Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF OCTOBER 19, 2003 FBO #0691
SOURCES SOUGHT

70 -- Network Traffic Generator

Notice Date
10/17/2003
 
Notice Type
Sources Sought
 
Contracting Office
Department of the Air Force, Air Mobility Command, AMC Contracting Flight (AMC/LGCF), 507 Symington Drive Room W202, Scott AFB, IL, 62265-5015
 
ZIP Code
62265-5015
 
Solicitation Number
Reference-Number-AMCCONFA4CFNTG
 
Response Due
10/31/2003
 
Archive Date
12/1/2003
 
Point of Contact
Teresa Francoeur, Contract Specialist, Phone 618-256-9950, Fax 618-256-3091, - Nancy Jurke, Contracting Officer, Phone (618) 256-9963, Fax (618) 256-5724,
 
E-Mail Address
teresa.francoeur@scott.af.mil, Nancy.Jurke@scott.af.mil
 
Description
THIS SYNOPSIS IS ISSUED FOR INFORMATIONAL AND DEMO PURPOSES ONLY. THIS IS NOT A REQUEST FOR PROPOSAL. The Air Force Communications Agency (AFCA) has built a training and exercise simulator network that allows the network crew forces to experience and practice network operations and network defense in a risk free environment. AFCA is now conducting market research and requesting information from industry for a Network Traffic Generator (NTG). AFCA is looking for vendors who are willing to demonstrate, at no cost to the government, their commercial capability in providing NTG. The following NTG requirements are to enhance the training/exercise environment, simulating the appearance of a real large network: The console interface must not place any restrictions upon device location, either geographical or network based, other than a requirement for TCP/IP connectivity between the Network Traffic Generator (NTG) device and the cluster controller system. Must be no greater than 6RU and 19-inch rack mountable system. Capable of providing a virtual router capability. The virtual router will be software configurable for class A, B or C networks within the NTG. The virtual router will provide the device or network under test with a next hop router, which the device or network under test can forward traffic to. The NTG must then be capable of generating traffic from any possible IP subnet to include private IP address space, (such as the 10.0.0.0 network), and forwarding them to the device under tests such that they appear to be forwarded by a router on the local network of the device under test. The NTG must be capable of generating traffic using multiple (3 or more) IP subnets on a single port. The NTG must be capable of utilizing non-contiguous subnets, and subnets of varying sizes on a single port. Provides the ability for the trainer to build upon the virtual network to emulate actions (stateful traffic) coming from end users on the virtual network. Must be able to generate IP, TCP, and UDP traffic over multiple ports. Generates random and static IP and MAC addresses with easy to use configuration interface. Generates stateful network traffic at 80 % of wire speed (100MB). Generates random network traffic data packet sizes. Generates protocol/service traffic types in a random pattern. Throttle bandwidth utilization. Throttle protocol/service utilization. Capable of creating complete HTTP, HTTPS, FTP, SMTP, POP3, DNS, and Telnet sessions/connections able to interact with stateful third party systems, such as servers, firewalls, email gateways, virus scanners, spam filters, application layer gateways, etc. Supports a minimum of 500 servers per port. The NTG must be capable of supporting any mix protocols/services per port with application compatibility to third party devices such as application layer gateways/firewalls and email forwarding systems. The NTG must be capable of supporting multiple protocols on a single port utilizing the same IP address. Trainer can control / maintain up to 100 simultaneous attacks. Attacks must be manageable from a central location and provide synchronized activities including start/stop and configuration capabilities. The NTG must be capable of generating distributed denial of service traffic, such as SYN Floods, ARP Floods, TCP and UDP port scans, PING Floods, etc. The NTG must be capable of generating the DDoS on the same ports that are generating multi-protocol, stateful, application compatible TCP traffic. The NTG must permit the user to develop custom DDoS attacks using a well-defined, documented scripting language. The NTG must provide full control of every single bit in the Ethernet frame for custom DDoS attacks. The NTG must automatically add any custom developed DDoS attacks to the NTG GUI for inclusion in test configurations. The NTG must be capable of generating traffic, which simulates application layer attacks over HTTP, such as Code Red and Nimda. The NTG must be capable of passing these simulated attacks to third party HTTP servers using properly established TCP connections. Interested contractors are requested to provide their commercial capability statements (not to exceed 10 pages), and their estimated cost to the Contracting Officer, AMC CONF/LGCFC. Contractors responding to this request for information may be requested to provide at no cost to the Government, a demonstration of their system capabilities during the Dec 2003 timeframe. The demonstration will support market research activities to prove the availability of commercial solutions to potentially fulfill AFCA's unique requirements. Additional details regarding any demonstrations will be provided to those vendors submitting positive capability statements, and interested in performing the demonstration at no cost to the Government. All packages submitted in response to this Request for Information (RFI) should include the following information: Name and address of company, business size, company point of contact, telephone number, fax number, E-mail address, and statement of capability. The capability package must be clear, concise, and complete and submitted to the contracting office electronically via e-mail no later than 3:00 p.m. C.S.T. October 31, 2003. POINT OF CONTACT: AMC CONF/LGCFC, Terri Francoeur, Contract Specialist, Phone (618) 256-9950, Fax (618) 256-3091, E-mail teresa.francoeur@scott.af.mil or Nancy Jurke, Contracting Officer, Phone (618) 256-9963, Fax (618) 256-3091 or nancy.jurke@scott.af.mil
 
Record
SN00453907-W 20031019/031017213139 (fbodaily.com)
 
Source
FedBizOpps.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.