Attachment 1 - Technical Specs With Soc - Final
Attachment 1 - Technical Specs With Soc - Final
Attachment 1 - Technical Specs With Soc - Final
Not
Partially Remarks
Complie Complie
d
d
P
P
P
P
We support majority of the protocols listed
here and we also support the correlation for
VOIP
calls and analyze the traffic associated
Can identify
with the applications
1.2 H.323
1.3 MGCP
1.4 H.248/Megaco
1.5
P
AIX2
1.6 SIGTRAN
1.7
Skype
1.8
Vonage
1.9
MagicJack
1.10
1.11
GoogleTalk
P
1.12 Others (pls. specify)
2 Peer-to-Peer Applications such as, but not limited to,
the following:
2.1 BitTorrent
2.2 Gnutella
2.3
P
Napster
3.1 RTSP
3.2 RTP/RTCP
P
3.3 Others (pls. specify)
4 Applications/Services such as, but not limited to, the
following:
4.1 Browsing
4.2 E-mail
4.3 Gaming
1 of 6
4.4
P
FTP
4.5
P
ICQ
4.6
SNMP
4.7
Chat
4.8
TFTP
P
MPLS (strip up to what Label - 1st, 2nd, so on and so forth)
5.2
L2TP
5.3
GRE/IPSec
2.2
2.3
2.4
2.5
2.6
2.7
P
P
P
P
P
P
P
2 of 6
P
5.1 Binary
P
5.2 ASCII
E. Data Processing and Analysis
P
1 Allows real-time and historical call trace
2 Selective capture and playback of VoIP sessions for QP
3 Allows threshold setting on traffic parameters (ex., P
No. of Conversations/Transactions, Bandwidth
Consumed, etc.)
4
P
For encrypted traffic if the PLDT can provide the
encryption key then we can decrypt and analyse the traffic
P
P
P
P
F. Reports Generation
1 Should allow user-customized/drag-and-drop reports P
P
P
P
P
P
P
P
P
3.1 Source IP address
P
3.2 Destination IP address
P
3.3 URL
P
3.4 No. of Conversation
P
3.5 Total Duration
4 Should provide QoS Measurement Report containing,
but not limited to, the ff:
4.1 Host IP address
4.2 Completion rate
4.3 Subscriber busy
4.4 Congestion Rate
4.5 Address Incomplete
4.6 Jitters
4.7 Packet Loss
4.8 Delay
4.9 MOS
4.10 Others (pls. specify)
5 Should provide Incomplete TCP Session Requests
Report (showing the Source and Destination IP
that Suspected
can be used
to detect
possible
6 addresses)
Should provide
Malicious
Traffic
Report
D/DOS attacks.
7 Real-time and long-term graphs/reports contains:
P
P
P
P
P
P
P
P
P
P
malformed packets, specific port attack
We support all the reports mentioned here,
and more, please check the attached reports
document for more details
P
P
3 of 6
1
2
3
4
P
P
P
P
P
P
P
P
P
P
P
P
P
P
Minimum generation period is 15 minutes,
Maximum is configurable for day/week/month
etc
P
P
P
P
P
P
P
4 of 6
P
P
P
P
P
P
P
P
P
4 Dimensions
P
P
P
P
P
P
NEBS Compliance
5
6
7
8
9
10
11
P
P
P
P
5 of 6
V. Technical Support
Vendor should provide:
A. Minimum of 2-years Service and Parts Warranty
P
(Dansalan)
P
3 Trainings
should include modules in Installation,
Operations & Maintenance, Development, Planning,
and Engineering
4 On-the-Job/Hands-on/On-site Training during Project P
duration.
5 Good for 10 personnel per Batch; 2 Batches per
Module
C. System
(HW/SW Components) support and Design Life of up to a
P
P
E.
P
P
P
P
P
P
6 of 6