trap,
XML
3 “Specificatio The solution Please elaborate what kind of Please refer the
ns – C” should be able recommendations is expected from revised
Network to gather the solution? specifications
Monitoring capacity data given below.
System/ from vCenter,
Servers & HMC, Physical
System servers, etc.
Monitoring/ Generate report
40/Pg and provide
No.46 recommendation
4 “Specificatio The proposed Please consider removing end point Please refer the
ns – C” solution should devices like desktop to "The revised
Network be able to proposed solution should be able to specifications
Monitoring monitor the monitor the availability, given below.
System/ availability, health and performance of physical
Page 106 of 174
Servers & health and servers, virtual servers, web
System performance of service (Apache), database service
Monitoring/ physical servers, (MySQL & PGSQL), Network
Pg No.43 virtual servers, devices like routers, switches, Kiosks,
web display boards, URL monitoring, other
service snmp/ping enabled devices like UPS
(Apache), and AC from single dash board."
database service
(MySQL &
PGSQL),
Network
devices like
routers,
switches, end
point devices
like desktop,
Kiosks, display
boards, URL
monitoring, other
snmp enabled
devices like UPS
and AC from
single dash
board.
5 “Specificatio The solution Please consider removing this point Yes removed.
ns – C” should show
Network storage growth
Monitoring rates and project
System/ when the
Storage storage capacity
Monitoring/ will be reached
40/Pg
No.46
6 “Specificatio Provides multi- Different OEM's have different level Please refer the
ns – C” level (preferably of severity definitions. revised
Network six-level) specifications
Monitoring Severity given below.
System/Log definition, will
ging/Reporti handle
ng/Alert/thre events
shold/65/Pg automatically
No.47 and inform the
designated
person as per
operational
requirement
7 “Specificatio Capacity Please consider removing this Yes made
ns – C” Reservations: specifications . Optional.
Network tool should allow
Monitoring management of
System/ resource
Page 107 of 174
System/ allocations and
Another reservations (for
Features/72 services,
/Pg No.48 applications or
other needs),
identify resource
shortages and
provide
information for
further analysis
or procurement
8 “Specificatio The licenses Please consider modifying to "The Please refer the
ns – C” should be licenses should be On Prem revised
Network perpetual with Subscription with 05 years support specifications
Monitoring 05 years support /updates /upgrade." given below.
System/ /updates
Licensing/8 /upgrade.
0/Pg No.49
9 “Specificatio The bidder has Please consider removing this Yes removed.
ns – C” to quote only 01 specifications as EMS based OEM's
Network product of single do not provide solutions for Web
Monitoring make / brand at Application Firewall with Server Load
System/ a time and not Balancer.
Note/4/Pg multiple brands
No.49 for same item.
10 “Specificatio Provides Please consider modifying the Please refer the
ns – C” provision to draw specifications to "The tool should revised
Network & map user enable business users or specifications
Monitoring specific network administrators to efficiently design given below.
System/ diagram and modify the service model
Discovery/1 (network diagram) using templates "
5/Pg No.44
11 Additional The bidder L1 should be considered for the Yes accepted.
points to be should be individual line item.
considered allowed to quote
for individual line
item
12 Additional Product This will help in evaluating the Yes accepted.
points to be demonstration product as per the requirement of the
considered should be called High Court.
before the
finalization of the
Technical bid
22. M/s SISL Infotech Private Limited
1 Section - VII Device L4 Due to license capping the OEMs Please refer the
7.Technical Throughput: 20 have the advantage to quote higher revised
Specificatio Gbps and for the incremental license which is specifications
ns / scalable upto 40 not cost effective to customer. Hence given below.
Specificatio Gbps request you to amend the point as
ns - B/ "The ADC+WAF should be fully
Web populated with the license throughput
Page 108 of 174
Application of 40 Gbps from Day-1"
Firewall
with Server
Load
Balancer /
Point No.2
Page No.
39
2 Section - VII Processor: Intel To derive the performance number Please refer the
7.Technical 12-core CPU, from the specific compute numbers revised
Specificatio 64GB RAM, does not decide performance of the specifications
ns / minimum 480GB devices at all due to Different given below.
Specificatio SSD Disk and architecture, ASICS, FTGA cards etc
ns - B/ dual power have different hardware requirement
Web supply. which cannot be generalized for
Application performance. Request you to change
Firewall the required processor to Intel Xeon
with Server 8-core or higher.
Load
Balancer /
Point No.2
Page No.
39
3 Section - VII The appliance Security appliance should be Please refer the
7.Technical hardware should evaluated based on their security revised
Specificatio be a multicourse effectiveness, features, and specifications
ns / CPU functionality, rather than their given below.
Specificatio architecture and architecture. The current clause
ns - A/ should not be seems to favor PC-based
Firewall proprietary ASIC architecture, potentially excluding
Technical based in nature ASIC OEMs from the tender. We
Specificatio & should be would like to emphasize that ASIC
ns s / Point open technology is no longer proprietary,
No.4 architecture as many leading OEMs are adopting
Page No. based on multi- it for its superior performance. Please
32 core cpu's to refer to the URL below, which
protect & scale highlights that ASIC is not exclusive
against dynamic to Fortinet. Therefore, we request the
latest security removal of this clause and suggest
threats. The that MP High court to consider
appliance architectures based on their
hardware should performance and security
have a hardened effectiveness.
operating
system from the Therefore Request to amend to new
OEM and should clause as below:
support
minimum of The appliance hardware should be a
64GB of RAM to multicore CPU architecture or should
make sure all be proprietary ASIC based in nature
the security & should be open architecture based
Page 109 of 174
capabilities are on multi-core cpu's to protect & scale
provided without against dynamic latest security
degradation from threats. The appliance hardware
day one. should have a hardened operating
The firewall system from the OEM
should have
integrated The firewall should have integrated
redundant fan redundant fan and dual redundant hot
and dual swappable power supply to remove
redundant hot any single point of failure in the
swappable solution
power supply to
remove any
single point of
failure in the
solution
4 Section - VII OEM and ASCI solution does not require higher Please refer the
7.Technical should support memory and CPU to deliver the revised
Specificatio minimum of desire functionality. Only PC based specifications
ns / 64GB of RAM to architecture require high memory. We given below.
Specificatio make sure all suggest removing this clause as it is
ns - A/ the security favoring single OEM devices. We
Firewall capabilities are emphasize MP High court team to
Technical provided without evaluate the Firewall solution based
Specificatio degradation from on the performance parameters Not
ns s / Point day one. memory and CPU.
No.4 Therefore request to amend to new
Page No. clause as:
32 OEM and should support minimum of
64GB of RAM to make sure all the
security capabilities are provided
without degradation from day one or
or should be proprietary ASIC based
in nature to make sure all the security
capabilities are provided without
degradation from day one.
5 Section - VII The NGFW Every OEM has different ways to Please refer the
7.Technical throughput of the measure the throughput values. We revised
Specificatio firewall should request to changes so all major OEM specifications
ns / be a minimum match this and can participate given below.
Specificatio 20 Gbps with Therefore request to amend to new
ns - A/ application clause as:
Firewall identification and The NGFW throughput of the firewall
Technical firewalling should be a minimum 15 (enterprise
Specificatio enabled with real mix /Real world with logging enabled)
ns s / Point world/enterprise/ OR Application throughput measured
No.5 production traffic with 64K http minimum 20Gbps.
Page No. with logging Threat prevention throughput
32 enabled. The minimum 10Gbps ( Enterprise Mix /
Threat Real World with logging enabled)
Prevention
Page 110 of 174
/NGIPS
throughput after
enabling IPS,
AVC,
antimalware,
sandboxing with
logging enabled
should be 12
Gbps.
6 Section - VII NGFW Firewall Most of the OEM is publish the Please refer the
7.Technical should support connection per second and revised
Specificatio at least concurrent session in TCP. It's highly specifications
ns / 1400,000 Layer recommended on the basis of the given below.
Specificatio 7 Concurrent ports count that the connections
ns - A/ sessions requirement must be higher so device
Firewall not becomes bottle neck. Asking the
Technical NGFW Firewall lower connections is favoring specific
Specificatio should support OEM model.
ns s / Point at least 150,000 Therefore request for modifying to
No.5 connections per Min 500K Connection per Second
Page No. second L3/L4 or and 5M concurrent connections
32 New Layer 7
connections per
second – Min
90000
7 Section - VII Should support Favoring to specific OEM signature Please refer the
7.Technical more than count. revised
Specificatio 19,000 Therefore request for modifying to specifications
ns / (excluding allow min 10000 Signatures. given below.
Specificatio custom
ns - A/ signatures) IPS
Firewall signatures or
Technical more. Solution
Specificatio should be able
ns s / Point to passively
No.6 detect endpoints
Page No. and
33 infrastructure for
threat correlation
and Indicators of
Compromise
(IoC)
intelligence. The
signatures
should also have
categorization
based on MITRE
TTP's
8 Section - VII Should support Every OEM has different counts and Please refer the
7.Technical Reputation- and categories. This is favoring to specific revised
Specificatio category-based OEM nos. specifications
Page 111 of 174
ns /URL filtering Request to remove this clause given below.
Specificatio offering
ns - A/ comprehensive
Firewall alerting and
Technical control over
Specificatio suspect web
ns s / Point traffic and
No.7 enforces policies
Page No. on more than
35 250 million of
URLs in more
than 75+
categories from
day1.
9 Section - VII The Solution Favoring to Specific OEM Please refer the
7.Technical should support Therefore request to amend to new revised
Specificatio DNS security in clause as: specifications
ns / line mode and The Solution should support DNS given below.
Specificatio not proxy mode. security in line mode/proxy mode.
ns - A/ Necessary Necessary licenses to be included
Firewall licenses to be from day 1.
Technical included from
Specificatio day 1.
ns s / Point
No.11
Page No.
36
10 Section - VII DNS security Every OEM has different counts in Please refer the
7.Technical should block threat intelligence asking specific revised
Specificatio known bad favoring to specific OEM. specifications
ns / domains and given below.
Specificatio predict with Request to remove 10M malicious
ns - A/ advanced domain
Firewall machine
Technical learning
Specificatio technology and
ns s / Point should have
No.11 global threat
Page No. intelligence of at
36 least 10 million
malicious
domains.
11 Section - VII The solution Favoring to Specific OEM: Should Please refer the
7.Technical should integrate have OEM human-driven adversary revised
Specificatio and correlate to tracking and malware reverse specifications
ns / provide effective engineering, including insight from given below.
Specificatio prevention globally deployed honey pots.
ns - A/ against. New C2 Should take inputs from at least 25
Firewall domains, file third-party sources of threat
Technical download source intelligence
Specificatio domains, and
Page 112 of 174
ns s / Point domains in Request to remove this clause.
No.11 malicious email
Page No. links.
36
Integrate with
URL Filtering to
continuously
crawl newfound
or uncategorized
sites for threat
indicators.
Should have
OEM human-
driven adversary
tracking and
malware reverse
engineering,
including insight
from globally
deployed honey
pots. Should
take inputs from
at least 25 third-
party sources of
threat
intelligence.
12 Section – The solution Request you to modify the OEM Please refer the
VII should specific clause as: revised
Clause No- automatically The solution should automatically specifications
7. Technical group servers /Manually group servers that work given below.
Specificatio that work closely closely together based on analysis of
ns s together based communication between them
Specificatio on analysis of
ns – C” communication
Network between them
Monitoring
System
Page No.-
44
13 Section – The solution The required features is not the Please refer the
VII should standard ask of EMS module and to revised
Clause No- automatically achieve this solution dedicated APM specifications
7. Technical build tool will be required so we request given below.
Specificatio visualizations you to remove this clause for wider
ns s that show participate
Specificatio dependency
ns – C” between
Network switches,
Monitoring routers,
System physical/virtual
Page No.- host, Containers,
Page 113 of 174
44 storages, cluster
software,
business
applications and
other entities. It
should also have
the capability to
detect
applications that
span from
Datacenter and
end in a public
or a private
cloud with
interconnects
between them.
14 Section – The solution Request you to modify the specific Please refer the
VII should be able clause as: revised
Clause No- to automatically The solution should be able to specifications
7. Technical detect software’s automatically /manually detect given below.
Specificatio that are end of software’s that are end of support,
ns s support, end of end of extended support and end of
Specificatio extended life. With respect to OS, it should
ns – C” support and end detect End of support and End of life
Network of life. With as well. On Security, It should be able
Monitoring respect to OS, it to find the patches installed on
System should detect servers along with reports on
Page No.- End of support vulnerable ports. Lastly, it should
44 and End of life integrate with a vulnerability
as well. On management solution to detect blind
Security, It spots in security of nodes missed out
should be able in vulnerability management that are
to find the found to be active in discovery.
patches installed
on servers along As multiple software does not provide
with reports on the required data on any standard
vulnerable ports. protocol so please modify the clause
.Lastly, it should as suggested
integrate with a
vulnerability
management
solution to detect
blind spots in
security of nodes
missed out in
vulnerability
management
that are found to
be active in
discovery.
15 Section – Solution offers Request you to provide more details Please refer the
Page 114 of 174
VII multiple on the software/application from revised
Clause No- integration which EMS application need to specifications
7. Technical methods which integrate given below.
Specificatio can be used by
ns s customers for
Specificatio integrating their
ns – C” own systems.
Network Integration
Monitoring should provide
System the option in
Page No.- both north as
45 well as south
bound
integration using
multiple options
like RestAPI,
XML, SOAP, etc.
on each module
level. Any fault
details should be
able to send to
third party CRM,
Customer Portal,
UNMS or even
EMS if needed
using the Trap,
XML
16 Section – The solution As per our understanding here need Please refer the
VII should be able to monitor the latency of all the nodes revised
Clause No- to track from application server, please clarify specifications
7. Technical connectivity given below.
Specificatio between network
ns s endpoints and
Specificatio display the delay
ns – C” between nodes
Network
Monitoring
System
Page No.-
45
17 Section – Configurations: The required features is not the Please refer the
VII create rules that standard ask of NMS solution and revised
Clause No- automatically can be achieved via ITSM solution, specifications
7. Technical assign deadlines so please confirm here whether new given below.
Specificatio to events based ITSM need to propose here or NMS
ns s on their impact will be integrated with existing
Specificatio on services or running ITSM solution.
ns – C” on end-users,
Network create rules that If Existing please provide OEM and
Monitoring perform version details of the ITSM solution.
System automated
Page 115 of 174
Page No.- assignment of
48 events to the
corresponding
teams, create
rules that control
automated
notification of
interested
stakeholders
about events ,
automatically
handling
duplicate events,
provide event
correlation
capabilities to
combine a set of
different events
into one major
event
18 Section – It should be The required features is not the Please refer the
VII possible to standard ask of EMS module and to revised
Clause No- initiate complete achieve this solution dedicated APM specifications
7. Technical discovery of an tool will be required so we request given below.
Specificatio application and you to remove this clause for wider
ns s connected participate
Specificatio components
ns – C” from anywhere
Network in the tree.
Monitoring Therefore it
System should support
Page No.- top down,
44 bottom up and
start anywhere
discovery from
any
node of the
application.
19 Additional Request you to please provide the Please visit High
required details of the IT Court of M.P. for
Infrastructure which will be monitored information.
in NMS solution
1) No. Of servers:
i) Physical Server ii) VMs
iii) Physical server on which
virtualization platform running.
2) No. & Make Of Network devices
i) Router /Switches Firewall
ii) Wireless Controller /Wifi AP
iii) Storage
3) No. & Name Of Applications
Page 116 of 174
4) No. Of containers.
Or any other IP devices
20 Section-II Experience in We understand that bidder need to Yes, but to have
Point No. Supply, show similar experience of supply, experience as per
2.15.2(ii) Installation, installation and system integration of the tender
Page No. commissioning, Firewall, WAF & NMS tool and similar document.
10 & 11 Maintenance of IT equipments through one, two and In this regard the
firewall, WAF, three PO as per given option. We decision of the
NMS tool and also understand that experience of all High Court shall
similar IT stated category can be shown in be final.
equipments multiple order as well as per given
during last 05 option.
years ending last
day of month Please confirm.
previous to the
month of
publication of
this tender,
should be either
of the following:-
“Specifications – A”
Firewall Technical Specifications
S. Feature Technical Specifications Revised Specifications after Compliance
No clarification /query Yes / No with
. Remarks (if any)
1 Type Next Generation
Enterprise Firewall
2 3rd party The proposed firewall Removed
Test vendor must have over
Certificati 97% of Exploit Block rate
on in latest NGFW NSS Lab
Test report.
The proposed vendor The proposed vendor must be
must be in the Leader’s or in the Leader’s or challenger
challenger quadrant of the quadrant of the Network
Network Firewalls Gartner Firewalls Gartner Magic
Magic Quadrant for latest Quadrant for latest year report
year report. OR Top 5 OEMs in Network
Firewalls (NGFW) according to
the latest report from IDC
(International Data
Corporation).
3 Interface 6 X 10G Copper/RJ45 Minimum 6x1G copper or fiber
and Day 1 from day1. (In case of fiber, the
Connectivi vendor have to provide the
ty appropriate no. of transceivers
Requirem and patch cords)
ent 8 X 1/10G SFP/SFP+ Day Minimum 4 X 1/10G SFP/SFP+
1 with LR/SM transceivers Day 1 with LR/SM transceivers
and 8x3m patch cords. and 8x3m patch cords.
4X 10/25Gig SFP28 Ports Minimum 2X 10/25Gig SFP28
with 4 nos. of LR Ports or Minimum 2x 40/100G
transceivers and 4x3m QSFP28 ports with appropriate
patch cords from Day one nos. of LR/SM transceivers and
4x3m patch cords from Day
one
Page 140 of 174
Minimum 2 x 10G HA port Minimum 1 x 1G HA port in
in addition to requested addition to requested data ports
data ports, Dedicated 1 X or higher, Dedicated 1 X
10/100/1000 RJ45 10/100/1000 RJ45
Management Port Management Port
Should have support Removed
2x40/100G for future use.
4 Hardware The appliance based No Change
Architectu security platform should
re provide Next-Gen Firewall
functionality like IPS,
Application Control, URL
and content filtering and
Anti-malware functionality
in a single appliance from
day one.
The appliance hardware The appliance hardware should
should be a multicore be a multicore CPU
CPU architecture and architecture or should be
should not be proprietary proprietary ASIC based in
ASIC based in nature & nature & should be open
should be open architecture based on multi-
architecture based on core cpu's to protect &scale
multi-core cpu's to protect against dynamic latest security
& scale against dynamic threats. The appliance
latest security threats. The hardware should have a
appliance hardware hardened operating system
should have a hardened from the OEM and should
operating system from the support minimum of 64GB of
OEM and should support RAM to make sure all the
minimum of 64GB of RAM security capabilities are
to make sure all the provided without degradation
security capabilities are from day one or should be
provided without proprietary ASIC based in
degradation from day one. nature to make sure all the
security capabilities are
provided without degradation
from day one.
The firewall should have The firewall should have
integrated redundant fan integrated redundant fan and
and dual redundant hot dual redundant power supply to
swappable power supply remove any single point of
to remove any single failure in the solution
point of failure in the
solution
5 Performan The NGFW throughput of The NGFW throughput of the
ce & the firewall should be a firewall should be a minimum
Scalability minimum 20 Gbps with 20 Gbps with application
application identification identification and firewalling
and firewalling enabled enabled with real
with real world/enterprise/ world/enterprise mix/
Page 141 of 174
production traffic with production traffic with logging
logging enabled. The enabled. The Threat
Threat Prevention/NGIPS Prevention/NGIPS throughput
throughput after enabling after enabling IPS, AVC,
IPS, AVC, antimalware, antimalware, sandboxing with
sandboxing with logging logging enabled should be 10
enabled should be 12 Gbps.
Gbps.
The firewall should No Change.
provide 12 Gbps of IPSEC
VPN throughput
NGFW Firewall should NGFW Firewall should support
support at least 1400,000 at least 1400,000 Layer 7
Layer 7 Concurrent Concurrent
sessions sessions/connections.
NGFW Firewall should No Change.
support at least 150,000
connections per second
L3/L4 or New Layer 7
connections per second –
Min 90,000
High Availability: No Change.
Active/Active and
Active/Passive and should
support session state
synchronization among
firewalls from day 1.
6 Next Gen Firewall should support Firewall should support
Firewall creating security policies creating security policies with
Features with source/destination source/destination zones,
zones, networknetwork subnets/ranges,
subnets/ranges, relocation relocation objects or geo
objects, ports/protocols,location objects,
applications, user/group ports/protocols, applications,
attributes, URL/URL user/group attributes, URL/URL
categories and action on categories and action on traffic.
traffic. The actions on the The actions on the traffic
traffic should be to allow, should be to allow, alert, block,
alert, block, block and block and continue, reset or the
continue, reset. Theactions on the traffic should be
firewall should provide to accept, drop, ask, inform,
time based polices with reject, user auth, client auth
options for reccurrecing etc. The firewall should provide
schedule or one time time based polices with options
schedule. for reccurrecing schedule or
one time schedule.
The firewall should The firewall should supports
supports NAT's like NAT's like source NAT,
source NAT, destination destination NAT, U-Turn NAT
NAT, U-Turn NAT. or hairpin or loopback or better
Firewall should support option. Firewall should support
Page 142 of 174
Nat66, Nat 64 or Nat46 Nat66, Nat 64 or Nat46
functionality functionality
Solution should provides No Change
capabilities like dynamic
real-time metrics based,
policy-based, application
path selection across
multiple WAN connections
and supports service
chaining for additional
services such as WAN
optimization and firewalls.
The solution should No Change
provide the following
routing capabilities:
OSPF, EIGRP, BGP, RIP,
Multicast, Static,
Route Tracking(SLA) No Change
PBR, ISIS, BFD, ECMP,
VRF, Application based
Routing
Should support capability Should support capability to
to create multiple virtual create multiple virtual
context/instance with strict context/instance.
hardware resource (CPU,
Memory & Storage)
reservation and ensure
traffic isolation between
virtual context/instance
The solution should be The solution should be able to
able to provide contextual provide contextual information
information about the about the hosts and the
hosts and the network network subnets present such
subnets present such that that the admins are able to
the admins are able to capture all the required
capture all the required information and build the
information and build the security profiles based on the
security profiles based on details shown on the solution.
the details shown on the The details captured should
solution. The details consist of the following: IOC's ,
captured should consist of IP address, Applications, Ports
the following: IOC's , MAC &protocols, vulnerabilities etc.
addresses, IP address,
Applications, Ports
&protocols, vulnerabilities
etc.
Should support capability No Change
to integrate with other
security solutions to
receive contextual
“Specifications – C”
Network Monitoring System
S. The proposed solution should be able to Revised after clarification. Complian
No. monitor the availability, health and The proposed solution ce
performance of physical servers, virtual should be able to monitor Yes / No
servers, web service (Apache), database the availability, health and with
service (MySQL & PGSQL), Network performance of physical Remarks
devices like routers, switches, end point servers, virtual servers, (if any)
devices like desktop, Kiosks, display web service (Apache),
boards, URL monitoring, other snmp database service (MySQL &
enabled devices like UPS and AC from PGSQL), Network devices
single dash board. like routers, switches,
Kiosks, display boards,
URL monitoring, other
snmp enabled devices like
UPS and AC from single
dash board.
Discovery
1 The solution should be able to do a complete No Change.
discovery of IT environment across
distributed (i.e., physical, virtual, network,
application, middleware, storage, databases)
and heterogeneous environment and provide
a clear and visual mapping of IT
infrastructure to business services. This
should be aided by 5000+ asset type
discovery signatures to detect the DC
comprehensively. System should have
option for multiple options for discovery
including IP address based discovery, IP
address range discovery, CSV based
discovery for bulk discovery.
2 The solution should automatically group The solution should
servers that work closely together based on automatically/manually group
analysis of communication between them servers that work closely
together based on analysis of
communication between them
or grouping criteria such as
tag and types between them.
Page 163 of 174
3 Discovery has to work intelligently by No Change.
identifying the device in the network by the
given IP range and categorize into network
devices and servers with vendor and model
details.
4 The solution should automatically build The solution should
visualizations that show dependency automatically build
between switches, routers, physical/virtual visualizations that show
host, Containers, storages, cluster software, dependency between
business applications and other entities. It switches, routers,
should also have the capability to detect physical/virtual host,
applications that span from Datacenter and Containers, storages, cluster
end in a public or a private cloud with software, business
interconnects between them. applications and other
entities.
5 The discovery data should be fully auditable No Change.
as to where it came from and what the
method to retrieve that data was.
6 The solution should show exactly how the No Change.
discovery data is obtained (i.e., Audit trail
and mechanism to validate the quality of
data discovered)
7 The Discovery solution should come with No Change.
real-time dashboards that collate and
present data that allows organizations to
make decision on consolidation, re-use of
infrastructure, detecting infrastructure that
has never been used etc.
8 The solution should be able to automatically The solution should be able
detect software’s that are end of support, to automatically/manually
end of extended support and end of life. With detect software’s that are end
respect to OS, it should detect End of of support, end of extended
support and End of life as well. On Security, support and end of life. With
It should be able to find the patches installed respect to OS, it should
on servers along with reports on vulnerable detect End of support and
ports. Lastly, it should integrate with a End of life as well. On
vulnerability management solution to detect Security, It should be able to
blind spots in security of nodes missed out in find the patches installed on
vulnerability management that are found to servers along with reports on
be active in discovery. vulnerable ports. Lastly, it
should integrate with a
vulnerability management
solution to detect blind spots
in security of nodes missed
out in vulnerability
management that are found
to be active in discovery.
9 The discovery solution should have the No change.
ability to capture and report on infrastructure
drift in datacenter.
Note:-
Sd/-
REGISTRAR GENERAL