Professional Documents
Culture Documents
No: IIMA/CCSP/072/2015-16
Dated March 11, 2016
STAGE 1
BID DOCUMENT 2
TECHNICAL BID
Version 1.0
Client
Head Information & Communications Technology
Indian Institute of Management Ahmedabad
Vastrapur
Ahmedabad 380 015
Gujarat, India.
Telephone: +91 79 6632 4126
Fax: +91 79 6632 6896
Website : www.iima.ac.in
E-mail: ithead@iima.ac.in
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
TABLE OF CONTENTS
CHAPTER 1.................................................................................................................................. 4
1.0
CHAPTER 2.................................................................................................................................. 6
2.0
C.
D.
E.
F.
G.
H.
J.
2.2
2.3
2.4
CHAPTER 3................................................................................................................................ 25
3.
SWITCH SPECIFICATIONS
3.1
25
Version 1.0
Page 2 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
Version 1.0
Page 3 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
CHAPTER 1
1.0
The technical requirements outlined here in Part 2 are designed to raise the bar on the
functional capabilities needed to meet the Institutes present and future demands on
connecting wireless users to network applications anywhere, anytime, and on any device.
The Bidder has to answer all questions truthfully and accurately in the Technical Bid. All
requirements are MANDATORY and there are no options whatsoever. Any deviations
should be clearly documented and explained in the Technical Bid. Failure to provide truthful,
accurate and factual answers can lead to disqualification of the concerned Bidder. The
Bidder cannot ask a third a party to prepare the same on his behalf.
The Technical Bid shall contain all the relevant information which forms part of the technical
specifications. The information provided in the Technical Bid will be used for
understanding, assessing, and evaluating the technical superiority, quality, functionality,
fit, relevance, longevity, maintainability, scalability, and cost effectiveness of the solution
being proposed by the Bidder. The technical score for the Bidder will depend on the
information provided herein. This information should include items such as:
1. Provide an overview of the WLAN System and switching architecture and elements,
highlighting key features, advantages, USPs, investment protection characteristics, Total
Cost of Ownership (TCO), etc.
2. A Comprehensive Project Plan detailing project implementation phases, resources to be
deployed, timelines, assumptions, etc. to deliver the WLAN and switching solution
within budget and time. A significant concern is how the WLAN will be planned and
designed, incorporating both coverage and capacity needs and also future expectations.
After the site survey, the questions below will become crucial and the Bidder will be
expected to provide detailed answers to them:
2.1. To what extent will site surveys be required again when a floor plan or office layout
changes?
2.2. Does the WLAN System allow for the integration of floor plans (e.g. DXF / DWG /
JPEG / PNG) to spatially determine the number and placement of APs)?
2.3. How do the planning process and tools determine the number and placement of
APs to deploy? Describe how bandwidth and power requirements are incorporated
into this design. Please highlight where processes are automated.
2.4. Describe how what-if scenario planning is handled. Describe the ability to handle
network designs requiring more or less bandwidth capacity, various radio
technologies, and differences in office layout or other potential RF obstructions.
2.5. How does the planning process and tools determine the various APs RF channel
assignments, power levels, and association rates? Please highlight where processes
are automated.
2.6. How does the WLAN System help plan for redundancy?
2.7. The Institute Campus is a large and complex facility with many physical and natural
obstacles. In future we would like to run voice over Wi-Fi (soft phones). How will the
WLAN System ensure seamless RF coverage in such an environment? Can the
Technical Bid
Version 1.0
Page 4 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
Version 1.0
Page 5 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
CHAPTER 2
Please note that in all the tables given below there are two types of questions given. The
first type is where you have to give either a Yes or No answer in the 3 rd column. The second
type of question requires that you provide a Descriptive / Explanatory Answer and here the
3rd column is marked as DEA. These points should be answered in a descriptive / explanatory
manner and you may provide them on separate sheets of paper with the correct numbering
scheme and headings given below OR if the answer is short you may provide it in the
REMARKS column. Please also note it will not be acceptable to simply provide a hyperlink of
the explanation.
2.0
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
A2
A3
A4
A5
A6
A7
A8
A9
A10
A11
Technical Bid
Version 1.0
DEA
DEA
DEA
DEA
Page 6 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
A12
A13
A14
A15
A16
A17
A18
A19
A20
A21
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 7 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
A22
A23
A24
A25
A26
A27
A28
A29
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Version 1.0
Page 8 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
B6
B7
B8
B9
B10
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Version 1.0
Page 9 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
D6
E1
E2
E3
E4
E5
E6
E7
E8
E9
E10
E11
E12
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 10 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
E13
E14
E15
E16
E17
E18
E19
E20
E21
E22
E23
E24
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 11 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
E25
E26
E27
E28
E29
E30
E31
E32
E33
E34
E35
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Version 1.0
Page 12 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
F2
F3
F4
F5
F6
F7
F8
F9
F10
F11
F12
F13
F14
F15
F16
F17
F18
F19
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
information.
The WLAN System supports detailed audit logging of
Administrator activities with date/time stamp and this
information is available from a central console.
The WLAN System supports audit log export to an external
server using syslog functionality.
The WLAN System supports Intrusion Detection and
Prevention (WIDS/WIPS) for all types of malicious and rogue
Access Points. Please specify where this Intrusion Detection is
done at the AP level OR at the Controller level.
The WLAN System provides for remediation against rogue APs DEA
and denial of service attacks. Please specify where this
remediation is done at the AP level OR at the Controller
level.
The WIDS / WIPS features have integrated configuration and
management features.
The intrusion alarms automatically roll up in the WLAN
System management console.
The WLAN System management console provides a single
consolidated view of intrusion alarms and WLAN status.
The WLAN System performs rogue AP detection DEA
automatically. Please explain in detail how this is done.
What countermeasures are employed against rogue APs that DEA
are found?
The WLAN Controller supports the functionality to verify
whether a clients IP address can be dynamically allocated.
The WLAN Controller automatically blocks manually assigned
IP addresses in both a distributed and centralized
architecture.
The WLAN System provides mandatory L2/L3/L4 Access
Control.
The WLAN System supports Access Control based on
device-types.
The WLAN System can ban/bar specific devices based on their
MAC address, IP, or other identifiable parameters.
The WLAN System supports Application Visibility and Control
from the managed Access Points itself.
The WLAN System supports the whitelisting / blacklisting of
certain popular applications.
The WLAN Controller supports L2 Client isolation as a
configurable feature so that users cannot access each others
devices irrespective of whether they are connected to the
same SSID/same radio/same AP or different Access Points.
The WLAN System supports 802.1X.
Technical Bid
Version 1.0
Page 13 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
F20
F21
F22
F23
F24
F25
F26
F27
F28
F29
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 14 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
F30
F31
F32
F33
F34
F35
F36
F37
F38
F39
F40
F41
F42
F43
F44
F45
F46
F47
SPECIFICATION / FEATURE
administration, etc., based on roles created.
The WLAN System permits access passwords to be sent
directly through SMS to the guests OR allow guests access to
the captive portal for credentials submission.
The WLAN Controller supports a Guest Access feature, i.e. a
secure, time-bound, role specific Internet access to visitors
/guests / contractors etc. through a randomly generated
access key.
The WLAN Controller supports communication of the Access
Key to a guest via either a printout or SMS message.
The WLAN System supports self-provisioning by the visitor /
guest / contractor / temporary staff with or without needing
approval from the visited authority (sponsorship).
The WLAN System provides and ensures secure Guest
on-boarding and access through WPA2-Enterprise
mechanism, so that the Guests traffic (transactions) over the
air are encrypted.
What methods of authentication are supported?
The WLAN System supports web-based AAA.
Which EAP protocols are supported?
The WLAN Controller acts as an AAA server for its wireless
clients.
Where does the system store user and network data?
Is there any data stored locally on the APs?
The WLAN System supports direct access to the APs.
The WLAN System supports per-user-in-bound and out-bound
extended ACLs? Per-port ACLs? Per-VLAN ACLs.
The WLAN System includes a utility for a non-technical
designee (e.g. receptionist) to supply temporary credentials to
guests. If so, does the provisioning of the credentials affect
the Controllers configuration?
The WLAN System enables scalability through distributed
cryptography.
Does the WLAN System require centralized encryption of
wireless data at the Controller?
Is any sensitive data stored locally on the APs? If so, what type
of data is stored there?
The WLAN System is capable of connecting and / or
disconnecting a user session.
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
DEA
Version 1.0
Page 15 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
SPECIFICATION / FEATURE
NO
redundancy features of the proposed hardware.
G1
The WLAN Controller hardware has a minimum of two
numbers of 1 GigE ports and a console port connection via
either RS-232 or RJ-45 or mini USB.
G2
The WLAN Controller has hot swappable redundant power
supplies.
G3
The WLAN Controller can be offered as a hardware appliance
OR as a virtualized appliance; hardware to be a 19 Rack
mountable appliance. Hardware configuration needed for the
virtualized appliance and any virtualization software licenses
required to be specified by the Bidder.
G4
The WLAN Controller supports the following redundancy
topologies: Active-Active, Active-Standby and N+1
redundancy.
G5
The WLAN Controller supports Spectrum Analysis feature to
detect interference from different Wi-Fi and non-Wi-Fi
sources.
G6
The WLAN System supports survivability features. In the
event the WLAN Controller fails, the managed Access Points
should continue to provide service to connected clients and
new clients for a configurable period of time.
G7
The WLAN System supports Controller discovery on the same
L2 domain without requiring any configuration on the Access
Point.
G8
The WLAN System supports roaming between Access Points
deployed on the same subnet and different subnets as well.
G9
How fast is the failover in the case of a network outage?
Please specify in milliseconds.
G10
What happens to data clients in the event of a failover?
G11
In the event of a failover, what is the delay period before the
data service is restored?
G12
What actions must the user take to re-obtain data service
(re-associate, re-authenticate, re-login, etc.)?
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
Version 1.0
Page 16 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
H3
H4
H5
H6
H7
H8
H9
H10
H11
H12
H13
H14
H15
H16
H17
H18
J1
J2
J3
J4
SPECIFICATION / FEATURE
forwarding database entries.
The WLAN Controller supports a minimum of 512 WLANs.
Please specify the maximum number of WLANs supported.
The WLAN Controller supports a minimum of 20,000
concurrent client devices.
Please specify the maximum number of concurrent devices
supported.
What is the maximum number of BSSIDs supported by each
AP?
The WLAN Controller supports SSH/Telnet based access for
management purposes.
The WLAN Controller supports NTP.
The WLAN System supports and aids the IT personnel to
design for capacity as well as coverage.
The WLAN System allows an IT Administrator to set minimum
or average bandwidth requirements per user.
The WLAN System supports setup and enforcement of
minimum association rates to improve system performance.
Please provide details for the same.
The WLAN System supports per-user QOS capabilities and
prioritization via per-user queuing in the APs.
The WLAN System enables IT personnel to control an APs
transmit power level via software.
If so, is this process automated, or does each AP need to be
adjusted separately?
What is the maximum number of WLAN Controllers that the
management application can accommodate?
What is the maximum number of APs that the management
application can accommodate?
The management application is able to monitor the WLAN
System campus wide.
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
DEA
Technical Bid
Version 1.0
Page 17 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
J5
J6
J7
J8
J9
J10
J11
J12
J13
J14
J15
J16
J17
J18
J19
J20
J21
J22
J23
SPECIFICATION / FEATURE
The WLAN NMS raises critical alarms by sending an email
and/or SMS. The email client on the Controller should
preferably support SMTP outbound authentication and TLS
encryption.
The WLAN NMS management tool is capable of scheduling
reports for automatic generation. If so how are the reports
generated and delivered?
What type of configuration and monitoring reports can be
generated?
The WLAN NMS allows IT personnel to track a users AP
associations, both current and historical.
The WLAN NMS supports export of management graphs and
statistical files to other industry standard software like Excel,
SPSS, etc. for further analysis.
Describe the reporting capabilities of the proposed system.
The WLAN NMS supports the ability to drill down to real-time
and historical data.
The WLAN NMS sends alerts when rogues are detected.
Please specify the types of management logs and traps for
rogue activity that can be shown.
The Access Points are able to scan for rogue Access Points and
the Controller is able to locate them on a floor map.
The WLAN NMS sends a notification to the administrator
when a rogue Access Point has been detected and its location.
The management application supports centralized
management of APs and Controllers. If so does it require
accessing each Controller separately?
The WLAN NMS provides tools for RF coverage, location
tracking, network performance, etc.
The WLAN NMS provides location details of users, wireless
devices, etc. for trouble-shooting, planning, and asset
management.
The WLAN NMS provides details of the last known location of
each device and help in finding any lost or stolen devices.
The WLAN NMS provides detailed performance statistics
related to bandwidth, coverage, average data rate, etc. on a
per AP basis.
The WLAN NMS provides a current list of clients connected to
each AP and for what duration.
The WLAN NMS is able to monitor third party edge switches
to which the wireless devices are connected.
The WLAN NMS provides for administrative and access
controls for different types of users on the WLAN.
Technical Bid
Version 1.0
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
Page 18 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
22.1
22.2
22.3
22.4
22.5
22.6
22.7
22.8
22.9
22.10
22.11
22.12
22.13
22.14
22.15
22.16
22.17
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 19 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
22.18
22.19
22.20
22.21
22.22
22.23
22.24
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Version 1.0
Page 20 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
SPECIFICATION / FEATURE
NO
23.13 The indoor AP provides a minimum of 20dBm transmission
power for 2.4 GHz and min 20dBm for 5 GHz.
23.14 The Bidder should indicate the maximum transmission power
per indoor AP.
23.15 The indoor AP has Receive Sensitivity of -91dBm or better
@MCS0; 11n HT20; 2.4 GHz & 5 GHz.
23.16 The indoor AP supports 8 BSSIDs at a minimum per radio for a
total of 16 BSSIDs per Access Point.
23.17 The Bidder to indicate the maximum number of BSSIDs
supported.
23.18 The indoor AP supports 802.1q VLAN tagging.
23.19 The indoor AP supports Omni-directional / directional
patterns, with a minimum 3 dBi gain.
23.20 The Bidder should specify and/or explain if their indoor AP
supports any technique/technology that in any way enhances
user experience for mobile clients considering that these
clients have much poorer radios and have no fixed orientation
during usage.
23.21 The indoor AP implements Wi-Fi alliance standards WMM,
WMM-PS, 802.11d, 802.11h and 802.11e.
23.22 The indoor AP supports Packet Capture facility on either of its
radios to aid in troubleshooting.
23.23 Please specify the Transmit Power control mechanism
supported: whether changes in Tx power are in 1dB or 3dB or
any other decrements. Better granular control of the
coverage area would be highly preferred.
23.24 The Bidder should indicate the typical power consumption in
Watts for the proposed indoor AP.
23.25 The indoor AP is able to operate in the temperature ranges of
-20 to 60 C and humidity ranges of 10 to 90%
non-condensing.
23.26 The indoor AP supports Honeypot Control for 2.4 and 5 GHz
radios.
23.27 The indoor AP preferably has integrated tamper-proof
mechanisms to prevent users from damaging the equipment
or tampering with the installation. The Bidder to provide
details regarding this aspect.
23.28 The indoor AP has mandatory certifications such as
WEEE/RoHS, EN 60601-1-2, and Wi-Fi Alliance.
23.29 The indoor AP is WPC type approved. The ETA should be
enclosed by the Bidder.
23.30 What kind of antennas does the indoor AP support?
23.31 The indoor AP supports WPA with TKIP encryption.
23.32 The indoor AP supports WPA2 (802.11i) with AES encryption.
Technical Bid
Version 1.0
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
DEA
DEA
Page 21 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
SPECIFICATION / FEATURE
COMPLY
NO
YES or NO
23.33 What POE power standard input (802.3?) is required to power DEA
up all the radios in all models of the indoor AP and operate in
full 4x4:4 MIMO-mode without any loss of features or
capabilities?
23.34 The indoor AP has the option of being powered through
AC-DC power adaptor.
23.35 The indoor AP supports IEEE standard 802.3af POE.
23.36 The indoor AP supports IEEE standard 802.3at POE.
23.37 The indoor AP supports 802.11i fast roaming.
23.38 The indoor AP supports 256 QAM modulation.
24.1
24.2
24.3
24.4
24.5
24.6
24.7
24.8
24.9
24.10
24.11
24.12
24.13
REMARKS
Technical Bid
Version 1.0
Page 22 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
24.14
24.15
24.16
24.17
24.18
24.19
24.20
24.21
24.22
24.23
24.24
24.25
24.26
24.27
24.28
24.29
24.30
24.31
24.32
24.33
SPECIFICATION / FEATURE
a total of 16 BSSIDs per AP.
The Bidder should indicate the maximum number of BSSIDs
supported.
The outdoor AP supports 802.1q VLAN tagging.
The outdoor AP supports an integrated sectoral/ directional
or external/integral omnidirectional antenna for both radio
bands.
Please specify the Transmit Power control mechanism
supported: whether changes in Tx power are in 1dB or 3dB or
any other decrements. Better granular control of the
coverage area would be highly preferred.
The outdoor AP supports operating temperature ranges of
-20 to 60 C and Humidity ranges of 15 to 90%
non-condensing.
The WLAN Solution supports Honeypot control for 2.4 and 5
GHz radios.
The outdoor AP along with the antennas is IP67 certified for
outdoor deployment. Indoor Access Points inside 3rd party
enclosures/boxes would NOT be acceptable. Third-party
external antennas would also not be acceptable.
Please specify the dimensions of the outdoor AP (LxBxH) in
centimetres and the weight in kilograms including the
mounting bracket. Smaller form factor would be preferred.
The Bidder should indicate the typical power consumption in
Watts per outdoor AP model suggested.
The outdoor AP has mandatory certifications such as
WEEE/RoHs, EN 60601-1-2 Safety and Wi-Fi Alliance.
The outdoor AP is WPC type approved. The ETA should be
enclosed by the Bidder.
Does the outdoor AP support the same functionality and
features as the indoor AP? If not what are the limitations of
the outdoor AP?
The outdoor and in-door APs support mesh technology to link
to each other wirelessly.
What kind of antennas does the outdoor AP support?
What are the environmental specifications of the outdoor AP?
The outdoor AP supports WPA with TKIP encryption.
The outdoor AP supports WPA2 (802.11i) with AES
encryption.
The outdoor AP supports standard 802.3af POE.
The outdoor AP supports standard 802.3at POE.
Can a full 4x4:4 MIMO be powered via 802.3af? If not what
POE power input standard (802.3?) is required to power up all
Technical Bid
Version 1.0
COMPLY
YES or NO
REMARKS
DEA
DEA
DEA
DEA
DEA
DEA
DEA
DEA
Page 23 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 24 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
CHAPTER 3
3.
SWITCH SPECIFICATIONS
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
A.7
A.8
A.9
A.10
A.11
A.12
A.1
A.2
A.3
A.4
A.5
A.6
A.13
A.14
A.15
Technical Bid
Version 1.0
Page 25 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
A.16
B.1
B.2
B.3
B.4
B.5
B.6
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
3.1B STACKING
The switch and Operating System Software offer true
stacking, with all switches in a stack acting as a single logical
switch unit.
The switch supports a stack that provides a unified data
plane, unified configuration, and single IP address for switch
management.
The switch supports stacking with a minimum throughput of
40 Gbps or more. Stacking ports are separate from uplink
ports.
Specify the maximum aggregated stacking bandwidth.
DEA
Specify the maximum stacking distance.
DEA
The switch supports close loop stacking of a minimum of 8 DEA
switches. The Bidder to specify maximum number of switches
supported in a stack.
3.1C POWER MANAGEMENT
C.1
DEA
C.2
DEA
C.3
DEA
C.4
DEA
C.5
DEA
C.6
DEA
C.7
C.8
C.9
C.10
Technical Bid
Version 1.0
Page 26 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
C.11
C.12
D.1
D.2
SPECIFICATION / FEATURE
COMPLY
YES or NO
DEA
D.4
D.5
DEA
D.6
DEA
D.7
DEA
D.8
DEA
D.3
E.1
F.1
REMARKS
Technical Bid
Version 1.0
Page 27 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
G.1
G.2
G.3
G.4
G.5
G.6
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 28 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
H.1
H.2
I.1
I.2
I.3
I.4
Technical Bid
Version 1.0
Page 29 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
J.1
J.2
K.1
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
3.1J SECURITY
The switch supports the following security features and
specifications:
Access Control Lists (ACLs) for IPv4 and IPv6
AES Encryption for SSHv2, SNMPv3
Port Mirroring (MAC-, VLAN- and ACL-based)
sFlow
Authentication, Authorization, and Accounting (AAA)
Username/password (Challenge and Response)
Bi-level Access Mode (Standard and EXEC Level)
Secure Copy (SCP)
Secure Shell (SSHv2)
RFC 2865 RADIUS
TACACS/TACACS+ Authorization
ACLs Port Security - MAC limit and locking
MAC Filter and Authentication
Port MAC Security
MAC Locking
802.1X Accounting
802.1X Change of Authorization
802.1X Dynamic VLAN assignment
802.1X Dynamic ACL
802.1X Multiple Host Authentication
IP Security
ARP validation
Broadcast storm, multicast storm, and unicast storm
control IPv6 RA Guard
PVLAN
Port Isolation
Control-Plane Protection
RSPAN and Bidirectional SPAN, Multiple destination
port through single or multiple SPAN sessions
The switch provides protection against attackers through the
following features:
Port security to secure the access to an access or
trunk port based on MAC address.
DHCP snooping
Dynamic ARP inspection (DAI)
IP source guard
The Unicast Reverse Path Forwarding (uRPF)
3.1K HIGH AVAILABILITY
The switch supports hot-swappable internal power supplies
Technical Bid
Version 1.0
Page 30 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
K.2
K.3
K.4
K.5
K.6
K.7
K.8
L.1
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
(1+1).
The switch supports hot-swappable fan trays (3+1).
The switch supports L3 VRRP protocol redundancy.
The switch supports automatic failover from master to DEA
standby stack controller. Please explain how this will work
and if there will be any loss of connectivity?
The switch supports dedicated ports on the back panel for
forwarding system health and control information across the
stack.
The switch supports protected link groups.
The switch supports hot insertion and removal of stacked
units.
The switch supports hot insertion and removal of optional 40
GbE modules.
3.1L MANAGEMENT, DEPLOYMENT & CONTROL
The switch supports the following Management, Deployment
and Control features:
Industry-standard Command Line Interface (CLI)
Configuration Logging
LLDP
LLDP-MED
Cisco Discovery Protocol (CDP)
IEEE 802.3 MAU MIB
RFC 951 BootP
RFC 1542 BootP Extensions
RFC 2131 DHCP (client and server)
RFC 854 Telnet Client and Server
RFC 2865 RADIUS
RFC 1493 Bridge MIB
RFC 1643 Ethernet-like Interface MIB
RFC 1213 MIB-II
RFC 1516 Repeater MIB
RFC 1354 Forwarding Table MIB
RFC 1757 RMON MIB
RFC 2572 SNMP Message Processing and Dispatching
RFC 1573 SNMP MIB II
RFC 1157 SNMPv1/v2
RFC 3411 SNMPv3 Framework
RFC 3412 SNMPv3 Processing
RFC 3414 SNMPv3 USM
RFC 5905 NTPv4
SSHv2 access
Technical Bid
Version 1.0
Page 31 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
L.2
L.3
L.4
L.5
L.6
L.7
L.8
L.9
L.10
M.1
HTTPS
SCP2
IPFIX or Netflow v9 or sFlow v5
Syslog
Embedded Event Manager (EEM) scripting to enable
automation
Generic online diagnostics and embedded based
interface that should have port bandwidth plotter
Embedded Smart Call for Proactive Services with
switch OEM directly.
The switch supports DHCP auto configuration of multiple
switches through a boot server that eases switch
deployment.
The switch supports Automatic QoS (Auto QoS) that simplifies
QoS configuration in voice over IP (VoIP) networks by issuing
interface and global switch commands to detect IP phones,
classify traffic, and help enable egress queue configuration.
The switch supports Auto negotiation on all ports that
automatically selects half- or full-duplex transmission mode
to optimize bandwidth.
The switch supports automatic media-dependent interface
crossover (MDIX) that automatically adjusts transmit and
receive pairs if an incorrect cable type (crossover or straight
through) is installed.
The switch supports multilevel security on console access to
prevent unauthorized users from altering the switch
configuration.
The switch provides a mechanism to check the health of
hardware components and verify proper operation of the
system data and control plane at run time and boot time.
The switch supports DHCP Server feature to enable a
convenient deployment option for the assignment of IP
addresses in networks that do not have a dedicated DHCP
server.
The switch is able to update images without bringing down
the stack or with minimal impact.
The switch stack re-convergence time is less than 200
milliseconds.
3.1M MULTICAST PROTOCOLS
The switch supports the following Multicast protocols
RFC 1112 IGMP
RFC 2236 IGMPv2
RFC 3376 IGMPv3
Technical Bid
Version 1.0
Page 32 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
N.1
N.2
N.3
N.4
N.5
N.6
N.7
COMPLY
YES or NO
REMARKS
IGMP Proxy
RFC 1112 Host Extensions
RFC 3973 PIM-DM
Rfc 2362 PIM-SM/SSM
RFC 3618 MSDP
RFC 4610 Anycast-RP using PIM
Technical Bid
Version 1.0
Page 33 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
COMPLY
YES or NO
REMARKS
SR
NO
SPECIFICATION / FEATURE
A.1
A.2
A.3
A.4
A.5
A.6
A.7
A.8
A.9
A.10
A.11
A.12
A.13
A.14
A.15
A.16
Technical Bid
Version 1.0
Page 34 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
A.17
A.18
A.19
B.1
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 35 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
C.1
C.2
D.1
D.2
D.3
D.4
D.5
D.6
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 36 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
D.7
D.8
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
E.1
DEA
E.2
DEA
E.3
DEA
E.4
DEA
E.5
DEA
E.6
E.10
E.11
DEA
E.12
DEA
E.13
DEA
E.14
DEA
E.15
E.7
E.8
E.9
E.16
E.17
Technical Bid
Version 1.0
Page 37 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Commercial Bid.
E.18
E.19
F.1
F.2
F.3
F.4
DEA
F.5
F.6
G.1
G.2
G.3
G.4
DEA
Technical Bid
Version 1.0
Page 38 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
G.5
G.6
H.1
H.2
H.3
H.4
H.5
H.6
H.7
H.8
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 39 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
I.1
I.2
I.3
I.4
I.5
I.6
I.7
I.8
I.9
I.10
I.11
I.12
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 40 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
I.14
I.15
J.1
Technical Bid
Version 1.0
Page 41 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
K.1
K.2
K.3
K.4
K.5
K.6
3.2K SECURITY
The switch supports the following security features and
specifications:
802.1X Accounting
MAC Authentication
DHCP Snooping
Dynamic ARP inspection
Bi-level Access Mode (Standard and EXEC Level)
EAP pass-through support
IEEE 802.1X username export in sFlow
Protection against Denial of Service (DoS) attacks
Authentication, Authorization and Accounting (AAA)
Advanced Encryption Standard (AES) with SSHv2
RADIUS/TACACS/TACACS+
Secure Copy (SCP)
Secure Shell (SSHv2)
Username/password
Web Authentication
RFC 5176 Change of Authorization (CoA)
Flexible Authentication
The switch supports IPv6 first-hop security that enhances
Layer-2 and Layer-3 network access from proliferating IPv6
devices especially BYOD devices. This feature protects against
rogue IPv6 router advertisements, IPv6 duplicate address
detection and other risks introduced by IPv6 technology.
The switch supports Threat Defence features including Port
Security, Dynamic ARP Inspection, and IP Source Guard.
The switch supports private VLANs that restrict traffic
between hosts in a common segment by segregating traffic at
Layer 2, turning a broadcast segment into a no broadcast
multi access like segment from day one.
The switch supports port isolation or private VLAN Edge that
provides security and isolation between switch ports, which
helps ensure that users cannot snoop on other users traffic.
The switch supports Multi-domain Authentication that allows
an IP phone and a PC to authenticate on the same switch port
while placing them on appropriate voice and data VLAN.
Technical Bid
Version 1.0
Page 42 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
K.7
K.8
K.9
K.10
K.11
K.12
K.13
K.14
K.15
L.1
L.2
L.3
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 43 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
L.4
L.5
L.6
M.1
M.2
M.3
M.4
M.5
M.6
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 44 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
COMPLY
YES or NO
REMARKS
SR
NO
SPECIFICATION / FEATURE
3.3
A.1
A.2
A.3
A.4
A.5
A.6
A.7
A.8
A.9
A.10
A.11
A.12
A.13
A.14
A.15
A.16
Technical Bid
Version 1.0
Page 45 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
A.17
A.18
A.19
B.1
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 46 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
C.1
C.2
D.1
D.2
D.3
D.4
D.5
D.6
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 47 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
D.7
D.8
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
E.1
DEA
E.2
DEA
E.3
DEA
E.4
DEA
E.5
DEA
E.6
E.10
E.11
DEA
E.12
DEA
E.13
DEA
E.14
DEA
E.15
E.7
E.8
E.9
E.16
E.17
Technical Bid
Version 1.0
Page 48 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
E.18
E.19
SPECIFICATION / FEATURE
F.5
F.6
F.3
F.4
G.1
G.2
G.3
G.4
G.5
REMARKS
F.1
F.2
COMPLY
YES or NO
DEA
DEA
DEA
DEA
DEA
DEA
Technical Bid
Version 1.0
Page 49 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
G.6
H.1
H.2
H.3
H.4
H.5
H.6
H.7
H.8
I.1
I.2
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 50 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
I.3
I.4
I.5
I.6
I.7
I.8
I.9
I.10
I.11
I.12
I.13
I.14
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 51 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
I.15
J.1
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 52 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
K.1
K.2
K.3
K.4
K.5
K.6
K.7
K.8
K.9
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
3.3K SECURITY
The switch supports the following security features and
specifications:
802.1X Accounting
MAC Authentication
DHCP Snooping
Dynamic ARP inspection
Bi-level Access Mode (Standard and EXEC Level)
EAP pass-through support
IEEE 802.1X username export in sFlow
Protection against Denial of Service (DoS) attacks
Authentication, Authorization and Accounting (AAA)
Advanced Encryption Standard (AES) with SSHv2
RADIUS/TACACS/TACACS+
Secure Copy (SCP)
Secure Shell (SSHv2)
Username/password
Web Authentication
RFC 5176 Change of Authorization (CoA)
Flexible Authentication
The switch supports IPv6 first-hop security that enhances
Layer-2 and Layer-3 network access from proliferating IPv6
devices especially BYOD devices. This feature protects against
rogue IPv6 router advertisements, IPv6 duplicate address
detection and other risks introduced by IPv6 technology.
The switch supports Threat Defence features including Port
Security, Dynamic ARP Inspection, and IP Source Guard.
The switch supports private VLANs that restrict traffic
between hosts in a common segment by segregating traffic at
Layer 2, turning a broadcast segment into a no broadcast
multi access like segment from day one.
The switch supports port isolation or private VLAN Edge that
provides security and isolation between switch ports, which
helps ensure that users cannot snoop on other users traffic.
The switch supports Multi-domain Authentication that allows
an IP phone and a PC to authenticate on the same switch port
while placing them on appropriate voice and data VLAN.
The switch supports VLAN ACLs on all VLANs to prevent
unauthorized data flows from being bridged within VLANs.
The switch supports Access Control Lists for IPv6 and IPv4 for
security and QoS ACEs.
The switch supports Router ACLs definition security policies
on routed interfaces. IPv6 ACLs can be applied to filter IPv6
traffic.
Technical Bid
Version 1.0
Page 53 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
K.10
K.11
K.12
K.13
K.14
K.15
L.1
L.2
L.3
L.4
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
Technical Bid
Version 1.0
Page 54 of 55
This document is the property of IIMA. It should not be used in any form except for bidding for the
RFP No: IIMA/CCSP/072/2015-16 dated March 11, 2016
SR
NO
L.5
L.6
M.1
M.2
M.3
M.4
M.5
M.6
SPECIFICATION / FEATURE
COMPLY
YES or NO
REMARKS
This concludes the Technical Requirements section of the WLAN and Switching RFP.
Technical Bid
Version 1.0
Page 55 of 55