Section B - Annex A2 - Cisco Reference Example

advertisement
Campus Core Network Intro
Southend Borough Council’s New Network has to be World Class and have a design life expectancy of at least 10 years. The Core of the network must be
resilient and have redundancy built in. Initially the Core must be able to perform all the necessary tasks that SBC require as well as having expansion
capability for near, medium and long term future use. The Core will be the centre of a Hybrid Cloud System and must have the appropriate flexibility to
deliver this. One of the main requirements of this network is that it is a working on a converged architecture design.
Campus Core Network Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
CAMPUS_CORE_01
Management
Mandatory
CAMPUS_CORE_02
Network
Performance
Cisco Virtual Switching System or
VSS
Cisco Virtual Switching System or
VSS
CAMPUS_CORE_03
Scalability and
Interface
Performance
Chassis
Performance
High
Availability
Advanced
Access
Network
Management
Services
Network Core should be managed using 1 IP address (Core
Virtualization)
All uplinks from access should forward traffic (no spanning tree
blocked ports). Sub-second network convergence and no need
for First Hop Redundancy Protocols at the Core.
Modular platform that supports 10G/40G (now) and 100G
(future). 10G uplinks from the access to the Core need to be
deployed.
Chassis performance needs to scale up to 11.4 Tbps and 880G
per slot for future upgrades
Active/Standby Dual Supervisor support. Active/Active dualchassis forwarding support i.e. “Core Virtualization”.
The Core platform needs to support management of access
switches as remote line cards for future deployments.
CAMPUS_CORE_04
CAMPUS_CORE_05
CAMPUS_CORE_06
CAMPUS_CORE_07
CAMPUS_CORE_08
CAMPUS_CORE_09
Flexible
Adoption of
40G Ethernet
Traffic
Monitoring/C
Mandatory
Mandatory
Catalyst 6807 + Roadmap
Mandatory
Catalyst 6807 + Roadmap
Mandatory
VSS + Dual Supervisors
Mandatory
Cisco 6807 + Instant Access
The Core platform needs to support special modules to support
additional services (Wireless, Deep Packet
Inspection/Application Visibility, Firewall).
Support of 40G to 10G Adaptor.
Mandatory
Catalyst 6500/6807 Service
modules (WiSM2, NAM-3, ASA)
Mandatory
QSFP to SFP+ Adaptor
Support of traffic inspection that takes into account every packet
in a flow providing application visibility.
Mandatory
Cisco Flexible Netflow
Ref
CAMPUS_CORE_10
Area
apacity
Planning/Visi
bility
Online
Diagnostics
Requirement
The switch platform proposed should be able to test and verify
its hardware functionality while the switch is connected to a live
network.
Importance/ Weighting
Reference Example
Mandatory
Supervisor 2T Online Diagnostics
Campus Access Network (Switching)
To ensure that SBC and its staff can function at the required levels the Civic Centre is to have new fibres run to each floor allowing for a minimum of a 10
Megabit backbone across the LAN. The equipment used must allow for current requirements and future expansion such as higher speed to the desktop
and Wave II wireless. The switching must not produce any inherent delays in the overall network. The whole network must be manageable as a” single
pain of glass”
Campus Access Network (Switching)
Ref
Area
Requirement
Importance/
Weighting
Reference Example
ACCESS_SWITCHING_01
Deployme
nt
Mandatory
ACCESS_SWITCHING_02
Interface
Downlinks
3850 can mix in the same stack copper and
fibre interfaces and different speeds 1G,
2.5G, 5G, 10G
3850 MG and Fibre versions
ACCESS_SWITCHING_03
Interface
Uplinks
Platform proposed should be able to support stacking and
allow to mix different types of interfaces within a stack
(copper, fibre and different downlink/uplink speeds)
1G downlink copper interfaces required for this deployment.
In addition to that the switching family proposed needs to
support also fibre downlinks (1G,10G) and 2.5G, 5G copper
interfaces (for future mixed stack deployments). These
interfaces can be supported by other models of the same
switch family,
Uplinks should be modular and 2x10G to the Campus Core.
Lower and Higher speed uplinks need to be listed for the
Mandatory
Mandatory
3850 supports 2x10G as well as 4x1G,
4x10G, 2x 40G, 8x 10G
Ref
ACCESS_SWITCHING_04
ACCESS_SWITCHING_05
ACCESS_SWITCHING_06
ACCESS_SWITCHING_07
ACCESS_SWITCHING_08
ACCESS_SWITCHING_09
ACCESS_SWITCHING_10
Area
High
Availabilit
y (Power)
Traffic
Monitorin
g/Capacity
Planning/
Visibility
Power
Over
Ethernet
HW
Performan
ce & OS
Wireless
Stack
Managem
ent, High
Availabilit
y,
Convergen
ce &
Backplane
Performan
ce
Online
Diagnostic
s
Importance/
Weighting
Reference Example
Mandatory
3850 Stackpower
Traffic inspection that takes into account every packet in a flow
providing L2-L7 visibility is required. Also native Wireshark
support on the switching platform proposed is required for
additional traffic inspection and troubleshooting.
Mandatory
3850 + Flexible Netflow + Wireshark
PoE is required (15W) for the deployment. Support for 30W or
60W PoE is required for the switching family proposed (for
future mixed stack deployments).
Multicore CPU and Modern/Modular Operating System that
supports hosted applications and separate memory allocation
for each process.
The access platform should support integrated wireless
controller function and RFID tag tracking. Application visibility
for wireless traffic should be achieved by using Deep Packet
Inspection technology in addition to technologies such as
Netflow.
Plug & Play stack member removals and additions. Very fast
stack convergence upon stack main unit failure (few
milliseconds). Stack performance in terms of bandwidth needs
to be provided and explained.
Mandatory
3850 supports PoE, PoE+ and Cisco UPoE
Mandatory
3850 IOS XE Modular Operating System
Mandatory
3850 Converged Access and Application
Visibility with NBAR2 protocol (DPI)
Mandatory
3850 Stackwise 480
Mandatory
3850 Online Diagnostics
Requirement
switching family proposed (for future mixed stack
deployments)
Redundant Power supply support and power should also be
able to be shared across stack members
The switch platform proposed should be able to test and verify
its hardware functionality while the switch is connected to a live
network.
Campus Access Network (Wireless) Intro
All areas of the Civic Centre must have a coherent wireless solution that can be centrally managed and able to use the latest technology and AC Wave 11
when available.
Campus Access Network (Wireless) Requirements
Ref
Area
Requirement
Importance/
Weighting
Reference Example
ACCESS_WIRELESS_01
Deployment
Mandatory
ACCESS_WIRELESS_02
Controller
Performanc
e
Access Point
The solution needs to be controller based on-premise and support
802.11ac standard.
The controller needs to support minimum the following specs;
20Gbps throughput full duplex, up to 1500 access points, up to
20,000 clients and 4096 VLANs.
Modular Access Point platform to support 802.11ac and 802.11ac
Wave 2. Any additional modules supported need to be mentioned
and what functionality they support.
The controller deployment needs to support high availability and
seamless operation upon failure.
Mandatory
Aironet 5520 Controller or better and 3700
Access point
Aironet 5520 Controller or better
Mandatory
Aironet 3700 Access Point
Mandatory
2x 5520 in an HA pair
ACCESS_WIRELESS_03
ACCESS_WIRELESS_04
High
Availability
Sub-second access point and client failover for uninterrupted
application availability. Redundant 1 Gigabit Ethernet or 10 Gigabit
Ethernet connectivity
Solid-state device-based storage - no moving parts. Redundant, hotswappable power supply with no incremental system downtime.
Enhanced system uptime with fast system restarts.
Ref
Area
Requirement
Importance/
Weighting
Reference Example
ACCESS_WIRELESS_05
Application visibility for wireless traffic should be using Deep
Packet Inspection technology for additional granularity. Support for
Mandatory
5520 + NBAR2 protocol (DPI)
Hardware Based Wi-Fi interference and Rogue AP/ Denial-ofService detection should be supported. The wireless network needs
to be self-healing and self-optimizing.
Mandatory
Cisco CleanAir
Optimized system performance of mixed-client wireless networks
offering enhanced downlink throughput and improved uplink
communication providing a better user experience during web
browsing, email, and file downloads. No additional network
parameters needed – should be chipset feature.
Mandatory
Cisco ClientLink 3.0 feature
Able to support robust performance in dense and variable client
environments with different applications (unified communications,
video, bidirectional traffic).
Mandatory
Cisco HDX & Video Stream
ACCESS_WIRELESS_09
Traffic
Monitoring/
Capacity
Planning/Vi
sibility
Interference
and Rogue
AP
protection
Mixed client
Environmen
t
Performanc
e
High
Density
Environment
Performance
& High
Performance
Video
Support
Analytics
Mandatory
Cisco CMX
ACCESS_WIRELESS_10
ACCESS_WIRELESS_11
Services
Management
The wireless solution needs to support location analytics and RFID
tagging/tracking.
Bonjour and Chromecast support.
Mandatory
Mandatory
5520 WLC Datasheet
5520 WLC GUI & Prime Infrastructure
Support
ACCESS_WIRELESS_12
Miscellaneo
us Features
Mandatory
5520
ACCESS_WIRELESS_06
ACCESS_WIRELESS_07
ACCESS_WIRELESS_08
marking, prioritizing, and blocking to conserve network bandwidth
and enhance security.
Simplified GUI wizard for quick setup and intuitive dashboards for
monitoring and troubleshooting. Compatibility with unified
wired/wireless network management tools.
Support for centralized, distributed, and mesh deployments.
Centralized control, management, and client troubleshooting.
Seamless client access in the event of a WAN link failure (local data
switching).
Highly secure guest access.
Efficient access point upgrade that optimizes the WAN link
utilization for downloading access point images.
Ref
Area
Requirement
Importance/
Weighting
Reference Example
Support for corporate wireless service for mobile and remote
workers with secure wired tunnels to indoor access points.
Data Centre Network Fabric
Southend Borough Council needs a Network Fabric which enables high speed connectivity from the end device to the servers and the cloud
Data Centre Network Fabric Requirements
Ref
Area
Requirement
Importance/
Weighting
Reference Example
DATA_CENTE
R_NETWORK_
01
Deployment
Mandatory
Nexus 9k/ACI
DATA_CENTE
R_NETWORK_
02
DATA_CENTE
R_NETWORK_
03
Performance
The Network Fabric needs to support 2-Tier Leaf and Spine
architecture (low latency, 10G/40G/100G, non-blocking). Scale Up
and Out architecture. Minimum interface scalability specs 192x
1/10G BASE-T ports or 572x 10GE fibre ports or 144x 40GE fibre
ports or 32x 100GE fibre ports for the Spine Tier. A controller
based solution managing the fabric policies, provisioning,
monitoring and troubleshooting is required (application centric
deployment).
The Data Center Spine Tier needs to be a very high performance
platform (15Tbps switching capacity full duplex). The Spine Tier
switching family proposed needs to scale up to 60 Tbps (future).
The Network Fabric should support VXLAN and have a control
plane that automates its provisioning. In addition to that it should
be able to track VM mobility and changes to the VM configuration
(seamless VM mobility within the Network Fabric).
Automated Installation of SW Images and Configuration Files
needs to be supported.
Mandatory
Nexus 9504 and Nexus 9500 family
Mandatory
Nexus 9k VM Tracker + MP-BGP EVPN
Mandatory
Cisco Nexus 9k Power-On Auto
Provisioning
DATA_CENTE
R_NETWORK_
04
Network
Microsegmentation
& VM Mobility
Patching/SW
Upgrades
Ref
Area
Requirement
Importance/
Weighting
Reference Example
DATA_CENTE
R_NETWORK_
05
Power Efficiency
Mandatory
Nexus 9k 80 Plus Platinum Power Supply
Certification – No mid-plane on Nexus 9500
DATA_CENTE
R_NETWORK_
06
DATA_CENTE
R_NETWORK_
07
DATA_CENTE
R_NETWORK_
08
Flexible Transition
from 10G to 40G
Mandatory
Cisco Bidi Optics
Mandatory
Nexus 9k/ACI Programmability
Mandatory
Cisco Nexus 9k NX-OS operating system
DATA_CENTE
R_NETWORK_
09
Management
The system proposed needs to be power efficient and certified (for
example 80 Plus Platinum Certification). The Spine Tier should
have a design without a mid-plane to optimize front-to-back
airflow and reduce power consumption.
Flexible transition from 10G DC Access to 40G DC Access without
changing existing 10G cabling i.e. support for 40G interfaces
converted to 10G.
The Network Fabric should be fully programmable (Open APIs,
Python, REST, Chef, Puppet, XMPP). Openstack and Linux
Containers need to be supported.
Modern and Modular operating system to support MultiCore
CPUs, MultiThreading, Process Survavibility, Stateful Failover – the
latter for the Spine Tier switching platform. The Switch OS should
able to be patched without any interruption in switch operations.
Network Fabric/Switch management through remote procedure
calls (RPCs), JavaScript Object Notation (JSON), or XML over an
HTTP or HTTPS infrastructure. CLI, scripting (Python) and GUI
should be supported on any controller which is part of the
Network Fabric.
Mandatory
Cisco Nexus 9k NX-OS operating system
DATA_CENTE
R _10
High Availability
Programmability/Aut
omation/Orchestrati
on
Operating System
Very high MTBF that exceeds 1 million hours for the Spine Tier
Nexus 9504 has 1 million hours MTBF.
Nexus 9k supports BFD, Non-Stop Forwarding
switching platform. Bidirectional Forwarding Detection (BFD) and
Routing Protocol Stateful Restart. Online diagnostics need to be
supported.
DATA_CENTE
R_NETWORK_
11
Timestamping and
Event Logging
DATA_CENTE
R_NETWORK_
12
Control Plane
Security
Precision Time Protocol (IEEE 1588 Standard) to provide nanosecond accuracy to facilitate precise timestamping for log/event
correlation, compliance and digital forensics is required.
Nexus 9k Data Broker
Nexus 9k Storm Control
Protection from L2 broadcast “storms” and control plane policing
Ref
Area
Requirement
Importance/
Weighting
Reference Example
is required.
DATA_CENTE
R_NETWORK_
13
DATA_CENTE
R _14
DATA_CENTE
R_NETWORK_
016
DATA_CENTE
R_NETWORK_
017
Openflow
Openflow 1.3 needs to be supported
Nexus 9k
Monitoring of traffic
flow SLAs
Network/Application
Provisioning
Platform should able to monitoring and evaluate the performance
of SLAs (voice, video, data traffic).
Data-model-based declarative provisioning using Applicationcentric network policies from a central point/controller.
Nexus 9k/NX-OS IP SLA
Application
Monitoring &
Troubleshooting
ACI Atomic Counters etc
DATA_CENTE
R _018
DATA_CENTE
R_NETWORK_
018
DATA_CENTE
R_NETWORK_
019
DATA_CENTE
R_NETWORK_
020
Hypervisor/Virtualiza
tion Support
L4-L7 Services
Embedded Healthscores for applications (latency, packet loss per
application/tenant) and ease of correlation when troubleshooting.
This should be done from a central point (controller) which also
allows fault, event and performance management.
The Network Fabric needs to be hypervisor agnostic.
Seamless, programmable and automated integration of L4-L7
services into the Network Fabric.
ACI
Switching platforms should be able to monitor higher-volume and
business-critical traffic for efficient use of security, compliance,
and application performance monitoring tools.
Support for Hardware Based Load Balancing and Traffic Steering is
required.
Nexus 9k Data Broker
Data Broker
Switching
Hardware Load
balancing
ACI
ACI
Nexus 9k Intelligent Traffic Director
Data Centre Network Interconnect Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
DATA_CENTER_INT
ERCONNECT_01
Deployment
Built-in 6x 1GE and 2 X 10 GE SFP based ports.
Mandatory
ASR 1000 Router
DATA_CENTER_
INTERCONNECT
_02
DATA_CENTER_
INTERCONNECT
_03
DATA_CENTER_
INTERCONNECT
_04
Performance
Pay as you grow performance 2.5, 5, 10, 20 Gbps.
Mandatory
ASR 1000 Router
Operating
System
Modern & Modular OS - Expanded container app
support support for future virtual applications and
services.
Mandatory
ASR 1000 Router
Services
High-performance security for crypto, firewall, and
Mandatory
ASR 1000 Router
Mandatory
ASR 1000 Router
Mandatory
ASR 1000 Router
Redundant power supply.
Network Address Translation (NAT) sessions. VPN
services support.
DATA_CENTER_
INTERCONNECT
_05
DATA_CENTER_
INTERCONNECT
_06
Application
Visibility
Netflow-based and DPI-based traffic inspection
(application visibility).
Data Center
Interconnect
Technologies
Support for VXLAN, LISP, VPLS and OTV.
Data Centre Servers Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
DATA_CENTER
_SERVERS_01
DATA_CENTER
_SERVERS _02
Deployment
Blade Server based architecture for virtualized and
non-virtualized environments.
Programmable, Automated and Policy based using
service templates/profiles via CLI, GUI and XML API –
Stateless compute and pool of resources approach.
Auto-discovery, Dynamic Pooling and Multiple Server
provisioning.
160 Servers in a management domain and
management of multiple geographically distributed
domains via a single pane of glass should be
supported. Blade and Rack server mix in a
management domain is required to be supported.
Server pre-provisioning is required to support flexible
upgrades, new deployments and failure scenarios.
Built-in architecture resiliency/redundancy required.
Blade failover support.
The Server I/O should be virtualized, consolidated and
integrated with the physical network to provide VM
visibility. High IOPS are required. VXLAN and ease of
workload mobility is required (virtual and non-virtual).
Other required supported features; RDMA over
Converged Ethernet (RoCE), Performance-optimization
applications such as Virtual Machine Queue (VMQ),
Intel Data Plane Development Kit (DPDK), and
Netflow.
Mandatory
UCS B series
Mandatory
UCS Manager Service Profiles
Mandatory
UCS Central/UCS Director
Mandatory
UCS Pre-Provisioning using Service Profiles
Mandatory
UCS VIC Card 1300 series
Management/Provisi
oning
DATA_CENTER
_SERVERS _03
Management
Scalability &
Flexibility
DATA_CENTER
_SERVERS _04
High Availability &
Architecture
Flexibility
DATA_CENTER
_SERVERS _05
Server I/O
DATA_CENTER
_SERVERS _06
DATA_CENTER
_SERVERS _07
DATA_CENTER
Hypervisor &
Operating System
Security (access)
Hypervisor and OS agnostic solution.
Mandatory
UCS Hypervisor and OS Agnostic
Role-based access is required.
Mandatory
UCS Manager supports Role Based Access
Cabling Convergence
Single Cable for LAN/SAN traffic should be
Mandatory
Cisco UCS Single Connect Technology
Ref
_SERVERS _08
DATA_CENTER
_SERVERS _09
Area
Requirement
Blade
HDD/SSD/CPU/Me
mory
supported.
Each server blade should equipped with the appropriate
type of memory/cpu/disks to enable an Enterprise
Class/IoT capable Datacenter for Southend Borough
Council.
Importance/ Weighting
Reference Example
Mandatory
UCS B series can support up to 2x 18-core
Intel Xeon processors, DDR4 memory and
either HDD or SDD drives.
Data Centre Security Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
DATA_CENTER_
SECURITY_01
Deployment
Mandatory
ASA 5585-X and ASAv
DATA_CENTER_
SECURITY _02
Performance
Mandatory
ASA 5585-X Clustering
DATA_CENTER_
SECURITY _03
Physical Appliance
Management
Partitioning
High Availability
High performance security solution using Next
Generation FW and IPS - modular physical appliance(s)
for North to South traffic. Virtual appliance(s) should
also provide security for the virtualized workloads
(East to West traffic).
The physical appliance needs to scale up to 640 Gbps
by device grouping techniques.
The virtual appliance should scale up and out by
software upgrades or spinning new virtual appliances.
The physical appliance needs to be “virtualized” i.e.
partitioned in “virtual” appliances for management
purposes.
Active/Active and Active/Standby deployments
support is required for the physical appliance
proposed.
The security solution needs to support advanced
security features URL Fitering, Application Visibility,
Anti-Malware and Threat Detection/Protection.
Remote Access VPN, Web-based or without the need
of client application, client-based and network-tonetwork VPN are required to be supported.
Seamless integration of the security solution proposed
into the network fabric proposed to facilitate
programmable/automated deployment (mainly for
VM layer security).
Mandatory
ASA 5585-X Multiple Contexts
Mandatory
ASA 5585-X
Mandatory
ASA 5585-X with FirePower Services
Mandatory
ASA 5585-X
Mandatory
ASAv
DATA_CENTER_
SECURITY _04
DATA_CENTER_
SECURITY _05
Advanced Security
DATA_CENTER_
SECURITY _06
VPN Support
DATA_CENTER
_SECURITY _07
Integration with
Network Fabric
Data Centre – Hybrid Cloud Intro
SBC require an agnostic Hybrid Cloud Solution allowing them to access resources across any available platform and mix between private and public
cloud offerings.
Data Centre – Hybrid Cloud Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
DATA_CENTE
R_HYBRID_CL
OUD_01
Deployment
Mandatory
Cisco Intercloud Fabric
DATA_CENTE
R_HYBRID_CL
OUD _02
Security
Mandatory
Cisco Intercloud Fabric
DATA_CENTE
R_HYBRID_CL
OUD _03
Management
Mandatory
Cisco Intercloud Fabric
DATA_CENTE
R_HYBRID_CL
OUD _04
Flexibility
Mandatory
Cisco Intercloud Fabric
DATA_CENTE
R_HYBRID_CL
OUD _05
DATA_CENTE
Traffic Visibility &
Control
Hypervisor and Cloud Provider Agnostic Hybrid Cloud
Solution i.e. Consistent architecture across
heterogeneous environments – any hypervisor to any
cloud. Freedom to to place workloads across
heterogeneous Clouds.
Security policies need to be extended from the Private
Cloud to the Public Cloud. Secure communications
between private and public cloud and between VMs in
the public cloud. Role Based Access using existing
security practices to protect access to cloud workloads
is required. Traffic needs to be encrypted between
Private and Public Clouds and within Cloud Provider.
Single point of cloud connection management
(eliminate Shadow IT) and unified workload
management across clouds. Policy-based
deployment/governance in the cloud.
Workload portability – Image conversion and VM
migration. Bidirectional Workload mobility and VM
Lifecycle Management across private and public
clouds
Control and visibility of traffic within the public cloud
and between VMs is required (using technologies such
as Netflow or SPAN).
Northbound APIs to allow easy integration with
Mandatory
Cisco Netflow and ERSPAN
Mandatory
Cisco Intercloud Fabric
Integration with
Ref
Area
Requirement
R_HYBRID_CL
OUD _06
additional
management tools
additional management tools in order to offer
additional services is required.
Importance/ Weighting
Reference Example
Campus Network Management Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
CAMPUS_NETWORK_
MANAGEMENT_01
Manageme
nt &
Deployment
Options
Single Pane of Glass for Wired/Wireless Network.
Mandatory
Prime Infrastructure 3.0
CAMPUS_NETWORK_
MANAGEMENT _02
CAMPUS_NETWORK_
MANAGEMENT _03
Network
Lifecycle
Application
Visibility
Mandatory
Prime Infrastructure 3.0
Mandatory
Prime Infrastructure 3.0
CAMPUS_NETWORK_
MANAGEMENT _04
Network
Maps &
Network
Device
Groups
Provisioning
/Configurati
on
Network Device Lifecycle Management, end-of-life
and security incident reports.
Application, granular traffic flow visibility. Top devices,
clients and applications by traffic volume need to be
reported as well as how much bandwidth they
consume.
Network Topology, Wireless heat maps and logical
device grouping need to be supported.
Mandatory
Prime Infrastructure 3.0
Template Based Configuration. Validated design
Mandatory
Prime Infrastructure 3.0
Mandatory
Prime Infrastructure 3.0
CAMPUS_NETWORK_
MANAGEMENT _05
Network discovery, inventory, configuration, monitoring,
troubleshooting, reporting, and administration. Intuitive
GUI and Dashboard/Dashlets. Best practices for
configurations/deployments integrated with the tool.
Virtual machine or appliance deployment options.
configuration templates support to enable quick and
easy device and service deployment. Packaging of
individual templates into larger, reusable, configurations
built for more consistent and quicker network designs.
Role Based Access and flexible authentication,
authorization, and accounting (AAA) services should
allow for local, RADIUS, TACACS+, and single sign-on
options.
CAMPUS_NETWORK_
MANAGEMENT _06
Security
CAMPUS_NETWORK_
MANAGEMENT _07
Reports,
Events and
Alarms
List all the different types of reports and alarms
supported by the network management tool. Explain
how the alarms work. Dashboards, Troubleshooting
and Alarms should be centralized.
Mandatory
Prime Infrastructure 3.0
CAMPUS_NETWORK_
Monitoring
Monitoring policy creation support. Monitoring policies
Mandatory
Prime Infrastructure 3.0
Ref
Area
CAMPUS_NETWORK_
MANAGEMENT _12
CAMPUS_NETWORK_
MANAGEMENT _13
Importance/ Weighting
Reference Example
should be activated or deactivated through an intuitive
workflow and push changes to devices without
disrupting service
MANAGEMENT _08
CAMPUS_NETWORK_
MANAGEMENT _09
CAMPUS_NETWORK_
MANAGEMENT _10
CAMPUS_NETWORK_
MANAGEMENT _11
Requirement
Operations
Licensing portability is required. Option for High
Availability needs to be supported.
Mandatory
Prime Infrastructure 3.0
3rd Party and
API Support
Network
Access
Control
Integration
Location
Analytics
Integration
Wireless
Security
3rd Party Devices and RESTful APIs should be
supported.
Mandatory
Prime Infrastructure 3.0
Integration with Network Access Control physical or
virtual appliances must be supported.
Mandatory
Prime Infrastructure 3.0
Integration with location analytics engines/physical or
virtual appliances to provide location-based tracking
services for discovered endpoints.
Prime Infrastructure 3.0
Automated detection of the switch port that a Rogue AP
is connected.
Prime Infrastructure 3.0
Network Access Control Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
NETWORK_ACCESS
_CONTROL_01
Deployment
Mandatory
ISE
NETWORK_ACCESS
_CONTROL_02
Network Access
Minimum required deployment needs to have
AAA, Guest Management, Link Encryption
(MACSec), Network Access Microsegmentation
using tags, API Support is required. Appliance or
VM options – Web based/GUI management.
Option for centralized and distributed
deployment.
Policy Based/Software Defined/Context-Aware
Network Access taking into account the user role,
end-device type, time, location and end-device
configuration. All policies need to be managed
from a central point of management across
different parts of the network
(wired/wireless/VPN). Integration with Active
Directory/LDAP required. Real time policy
provisioning.
Mandatory
ISE
NETWORK_ACCESS
_CONTROL_03
End-Point Discovery
The network needs to be able to discover endpoints automatically (iPhones, Android devices
etc.) and present them in a GUI. Built-in and
custom device profiles need to be supported.
Mandatory
ISE Profiling
NETWORK_ACCESS
_CONTROL_04
End-Point
Assessment
Mandatory
ISE Endpoint Protection Service
NETWORK_ACCESS
_CONTROL_05
End-Point Policy
Enforcement
Mandatory
ISE Posturing/Enforcement
NETWORK_ACCESS
_CONTROL_06
Authentication
The network needs to be able assess the
configuration/OS version/patches of end-points
(iPhones, Android devices etc.). Misconfigured
devices need to be reported.
The network needs to be able to enforce policies
to end-points (iPhones, Android devices etc.)
based on their configuration and compliance
rules. Actions such as blacklist, whitelist, remote
wipe and integration with MDM are required.
The GUI of the NAC solution needs to show user
authentications as they happen (live
authentication). Drill-down capability for
Mandatory
ISE Live Authentications
Ref
Area
NETWORK_ACCESS
_CONTROL_07
Reports, Monitoring
& Troubleshooting
NETWORK_ACCESS
_CONTROL_08
Guest Access
NETWORK_ACCESS
_CONTROL_09
NETWORK_ACCESS
_CONTROL_10
Network Access
Microsegmentation
Network Wide
Context Sharing
NETWORK_ACCESS
_CONTROL_11
Integration with
NMS
NETWORK_ACCESS
_CONTROL_12
PKI & Certificates
Requirement
additional info per authentication.
Extensive reports on authentication, devices,
users etc. which can be also customized. Real
time monitoring and ease of troubleshooting.
Different Guest Access types need to be
supported. Hotspot, Self Service, Self Service
Sponsor Approved, Sponsored. Customizable
Guest Portals and Bring-Your-Own-Device
(BYOD) support.
Network Microsegmentation beyond VLANs and
IP Subnet using numbered tags.
Support for multivendor, cross-platform network
system collaboration among parts of the IT
infrastructure such as security monitoring and
detection systems, network policy platforms, asset
and configuration management, identity and
access management platforms, and virtually any
other IT operations platform.
The Network Access Control solution needs to
fully integrate with the Network Management
System proposed.
PKI & Certificate support is required.
Importance/ Weighting
Reference Example
Mandatory
ISE Reporting
Mandatory
ISE Guest Access
Mandatory
Cisco TrustSec/Security Group Tags
Mandatory
Cisco pxGrid and ISE
Mandatory
ISE + Prime Infrastructure
Mandatory
ISE PKI Support
Converged Infrastructure Management Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
CAMPUS_CO
RE_01
Management
Mandatory
UCS Director
CAMPUS_CO
RE_02
Orchestration/Autom
ation
Mandatory
UCS Director
CAMPUS_CO
RE_03
CAMPUS_CO
RE_04
Virtualization
Single Point of management for Data Center Network,
Compute, Storage. Management of virtual and nonvirtual (bare-metal) workloads in a multitenant Data
Center environment.
Model-Based Orchestration and Policy based
automation of provisioning and de-provisioning of
data center resources (compute, networking, storage)
using automated workflows. Built-in and custom
workflow support – create once and use as needed.
Bare-metal and virtual.
Hypervisor Agnostic Solution
Mandatory
UCS Director
Infrastructure
Discovery
The infrastructure should be discovered automatically
and the physical and logical relations stored in a
database as well as represented on an infrastructure
map.
Mandatory
UCS Director
CAMPUS_CO
RE_05
Infrastructure
Change Tracking
The solution should detect and reflects changes and
movements within infrastructure that could impede
workflow completion and notify the IT staff. Resource
pooling should prevent changes to one group from
adversely affecting other groups.
Mandatory
UCS Director
CAMPUS_CO
RE_06
CAMPUS_CO
RE_07
3rd Party Support
Support for 3rd party elements should be listed and
briefly explained.
Support of REST API, Windows Powershell, Java API,
Inventory and Reports
Mandatory
UCS Director
Mandatory
UCS Director
Programmability &
Development
Service Catalogue Intro
SBC’s applications will be provided our Customers based on a service catalogue specifying technical requirements, availability requirements, and
resource requirements. It will also identify Business Continuity requirements per individual application.
Service Catalogue/Portal Requirements
Ref
Area
Requirement
Importance/ Weighting
Reference Example
SERVICE_CAT
ALOGUE_01
Ordering &
Automation
Mandatory
Prime Service Catalogue
SERVICE_CAT
ALOGUE _02
SERVICE_CAT
ALOGUE _03
SERVICE_CAT
ALOGUE _04
Control
Self-service on-demand, automated and simple to use
ordering portal. Shop and order data center and IT
workplace services quickly just by clicking through a
menu. Unified menu of services that appear in
categories. Coverage for an extremely diverse range of
services including data center infrastructure resources,
cloud applications, platform application or general
business services such as BYOD or device services.
Policy-based controls and approvals.
Mandatory
Prime Service Catalogue
Dashboards to quickly establish user entitlements and
role-based access to services
Lifecycle management and tracking throughout the
service existence. Track open orders or access order
history.
Financial and demand management with pricing, quota,
and lease management established at the time of
service order
Use built-in analytics on current active services to
complete lifecycle operations such as maintain or
upgrade services.
Mandatory
Prime Service Catalogue
Mandatory
Prime Service Catalogue
Mandatory
Prime Service Catalogue
Mandatory
Prime Service Catalogue
Administrator
Interface
Service Lifecycle
SERVICE_CAT
ALOGUE _05
Billing
SERVICE_CAT
ALOGUE _06
Maintainance &
Upgrades
WAN Network Intro
Southend will be building a new dark fibre infrastructure and this equipment will be used to enable the WAN.
WAN Network Requirements (Core/Aggregation)
Ref
Area
Requirement
Importance/ Weighting
Reference Example
WAN_CORE_
01
Deployment
Mandatory
ASR 9000
WAN_CORE_
02
WAN_CORE_
03
WAN_CORE_
04
WAN_CORE_
05
WAN_CORE_
06
WAN_CORE_
07
Chassis Performance
Modular platform with 1G/10G/40G. Four integrated
10G SFP+ ports. 2 Module slots required. MPLS &
Carrier Ethernet Services support is required.
120 Gbps chassis performance
Mandatory
ASR 9000
Power
Redundant AC/DC power supplies
Mandatory
ASR 9000
Operating System
Modern Carrier Class Modular Operating System – GUI
support, process restartability.
GPS stratum-1 input, Building Integrated Timing Supply
Mandatory
ASR 9000
Mandatory
ASR 9000
NEBS, ETSI, EMC and list Immunity and Safety
standards
Mandatory
ASR 9000
L2VPN, L3VPN, Layer 2 and Layer 3 multicast; IP over ,
Ethernet operations, administration, and maintenance
(EOAM) and MPLS OAM, Layer 2 and Layer 3 access
control lists (ACLs), hierarchical quality of service
(HQoS)
Control Plane and Routing High Availability. Support for
MPLS TE-FRR.
Mandatory
ASR 9000
Mandatory
ASR 9000
Segment Routing support is required.
Mandatory
ASR 9000
WAN_CORE_
08
WAN_CORE_
09
Clock Sync and
Timing
Compliance
Transport/VPN
Services & QoS
High Availability
SDN Based MPLS
(BITS) ports, IEEE 1588 hardware-based support
WAN Network Requirements (Remote Sites/CPE)
Ref
Area
Requirement
Importance/ Weighting
Reference Example
WAN_ACCESS
_01
WAN_ACCESS
_02
WAN_ACCESS
_03
WAN_ACCESS
_04
WAN_ACCESS
_05
WAN_ACCESS
_06
WAN_ACCESS
_07
WAN_ACCESS
_08
WAN_ACCESS
_09
Deployment
Two dual-purpose (10/100/1000 and SFP) ports, two
SFP uplinks. Triple play services (ETTH/ETTB) support.
Mandatory
ME 3400
Chassis Performance
Carrier Ethernet support and UNI/ENI/NNI interfaces.
Mandatory
ME 3400
Power
AC/DC Power Supply.
Mandatory
ME 3400
Operating System &
Management
Software
CLI, Web Interface/GUI
Mandatory
ME 3400
Different Levels of Software Image support for
functionality flexibility
NEBS, MEF 9 & 14
Mandatory
ME 3400
Mandatory
ME 3400
ACLs, IEEE 802.1x, Configuration File Security
Mandatory
ME 3400
Quality of Service
Advanced QoS and Rate Limiting
Mandatory
ME 3400
Denial of Service
Security
Control Plane Security, L2 Broadcast storm contain, port
security, per VLAN MAC learning
Mandatory
ME 3400
Compliance,
Certifications
Network Security
Download