The document outlines the technical specifications for a firewall, including required features, interfaces, performance specifications, storage, and support requirements. It specifies requirements for advanced security functions, visibility, threat protection, control, and automation. It also lists requirements for interfaces, slots, throughput, connections, encryption, and high availability configurations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
456 views2 pages
Firewalls Technical Specifications-Final2
The document outlines the technical specifications for a firewall, including required features, interfaces, performance specifications, storage, and support requirements. It specifies requirements for advanced security functions, visibility, threat protection, control, and automation. It also lists requirements for interfaces, slots, throughput, connections, encryption, and high availability configurations.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
Firewall Technical Specifications
Features Description of the Minimum Requirement Quantity
Supported Features The UTM must support advanced security 2 functions such as Web and Application Filter,Gateway Anti Spam,Firewall, NAT, VPN, IM Control P2P Control, IPS, anti-virus, URL filtering, Application Detection, Email security, DLP and Anti-Spam, and it provides all-around security protection to safeguard the efficient running of data center network systems. Total Network Visibility: Passive, real-time visibility of hosts, mobile devices, applications, operating systems, users, content, attacks, and more Advanced Threat Protection: Protecting for the latest threats, it should delivers the best threat prevention that money can buy as validated by independent third-party testing and thousands of satisfied customers around the world Control Without Compromise: Achieve granular network and application access control without compromising threat prevention Intelligent Security Automation: Leverage rich contextual awareness to automate key security functions, including impact assessment, user identification and policy tuning Should have hardware-accelerated modules that provide maximum flexibility. Should support DES, 3DES, and AES encryption, MD-5 and SHA-1 authentication, Manually configured key, PKI (X 509), and IKEv2, Anti-replay attack, Remote VPN access, Link fault detection, Source-based routing, Policy-based routing, Policy-based route, management (GUI , CLI) Rack mountable Redundant power supply The internal power supply should supports input voltages between 100 and 240 VAC (220v, 50HZ, AC input Voltage) 2 x USB 2.0 1 x USB 3.0 2 x Mgmt Port Interface/slots Console port 2 x GE RJ45 Management Ports 16 x GE RJ45 Ports 2 x 10 GE SFP+ modules and connectors Firewall throughput: 85 Gbps IPS throughput : 20 Gbps VPN throughput: 9 Gbps Performance Concurrent connections: 30,000,000 New TCP connections/sec: 240,000 High Availability Configurations Active-Active, Active-Passive, Clustering 2 x integrated Local Storage hot-swap SSD MANUFACTURER’S AUTHORIZATION FORM Mandatory (MAF) Official Classroom (Instructor-Led) Technical Technical Training Training for 4 persons Vendor Support and Standard hardware, software, and technical support Services for three years