firewall and unified threat
play

Firewall and Unified Threat Management (UTM) End to End Service - PowerPoint PPT Presentation

Firewall and Unified Threat Management (UTM) End to End Service Stats SA for a period of 36 months BRIEFING SESSION STATS SA ICT Table of contents Purpose of the Bid Scope of work of the Bid Network diagram explained As it is and to be


  1. Firewall and Unified Threat Management (UTM) End to End Service Stats SA for a period of 36 months BRIEFING SESSION STATS SA ICT

  2. Table of contents Purpose of the Bid Scope of work of the Bid Network diagram explained – As it is and to be diagram Summary of Technical requirement Proof of concept

  3. Purpose of the Bid The purpose of this RFB is to invite Suppliers (hereinafter referred to as “bidders”) to submit bid for ”Provision of a Firewall and Unified Threat Management (UTM) End to End Service to Statistics South Africa (Stats SA) for a period of 36 months” .

  4. Scope of Work of the Bid To provide the Next Generation Firewall (NGFW) and Unified Threat Management (UTM) End to End Service. Thus: • This means the provider of an application program software and system will supply all the software as well as hardware requirements of the customer such that no other vendor is involved to meet the needs. • E2ES includes installation, integration, and setup. • This will however be hosted on Stats SA sites and SITA Centurion although the equipment will not belong to Stats SA.

  5. Scope of Work of the Bid The Bidders are to Provide the NGFW & UTMs End to End service that has the following Residual throughput, RAM, CPU when all the firewall features as depicted in the following table are enabled . Office area QTY AV AC ATP/AM Webfilte IPS DPI SSL Residual P/TP r Insp throuput, RAM, ecti CPU on >1.5Gbps,<70% Edge/H 2 X X X X X X X of RAM,<80% of O CPU usage POs 9 X X X X X X X >10 Mbps,<70% of RAM,<70% of CPU usage >100 DR 1 X X X X X X X Mbps,<70% of RAM,<70% of CPU usage >100 APN 1 X X X X X X X Mbps,<70% of RAM,<70% of CPU usage

  6. Scope of Work of the Bid Egde (SITA), HO and Provincial Offices • Install and configure the NGFW solution during weekdays, over the weekends, during holidays or after hours. • Configure high availability setup • Setup, intergrate centralised management and reporting console. • Deploy own tools of trade for real time monitoring and analysis of the firewall logs and these will send logs to the organisational SIEM. • Supplier must configure the firewall zones (different network areas) e.g. Demilitarized zone (DMZ). • Setup and configure all Firewall policies and rules. • Certify NGFW solution implementation by the OEM

  7. Network Diagram – As is.

  8. Network Diagram – To be.

  9. Summary of Technical Requirements NGFW HA Pair (SITA & Head Office) Requirements Performance >5 Gbps up to 16 Gbps Firewall throughput Throughput rate with all features enabled >1.5 Gbps VPN (IPSec) throughput > 1 Gbps VPN Tunnels >1500 SSL VPN throughput 1Gbps Max SSL sessions 100000 Concurrent Connections >1 mil New TCP connections >25000 NGFW HA Pair (HO) HTTP (s) Inspection >1 Gbps NGFW UTM (PO) Requirements Performance > 4 Mbps up to 250 Mbps Firewall throughput Throughput rate with all features enabled up to 125 Mbps Max SSL sessions 10 000 Concurrent Connections 100 k New TCP connections 10 000 HTTP (s) Inspection 10 Mbps NGFW (DR SITE) Requirements Performance > 4 Mbps up to 250 Mbps Firewall throughput Throughput rate with all features enabled >100 Mbps Max SSL sessions 10 000 Concurrent Connections 100 k New TCP connections 10 000 HTTP (s) Inspection 10 Mbps

  10. Summary of Technical Requirements APN Virtual FW Requirements Performance > 4 Mbps up to 250 Mbps Firewall throughput Throughput rate with all features enabled >100 Mbps Max SSL sessions 10 000 Concurrent Connections 100 k New TCP connections 10 000 HTTP (s) Inspection 10 Mbps

  11. Proof of Concept The Bidder must have the proposed physical Firewall device available in order to participate in the POC. The Proof of concept will be conducted using IXIA Breaking Point Test – end to end solution It should be noted that the maximum throughput capacity of the IXIA Breaking point is 40 Gbps. The Proof Of concept will simulate both good and bad traffic to validate and optimize Firewall under the most realistic conditions. It will simulate real-world legitimate traffic, DDOS, exploits, malware, fuzzing e.t.c. All types of traffic will be tested. All of the Proof of Concept (POC) requirements must be demonstrated in full.

  12. THANK YOU

  13. QUESTIONS??

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend