Laserfiche WebLink
SOLICITATION # CH16012 <br />Internet <br />Front End <br />Perimeter <br />■ <br />-)6trear . <br />Q Intrusion Detection <br />0 Firewall <br />Figure 1. xStream Enterprise Architecture <br />Client A Client B <br />Network Network <br />Landing <br />Zone <br />a `m <br />— <br />C +' <br />E C6 <br />"� °' <br />Q <br />co <br />l9 dt <br />Core <br />k: <br />Firewall <br />Context <br />CL <br />Client �' <br />B Specific <br />Rule Set <br />A le <br />Plafform <br />Portal \_ <br />Iiij <br />Separate LUNS <br />16 j* <br />State of Utah end users would access the hosted SAP environments via a MPLS connection <br />(Provided by State of Utah). Additionally a VPN connection has been sized at 100Mbps however <br />this can be decreased or increased depending on the exact requirements. <br />State of Utah end users accessing our enterprise platform would first hit the landing zone in a <br />dedicated virtual local area network (VLAN) and dedicated virtual route forwarding (VRF). The next <br />hop into the enterprise platform is a dedicated firewall (FW) context on a Cisco Firewall services <br />module. After traversing the core, traffic hits another dedicated VRF and drops into the platform <br />network and compute (CPU and Memory essentially a blade server) layer. All traffic is VLAN <br />separated. At each compute host, a hypervisor based firewall and intrusion protection system (IPS) <br />provides a dedicated client rule set to further ensure network security. All traffic transitioning from <br />one zone to another are monitored by Intrusion Detection and Intrusion Prevention systems. <br />Traffic coming in via the internet hits the front-end perimeter with load balancing modules and multi - <br />context Cisco firewalls. All traffic then passes through intrusion detection system and intrusion <br />protection systems. As in the enterprise compute layer, every host in our demilitarized zone (DMZ) <br />has a hypervisor-based firewall and IPS with dedicated client rule sets. Again, all traffic is VLAN <br />separated as well. <br />Traffic that needs to traverse from DMZ to the enterprise runs through another dedicated FW <br />context and IDS/IPS. <br />All of the State of Utah environments and data will be hosted in Virtustream's data centers within the <br />continental United States. <br />Standard Services used in Virtustream's management environment and in all client environments <br />including the following: <br />carahsoft 91 carahsoft <br />