The Vendor is required to provide network infrastructure and support services for Eligible Users, including State agencies, county and city governments, school districts, universities, community colleges, and non-profit organizations.
- These services are underpinned by stringent Service Level Agreements (SLAs) that guarantee availability, performance, and delivery expectations.
- MSS encompasses capabilities such as event monitoring, vulnerability management, log retention, and advanced threat intelligence reporting.
- These comprehensive services, coupled with a focus on reliability and customer support, have made agency a critical backbone for State and local organizations
- Ancillary services under agency complement the core offerings, including expedited installations, data storage solutions, email and web hosting for e-rate eligible entities, and Managed Security Services (MSS).
- Goals
• Layer 3 VPN (L3VPN)
• Virtual Private LAN Service (VPLS)
• VPN
o Client to LAN
1. Multi-factor authentication (MFA) integration with Customer-supplied provider or vendor provided options.
o LAN to LAN
o Must support VRF mapping
• Cloud Connect
o Must support VRF mapping
o Options should include Ethernet Virtual Circuits (EVCs) to core and EVC to Customer site (HQ/Datacenter).
• Centralized Firewall
• SLAs
o Custom
2. Performance SLAs on top of Availability SLAs
• Distributed Denial-of-Service (DDOS) Protection
o Cloud only acceptable if all transit links are the same T1 provider and can scrub a /32 if a /32 cannot be scrubbed then local scrubbers are required.
o Cloud scrubbing for DIA/Transit services.
• Transit Internet
o Single transit provider to facilitate cloud scrubbing for /32s.
3. Must have geo redundant peering locations to edge VRF.
• Local Loop
o Must remain local.
o Must allow swap to another local loop provider for chronic issues.
• SDWAN
• SASE
• DIA
o Vendor provided address space for underlays.
o Vendor underlays must be packaged with DDOS.
• Point to Point
o Wave
o Virtual Private Wire Service (VPWS)
• MAN
o MAN boundaries will fall on Local Access and Transport Area (LATA) boundaries.
o Only needed if dedicated.
• NOC
• SOC
• Tools
o Commercially provided Network Management System (NMS)
o Role-Based Access Control (RBAC) for Department oversight of SUNCOM Customer base.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.