E-mail: sgrctnt@gmail.com
  Call Us: 868-668-2488 or 668-2461
Profile Avatar

Chet

About Me

There is no biography information from this user

About the technical parameters of the digital library promotion subsidy project

Category:Purchasing Info - Government Procurement \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Location:Zhengzhou \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;Uploaded on 2012-8-28 \u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;

Fast collection site

Daily has the latest province bidding information

Now that you are joining the Junior, Intermediate, and Premium membership, you can browse the site's VIP information without any restrictions. Click to view!

This site is now officially launched Huazhong tender website (http://www.hzzhaobiao.com) domain name welcome click

Potential suppliers:

Henan Xingyu Construction Management Co., Ltd. was commissioned by the Henan Provincial Library to openly invite tenders for digital library promotion grants. The technical parameters and requirements of the tendering project are now publicized online. Please ask potential suppliers if there is a tendency for technical parameters. Sexuality, exclusion, etc.

All comments should be submitted in writing on August 28, 2012 to August 30, 2012 at 17:30 (Beijing time) every day, from 8:30 to 11:30 and from 15:00 to 17:30. Henan Xingyu Construction Management Co., Ltd. (indicating contact person, contact telephone number, and at the same time, it is necessary to provide a copy of the business license and the submission and the official seal of the company).

Contact: Ms. Wang

Phone: 0371-65381296

Address: Room 701, Building 2, No.66, Jingsan Road, Zhengzhou City

Technical parameters and requirements:

No. Device Name Unit Quantity Remarks

1 Low Server Specifications: 19-Inch Industrial Standard 2U Rack Server

Chipset: Intel C600 chipset

Processor: 2 Intel Xeon E5-2609 (4 core/2.4GHz/10M cache)

Memory: 4*4GB R-ECC 1333 DDR3 1.35V low-power memory, ≥20 memory expansion slots

★ Hard Disk: Two 600GB 10K hot-swappable 2.5-inch SAS hard drives, support for eight 3.5-inch or 16 2.5-inch SAS hard disk expansion (non-plug-in storage), can support SSD hard disk expansion

RAID function: Support 0, 1, 5, 10, 50 and other RAID levels

★ Network card: ≥ 3 Intel Gigabit LAN, support iSCSI connection, support virtualization technology, independent Gigabit management port, support remote management

Accessories: DVD-RW Drive, Rack Mount Rails

Power supply: Power output power ≥ 800W 1+1 redundant power supply, support PMBus 1.2

★I/O expansion: Expansion slots ≥ 2 PCI-E 3.0x16, ≥ 3 PCI-E 3.0x8, 2 internal USB 2.0 ports

★ Server management: requires more than 100 nodes to provide management software license, support for IPMI 2.0, B / S architecture, support for management of local and remote servers, server failure alarm, batch system resource management and system performance monitoring and other functions; Managed servers do not need to install agent software; prompts are displayed wherever the mouse is located; server hardware configuration changes are tracked; remote server control, remote power management, and remote monitoring of system ID status from the console; advanced features: support for remote implementation Digital KVM management and optical drive, floppy drive redirection

System Deployment: provides navigation software for server operating system installation, enabling unattended installation of the operating system, automatic detection of hardware systems, and installation of driver programs; automatic monitoring of RAID configurations, completion of RAID configurations in the navigation software operation interface, support for system cloning, and system recovery Can preserve the non-operating system data that the user needs

★Energy management tools: support centralized power management for more than a thousand servers, automatically recommend energy-saving optimization strategies to users, and users can flexibly preset power consumption; generate server nodes to generate energy consumption charts and report power consumption status And trends; and can monitor real-time power consumption and utilization of CPUs, memory, hard disks, and network cards

Firmware upgrade tool: Provides firmware upgrade tools that can be manually upgraded by the user to automatically implement firmware upgrades in the server including BIOS, BMC, RAID cards, and RDX tape drive's underlying code. When the server is started, the firmware upgrade tool can automatically monitor and display List of firmware that needs to be supported. Users can choose whether to upgrade

★Cooling system: built-in automatic adjustment cooling system can be automatically adjusted through the management software

★Information Security Qualification: The original manufacturer has 'Information Security Service Qualification' safety engineering level

Fault location: Standard front fault diagnosis module can realize fault diagnosis of key components such as CPU/memory/hard disk/network card/fan/temperature/power supply

★Security: TCM Trusted Module supporting TCG1.2, supporting data protection shield software

Service: The original manufacturer's 3-year warranty; To guarantee the reliability of the equipment, the original original authorized product and after-sales service commitment letter for the project must be provided.

2 high server appearance: industrial standard rack, ≥ 4U

★ Processor: Configuration ≥ 4 eight-core Xeon E7-4820 2.0G

★ Memory: Configuration ≥ 8GB * 4 R-ECC DDR3 1333MHz memory, maximum support 64 DIMMs memory plug; support memory hot plug, up to 1TB memory;

★ Hard disk: Configure three 300GB 10,000rpm hot-swappable SAS hard disks, supporting up to 8 hot-swappable 2.5-inch SAS hard disks or SSD hard disks.

★ Raid card: Configuration ≥ 512MB cache SAS RAID card, with backup battery, support Raid0, 1,5,6,10,50,60;

★ Optical drive: DVD-RW

★ HBA card: 8GBHBA card

★ Network card: Configuration ≥ 4 Gigabit Ethernet cards (supports network acceleration technology, network wake-up, network card binding function);

★ Power: Configure 2+1 850W hot swappable redundant power supply, upgradeable to 2+2 hot swappable redundant power supply, provide 80 golden plus energy-saving power certification;

★ PCI slot: Configuration ≥ 11 PCI expansion slots, including ≥ 4 hot-plug PCI-E G2 x 8 slots and ≥ 1 PCI-E G2 x 16 slot;

★Provide power evaluation tools, which can reasonably implement power supply and heat dissipation planning for new equipment room cabinets, rationally configure UPS and air conditioning systems, avoid investment waste, and reduce overall total cost of ownership.

★ server management requirements: comes with a full Chinese interface server remote centralized monitoring and management software, support IPMI2.0, remote hardware health monitoring, batch remote switch, remote positioning, etc.; support real-time monitoring system energy consumption, set peak energy consumption; Support KVM over IP, virtual media (floppy drive, optical drive, U disk), and remotely install the operating system. Can realize the server operating system's copy installation, automatic installation and hard disk repartitioning installation and preservation of the existing system partition reinstalling.

★ Qualification requirements for information security services: The original manufacturer's after-sales service is required to have 'Grade 1 for information security service qualification assessment' certification; provide a copy of the certificate

★ after-sales service: to provide three years of original professional after-sales service, issued by the original factory service commitments, require services to go deep into the 4/5 county level, provide the provinces and cities after-sales service agencies list, stamped. station

3 Storage System Control Module: Dual Controller

★CPU type: Embedded RISC architecture

★ Hardware RAID check: independent ASIC RAID check chip

Kernel Operating System: Using a Professional Embedded Storage Operating System

Host Interface Type: 8Gbps FC Interface Type Available

Host interface: ≥8 8Gb FC host interfaces and 4 iSCSI host interfaces standard; (embedded interfaces, non-switch extensions)

Total back-end disk bandwidth: ≥48 Gbps

★ Cache: 8GB of configuration (4GB per controller)

RAID type: Supports RAID 0, 1(0+1), 3, 5, 6, 10, 30, 50, 60; Supports the failure of any two disks at the same time in a RAID disk group without data loss.

★ Hard disk expansion capability: single cabinet ≥ 16 hard disk slots, support ≥110 hard disk expansion.

★ Configuration capacity: Configuration of 12 2000G SAS hard disks and 44 3000G SATA hard disks

Disk intermixing with different interface types: Disks with different interface types can be mixed in the same disk cage. SAS disks, near-line SAS disks, or SATA II disks can be used.

Multi-Path Fault Tolerance: Multi-Path Fault Tolerance and Dynamic Load Balancing

LUN Masking feature supports up to 1024 LUN address mapping/LUN masking

Front-end port dynamic load balancing: front-end host ports across controllers for dynamic load balancing

★ Lithium battery + solidified chip dual buffer power-off protection function: standard 72-hour buffer backup lithium battery and Flash dual data security protection, with lithium battery + solidified chip dual cache power-off protection function, illegal power-down, cache data can be Lithium battery support written to the curing chip, to achieve the function of permanent storage of cached data

Cache refresh: The controller periodically writes the data in the cache to the disk (Cache refresh). There are two main refresh methods: Time-based refresh and auto refresh. The user can set the refresh rate.

Rich management methods: LCD, RS232, WebGUI, Sanmanager, CLI, SNMP and other management methods;

Snapshot and volume mirroring: configure snapshots, local volume replication/mirroring function authorization, upgrade support for remote volume replication, Thin Provisioning

Storage management software: full Chinese storage management software, support for storage partitions, RAID level online migration, LUN online expansion and other functions;

Operating System Support: Supports operating systems such as Windows 2003/2008, Sun Solaris, HP-UX, SGI IRIX, Linux, IBM AIX, and Netware

Technical services: This request for the original three-year hardware and software services

Bidder requirements: bidders must provide the original power of attorney

★ Qualification certification: Storage products must have independent software copyright certification; ISO9001 quality system certification; GJB9001 quality system certification; In order to ensure data security, you need to submit a copy of the above product safety certificate (stamped with the manufacturer's official seal). set

4 SAN switch 8Gb, 24-port switch, 8-port activation, including 8 8Gb/s short-wave SFP, including Web tools, Zoning, EGM software license; can purchase E-Port components to activate the aggregation function; can be expanded to 16 or 24 communication ports, single power (fixed), rack kit, warranty required for 3 years

5 Backup System The VTL host architecture adopted: Hardware-level VTL hosts provide full Chinese management and monitoring interfaces.

★Maintenance management mode: Maintenance management provides a unified Chinese management and monitoring interface. It provides a graphical remote VTL software management interface in Chinese. Through a single window, it can centralize management and maintenance of multiple VTL devices and facilitate remote management of virtual tape libraries. Provides a command line (CLI) management interface to facilitate advanced user management and adjustment to support automatic fault alarms.

CPU type: Intel Xeon quad-core processor

★ Extensibility: Cache ≥ 8GB, Cache can be expanded to 48GB, Gigabit iSCSI interface can be expanded to 6, 8Gb FC interface can be expanded to 2, 10Gb iSCSI interface can be expanded to 4;

Host port type: Gigabit iSCSI ports, 10Gb iSCSI ports, 4Gb FC ports, 8Gb FC ports

Number of host ports: ≥ 2 Gigabit iSCSI ports

★Backup capacity: The system supports up to 512TB (non-compressed capacity) data, and a single cabinet supports 16 hard disks (non-stacking). This configuration configures a 10TB bare capacity.

★ Backup module: 1 backup main module; 3 database backup modules, support Oracle/SQL/Exchange/DB2/SAP; 5 WIN/LINUX files System backup module;

Hard disk type: standard SATA, can support SAS, support mixed with the hard disk drive, optional hot spare disk

Redundant power supplies and fans: redundant hot-swappable power supplies; redundant hot-swappable fans

Data protection RAID level: RISC independent processing chip to achieve hardware RAID function, support RAID 0/1/5/6/10/50/60, etc.

★ Maximum system disk number: ≥512

★ Standard virtual tape library number: ≥256

Number of virtual tape drives as standard: ≥2048

★ Standard virtual tape drive number: ≥131070

Feature support: Standard features include tape smashing, tape import/export, tape consolidation, tape on demand capacity expansion, NDMP support, security tape encryption, automatic multiple copy archiving, automatic tape buffering, remote replication (compression and encryption), Symantec OST feature support and deduplication features

Remote replication: Supports the remote replication of tapes over the network, remote disaster recovery, and multiple replication policies. This process is automatically performed on the VTL side without changing the existing backup server system and occupying the application server resources. , It will not increase the backup window time.

Encrypted archiving: Enables physical tape export by directly attaching physical tape libraries. Exported tapes can be encrypted according to security requirements to prevent data leakage due to loss or unauthorized access of exported tapes. This process is completed automatically on the VTL side without modifying the existing backup server system, not consuming the application server resources, and not increasing the backup window time.

★ tape smashing function: For the data that has been invalidated, the VTL system can use the tape smashing function that comes with it to completely remove the data. For security and compliance purposes, the smashing feature allows users to completely "clear" the virtual tape even if the disk forensics tool cannot access it. The shredding function performs 3 clear operations for the selected virtual tape: the first uses the character, the second uses the binary complement of the character, and the third uses the random character

★Multiple copies of tapes: In the data export operation, multiple tape copy export operations are supported at the same time. This process is automatically completed on the VTL side without changing the existing backup server system or the application server resources. Increase the backup window time.

★ Deduplication: For the massive data backup environment, the optional deduplication function can greatly reduce the occupation of actual physical space by data backup. Repetitive analysis of backed up data to eliminate duplicate data to further increase storage efficiency; Deduplication is compatible with Symmentec NBU, CommVault, EMC NetWorker, Atempo TIMEnavigator, BakBone NetVault, CA ARCserve, IBM Tivoli Storage Manager, HP Data Protector, Oracle Secure Backup and other backup software

Supports virtual library types: ADIC: Scalar 100, Scalar 1000, Scalar 10K, Scalar i500, Scalar i2000

ATL: 1500, 1800, ATL7100, P1000, P3000, P4000, P7000

Exabyte: Magnum LTO Autoloader, VXA PacketLoader

HP: EMLE-SeriesSeries, ESL9000Series, MSL2024, MSL4048, MSL5052, MSL8096

IBM: 03584L22, 03584L32, 03590B11, 03590E11, 3494

Overland Storage: Neo Series 2000, Neo Series 4100, Neo Series 8000

Qualstar:TLS-4222i

Quantum: ATL M1500, ATL M1800, ATL P1000, ATL P3000, ATL P4000, ATL P7000, ATL 7100, PX510, PX720,

Scalar 100, Scalar 1000, Scalar 10K, Scalar i2000, Scalar i500

Sony: CSM-200

Spectra Logic: Gator 12000, Gator 20000, Gator 64000, T50, T120, T200, T380, T950

StorageTek: L20, L40, L80, L180, L700, L700e, L1400m, 9710, 9714, 9730, ACSLS-managed tape libraries, SL500, SL3000

Supported backup software: Atempo TIMEnavigator v3.7, v3.7.0.3, v4, BakBone NetVault v6.5.3, v7, v7.1, v7.3, BakBone NetVault v7.4, 8.0, CA BrightStor Enterprise Backup Server v10 .0, v10.5, CA ARCserve v9.0, v11, v11.1, CA ARCserve v11.5, CA ARCserve v10.5, CommVault Simpana v7.0, EMC NetWorker v6.1.3, v6.1.4, v7.0 , v7.1, v7.2, EMC Networker v7.2.2, v7.3.1, v7.3.2, v7.4.3, EMC Networker v7.3, v7.4, EMC Networker v7.4.4, v7.5, EMC Retrospect v7 .0, EMC Retrospect v7.5, HP OpenView Storage Data Protector v5.1, v5.5, HP OpenView Storage Data Protector v6, IBM Tivoli Storage Manager v5.15, v5.1.510, v5.2.8, v5.3, v5 .3.3, IBM Tivoli Storage Manager v5.2, v5.2.2x, v5.2.3x, v5.3.1, Oracle Secure Backup v10.1, Microsoft Data Protection Manager 2007, Symantec Backup Exec v9.0, v9.1, v10 , Symantec Backup Exec v10.1, 11d, Symantec Backup Exec v12.5, Syncsort Backup Express v2.2, v2.4, Syncsort Backup Express v2.3, Syncsort Backup Express v2.35, Veritas NetBackup v3.4.1, v4. 5 , v5.x, v6.0, Veritas NetBackup v6.5, Veritas NetBackup v6.5.3

Backup compression support: Supports the compression of backup data (compress). This data compression is implemented directly by the VTL system. Non-backup software and backup server implementation

Performance tuning: Automatic dynamic performance tuning of backup data streams without manual intervention.

★ Service requirements: First-time purchase of on-site installation and commissioning services, three years of original technical support and warranty, and original 800/400 service calls when bidding, the above information will be inquiries and confirmations during bidding and delivery. If there is any discrepancy, Refuse the supplier to provide products and do the standard processing.

★ Qualification certification: The backup system must have independent software copyright certification; ISO9001 quality system certification; GJB9001 quality system certification; In order to ensure data security, you need to submit a copy of the above product safety certificate (stamped with the manufacturer's official seal).

★ Manufacturer's authorization: It is necessary to provide the original authorization certificate of the manufacturer for this project. station

6 Link load Hardware architecture: This tender load balancing product is an independent load-balancing product, which does not take into account switch or router plus load balancing modules to achieve this tendering requirement.

★ Number of ports: The maximum number of ports supported by the device is not less than 10, and 4 Gigabit ports are provided as standard, which can be expanded to 4 Gigabit electrical ports and 2 Gigabit SFP ports.

★ Device hardware parameters: 1U rack type, dual power supply, CPU configuration is not lower than dual-core CPU 2.8GHz, standard memory is not less than 8GB

★Performance requirements: one-way throughput is not less than 4Gbps; maximum number of concurrent connections is not less than 4,000,000; four-layer processing capacity is not less than 140,000 connection/second; seven-layer processing capacity is not less than 1,000,000 request/second

Hardware SSL Accelerator Card: Supports Hardware SSL Acceleration

Device redundancy: Support VRRP protocol, support a variety of high availability modes: A / A mode, A / S mode, can support a cluster of up to 32 devices; support FFO heartbeat failover failover, can detect equipment failures in time, Dual-machine switching time is less than 20ms

Redundant device configuration automatic synchronization function: After the configuration of one of the devices is modified, the redundant device can be automatically synchronized to another device, reducing the management complexity.

★ Product functional requirements: The device must have a rich load balancing function at the same time. Server load balancing, link load balancing, global load balancing, and SSL acceleration can be performed simultaneously through a single device.

Multi-site disaster recovery and multi-layer balancing: The device supports the GSLB function of the WAN load and has a rich global load balancing algorithm, including the following algorithms: polling algorithm (GRR), weighted polling algorithm (VWGRR), connection overflow (GCO), Minimum number of connections (GLC), IP precedence (IPO), Global proximity algorithm (PROXIMITY), Regional algorithm (REGION), DPS and other algorithms; Application level health check function can be achieved, supporting data center mutual preparation

★ Multi-link load balancing: Supports outbound algorithm for outbound links, including polling algorithm, weighted polling algorithm, shortest response time algorithm and dynamic detection algorithm. At the same time, it must support network proximity algorithms and can implement The dynamic and static combination function can set the threshold according to the link bandwidth. When a single link reaches the set threshold, all requests are switched to another link. Need to support NAT POOL function, intranet outgoing NAT can go out to NAT through IP pool (need to provide interface screenshot and stamp the manufacturer's official seal)

★ FULL DNS: The load balancing device supports a complete DNS service function and provides configuration of A records, AAAA records, NS records, MX records, Cname records, and SOA records (screen captures are required and the company seal is stamped)

★ Server Load Balancing: The load balancing policy vvvg slightly needs to support load balancing algorithms such as minimum number of connections, polling, SNMP, fastest response, hash, PI, Rewrite Cookie, and Qos; the server load balancing algorithm provided by load balancing is not less than 20 kinds (interface screenshot and algorithm description required, stamped with the official seal of the manufacturer)

Programmable control of load balancing and traffic processing: The management interface provides a user-defined method based on the XML_RPC method for business monitoring, automatic recovery, restart, monitoring and detection, and can achieve flexible external management means through self-programming. Supports programmable control of functions such as load balancing, health check, process restart, and monitoring and detection. (Need to provide interface screenshots and stamp the manufacturer's official seal)

★ Server Health Check: Supports types of health check such as http, tcp, icmp, tcps, dns, srcipt-tcp, script-udp, radius-auth, radius-acct, sip-tcp, sip-udp, rtsp-tcp, https, etc. , supports a variety of active server health checks. (Need to provide interface screenshots and stamp the manufacturer's official seal)

Intelligent health recovery function: When it detects a server failure, it automatically logs in to the server to restart its service process and restore the server's working status. (Requires a detailed description of the implementation method and stamped with the manufacturer's official seal)

Server overload protection: Each server's connection limit can be set according to the different processing performance of each server. Once the connection limit is reached, the application delivery controller will allocate requests to other servers to achieve overload protection for each server.

★ IPV6 support: The device needs to support IPV6 network. You can configure the IPV6 port address, gateway address, background server address, virtual service address directly on the load balancing device, support IPV6 to IPV4, IPV6 to IPV6, IPV4 to IPV6 mode load balancing. (Need to provide interface screenshots and stamp the manufacturer's official seal)

★ SSL offloading and acceleration: Provides an independent SSL acceleration module. The system comes standard with SSL support 25000 TPS. SSL-encrypted traffic supports 5 Gbps, SSL concurrent sessions supports 500000

Fast CRL: Supports Fast CRL Download and CRL List Memory Mirroring

Certificate field transparent transmission: support URL/HEADER/COOKIE mode to transparently pass any field of certificate, custom field and entire certificate

Fast certificate analysis: support certificate fast parsing function FAST CRL, improve SSL processing capability (need to provide interface screenshots and stamp the manufacturer's official seal)

SSL connection multiplexing: support for SSL connection reuse function SSL SESSION REUSE (need to provide interface screenshots and stamp the manufacturer's official seal)

★ Client IP transparent transmission: Supports client IP transparent transmission, transparently transmits user client IP through HEADER, URL, and COOKIE (Screen captures are required and the manufacturer's official seal is stamped)

Global CRL sharing: Multiple SSL services can share a list of CRLs published by a CA center

CRL download method: Supports download of CRL list via HTTP, FTP, and LDAP

★ SSL service load balancing: A load balancing group that supports SSL services is released. The front-end SSL service IP can correspond to multiple servers.

★ Connection multiplexing: Combine multiple requests from one user or requests from multiple users into one connection and send them to the server, reducing the pressure on the application server and improving user response speed.

Smart Compression: Use industry-standard GZIP and Deflate compression algorithms to compress HTTP traffic, reduce bandwidth consumption, and reduce end-user download time for slow/low-bandwidth connections. Configure at least 670 Mbps of processing power

Memory Cache: Uses memory to cache web static content frequently accessed by users, thereby reducing application server stress and improving user response speed

Layer 4/7 bandwidth management and traffic shaping (Qos): Ensures that critical applications can be delivered on time (prior to providing screenshots and stamped with vendor's official seal) through priority, queue, and application-based bandwidth limitations and bandwidth tolerance.

Load balancing application mode: support transparent mode, reverse proxy mode, triangular transmission mode (need to provide interface screenshots and stamped with the official seal of the manufacturer)

Dynamic Routing Support: Supports dynamic routing protocols including RIPv1 (Routing Information Protocol Version 1), RIPv2 (Routing Information Protocol Version 2), and OSPFv1 (Open Shortest Path First Version 1) (Screen captures are required and the manufacturer's seal is stamped)

Intelligent Address Translation: Supports Flexible, Customizable Address Translation Technology

DOS/DDOS protection: support for high traffic DOS/DDOS and SYN Flood attacks

Device Management: The system supports Chinese and English configuration management pages to facilitate user maintenance and management. Supports CLI maintenance and management through command line CLI and GUI page GUI (provides interface screenshots and stamps the manufacturer's official seal)

Smart Loads and Alarms: Supports dynamic addition or reduction of server online and offline functions in the address pool, which can automatically force servers to go online or offline. The application load balancing device can automatically restart the discovery of the server in question by writing a script, and send an alarm via EMAIL or SMS (provided an interface screenshot and stamped with the manufacturer's official seal).

★ IPv6 and Ipv4 conversion: Provides complete IP conversion and load balancing capabilities between Ipv4 and Ipv6 networks to support users in creating Ipv4 and Ipv6 hybrid host resources (screen captures are required and vendor stamps are stamped)

Security Management: Encrypted system management, ssh-based command line and https-based graphical management

Statistical charts and logs: You can see the real-time traffic and system overhead statistics charts on the device's management interface without additional client software, and bring your own log alarms and output functions.

Real-time packet capture tool: The application delivery controller can remotely log in to the application delivery controller without using the port mirroring function, and run its own real-time packet capture tool similar to tcpdump, which can perform packet capture analysis of packets passing through its own device. Packet capture results can be exported to a file format and can be opened using common analysis tools such as sniffer, wireshark and other tools

Server smooth shutdown/smooth startup function: When the server is being maintained, new requests can be assigned to other servers by enabling the smooth shutdown function and smooth start function, thus reducing the access failure of some users due to maintenance of the device.

Online software upgrade: When software upgrades are performed on devices that are in the Active state, there is no need to switch between the active and standby devices and the services are not interrupted. If the upgrade fails, it will not affect the business

Qualification requirements: Provide a sales license for the special products for computer information system security, provide a commercial type certificate for password products, provide a computer software copyright registration certificate, and provide the manufacturer's ISO9001 quality management system certification certificate. The above certificates must be stamped with the official seal of the company, and the original is bound. Original bid documents

★ After-sales service: The original factory free manual 3 years, parts replacement, 7x24-hour response, with a common spare parts on-site service within one working day

★ Authorization: Provide the original manufacturer's authorization and after-sales service commitment for this project, stamped with the official seal of the manufacturer, the original is bound into the original bid document.

7 VPN gateways/firewalls ★Energy-saving and high-performance embedded multi-core CPUs, with no less than 8 concurrent processing threads, need to provide an intuitive interface for management pages

★ The number of Gigabit electrical ports is not less than 4 and the number of Gigabit SFP slots is not less than 12

Provides one out-of-band management interface, one auxiliary AUX management interface, USB interface \u0026gt;=2

★Power consumption: no higher than 65W

★ Standard 1U rack-mounted devices, multi-core processor + ASIC architecture

Require manufacturers to have 'multi-core firewall parallel processing performance testing method', 'multi-core architecture-based batch message receiving and sending methods', 'a multi-core technology-based small volume high processing capability firewall system' related patented technology; provide relevant screenshots and Website Query Link Screenshot Proof

★ Firewall throughput \u0026gt;= 4Gbps, VPN encrypted throughput \u0026gt;= 1Gbps, concurrent connections \u0026gt;= 3 million, new connections per second \u0026gt;= 50,000

Support transparent mode, route mode and mixed mode

Supports physical interfaces, logical interfaces, sub-interfaces

★ Supports switch ports and port aggregation; supports traffic mirroring through mirrored ports for storage, analysis, and auditing by third-party devices;

★ Support ARP Inspection; require manufacturers to have 'anti-ARP attack method' related patent technology, provide relevant screenshots and website query link screenshots

Supports access control at the link layer, network layer, transport layer, and application layer

Supports filtering based on various conditions such as MAC, IP, PORT, frame type, and time period

Support ACL entry insert, switch, comment, rename function

Supports access control at the link layer, network layer, transport layer, and application layer

Support flexible and diverse address translation methods (one-to-one, one-to-many, many-to-many)

Supports forward and reverse bidirectional address translation

Supports address aliasing, address exemption, virtual address mapping, and port redirection

Supports limiting the number of connections through NAT

Support TCP serial number random protection

Support IPsec VPN, L2TP VPN, ezVPN

The manufacturer is required to have the IKE message negotiation method and equipment, the method for constructing the IP layer SSL VPN tunnel, the dynamic QoS bandwidth allocation method based on the IPSEC VPN, an Ipsec forwarding method, and one for VPN encryption and decryption chip driver method' related patent technology; provide relevant screenshots and website query link screenshots proof;

★ Support outbound multi-link load balancing, outbound based on ISP address load balancing, outbound interface-based bandwidth control load balancing, outbound by multiple groups using different load balancing algorithms, outbound interface load session session sticky function ;

Supports link monitoring state detection and supports inbound server load balancing

★ Support static routing, RIPv1/v2, RIP authentication, OSPF

★ Support source routing, source interface routing, policy routing, equal-cost multi-route load balancing, static multicast routing, IGMPv1/V2

★ Built-in Unicom, Telecom, Education Network public IP address database, and can be updated individually or in batches, combined with strategic routing to achieve automatic routing, requires the screen to provide proof of screenshots

*Virtual gateway function: Supports 16 virtual gateways, and can support up to 512 ports; Supports transparent, routed, and hybrid network modes; Virtual gateways can be partitioned based on physical interfaces, IP, and VLAN; Supports security policies such as packet filtering and address translation;

★ Support multiple authentication methods (Local, USB Key, RADIUS, TACACS+, LDAP, etc.)

Can withstand common types of attacks, including Ping-of-Death, Ping-Flooding, TearDrop, UDP-Flooding, SYN-Flooding, KillWin, WinNuke, LAND IGMP2, IP Fragmentation, Port Scan, IP-Spoofing, etc.

★ Supports state detection for HTTP, SMTP, FTP, TFTP, DNS, ICMP, PPTP, H.323, SIP, MGCP, RSH, RTSP, SQLNET, etc., supports P2P restrictions and speed limit, etc.; requires manufacturers to have 'based on host behavior The multi-dimensional protocol identification method' has related patented technologies; provides relevant screenshots and website query link screenshots

Support script filtering, JavaApplet, Javascript, ActiveX

Support URL filtering, blacklist and whitelist of URL, URL import and export

★ Support system upgrade, require manufacturers to have 'hardware firewall and upgrade method to achieve automation upgrade' related patented technology; provide relevant screenshots and website query link screenshot proof

★ Supports no less than 10 local configuration files to maintain, you can choose to invoke the configuration file on demand, you need to provide screenshots to prove

★High availability: Supports multiple hot standby modes such as active/standby mode (A/S), main master mode (A/A), and asymmetric routing. The switching time is less than 1 second. It supports at least 4 nodes and passes the VRRP protocol. Implements cluster load balancing; supports configuration synchronization and session synchronization; supports multiple heartbeat port backups; supports any physical interface as an HA interface;

Supports mail filtering, filtering support for hanging Trojan websites

★ Qualification Certificate: Provide computer software copyright registration certificate, provide Ministry of Public Security sales license, provide national information security assessment center ISCCC certification, provide military information product certification, provide confidential product qualification

8 WEB Firewall Hardware requirements: 1 management port, at least 4 optical optional Gigabit working ports, 1 serial port

Management mode: supports B/S management and SNMP management

Deployment mode: support transparent mode, support reverse proxy mode

★ performance requirements: throughput ≥ 1Gbps, delay: millisecond level (\u0026lt;=100ms); HTTP maximum concurrent number ≥ 1 million; HTTP new connection / second ≥ 16000; SSL new connection / second ≥ 10000;

★ WEB application protection: For the protection of WEB application security threats proposed by OWASP, build the Great Wall of Steel for network applications. Provides a variety of attack signature libraries. Senior hackers make up the offensive and defensive labs to provide continuous upgrades of feature databases to prevent various variant attacks.

And new types of attacks.

★Mainly to provide protection against SQL injection attacks; to prevent SQL blind attacks; to prevent XSS cross-site attacks; to prevent PHP injection attacks; to prevent SSI injection attacks; to prevent LADP injection attacks; to prevent Email injection attacks; Prevent reptile attacks; Ability to support request limits and access time limits; Ability to support login information auditing; Ability to prevent malicious code injection attacks; Ability to support anti-regular protocol attacks; Prevent file injection attacks; Prevent response split attacks; Prevents the leakage of critical information; Prevents command injection attacks; Prevents cookie injection attacks; Prevents dangerous file accesses; Prevents guessing of databases; Prevents dangerous method attacks; Can support host black and white lists; Can support resource theft prevention; Can support HTTPS protocol filtering; support dynamic learning, intelligent analysis;

Server and application vulnerability protection: Dynamic intelligent protection function for various server systems such as windows server and application server systems such as JEE server; Defense includes worm, Trojan, backdoor, application layer DOS/DDOS, scanning, spyware, vulnerabilities

Attacks, buffer overflows, and other attacks; Defense against effective attacks on different server vulnerabilities.

Application content and sensitive information protection: Bidirectional data cleaning of WEB applications is provided, not only providing protection against application access information, but also verifying the application's response content, avoiding leakage of sensitive information, and preventing the issuance of illegal information.

Virus protection: built-in virus signature database for virus detection against various protocols; can kill a large number of file-type, network-type, and mixed-type viruses; use intelligent behavior discrimination to accurately kill a variety of variant viruses and unknown viruses; provide viruses Real-time upgrade of signature database.

Network Attack Protection: Provides packet filtering mechanism and 5-tuple protection function; provides IP blacklist protection; resists network attacks such as DOS/DDOS and ICMP flood; supports NAT address translation and routing functions; real L1-L7 comprehensive deep protection system.

*WEB application acceleration function: support load balancing, support cache acceleration, support connection pool acceleration

Alarm function: Support SMS alarm, support email alarm, support real-time alarm, support sound alarm

Audit Analysis: support chart, report format, support day report, weekly report, monthly report, support pdf, word, html format export

★用户管理:用户管理支持权限设置,实现radius用户认证,用户管理实现三权分立

★资质证书:国家公安部颁发的计算机信息系统安全专用产品销售许可证,国家保密局颁发的涉密信息系统产品检测证书,国家信息安全测评认证中心颁发的信息安全产品认证,国防科学技术

工业委员会颁发的武器装备科研生产许可证; 台

9 网络管理系统 ★基本要求

1、完全基于B/S架构(监视及管理),中文界面,风格友好,操作简便

2、采用JAVA架构开发,可运行在Windows、Linux平台上(含64位)

3、软件必须拥有自带数据库,无须用户额外购买数据库

4、支持切换数据库为MS-SQL

5、为了不影响业务系统,不允许在被管理服务所在的服务器上安装代理

6、可作为Windows服务运行

7、系统具备自检功能,保证高稳定性和可靠性

8、支持双机热备功能

★9、智能手机GUI(支持iPhone、Blackberry及其它Windows OS手机)

★网��管理功能

1、拓扑及发现:产品要能够并行作业,利用SNMP、ICMP等针对IP网络的设备、端口、接口以及之间的关系进行自动发现。用户要能通过发现向导来指定要发现的网络。也要能随时通过添加网络功能来添加新的网络,从而扩大管理范围。

2、自定义视图:要求能创建自定义视图,将用户所感兴趣的设备分组并集中管理。在这里,要能为不同设备间添加连线,重排设备,要能设定背景图像。同时还要能创建打开其它业务视图的捷径图标。并能为自定义视图指定权限,使不同的用户可以查看及管理不同的自定义视图

3、可以在Web界面上对自定义视图进行编辑

4、WAN RTT监控

5、路由器监控:要求能够监测路由器各端口的流量、利用率和出错率等信息。还能够监测路由器本身的CPU利用率、内存利用率、缓冲统计数据等。另外还要求可以通过自定义SNMP监控,监视用户指定的性能指标。

6、交换机监控:要求能够监测交换机各端口的流量、利用率和出错率等信息。还能够监测路由器本身的CPU利用率、内存利用率、缓冲统计数据等。另外还要求可以通过自定义SNMP监控,监视用户指定的性能指标。

7、支持WiFi设备监控

8、支持UPS设备监控

9、支持ESX Vmware监控

10、支持自定义WMI监控

11、打印机监控:产品要能自动发现网络中的打印机并将它们置于一个专用的打印机图中。特有的打印机图标能生动直观地显示打印机,操作员无需动身即可查看到打印机上显示的状态/错误消息。要能为任何支持打印机MIB的打印机提供专业的打印机监控功能。操作人员要能在出现故障(如纸张堵塞)时即时接收到告警。要能检测出墨粉不足/无墨粉,纸张不足/无纸张等状况。

12、支持防火墙监控:要求能够监测防火墙各端口的流量、利用率和出错率等信息。还能够监测防火墙本身的CPU使用率,内存使用率,活动连接数等参数。另外还要求可以通过自定义SNMP监控,监视用户指定的性能指标。

13、能够监测Windows、Linux、Solaris等服务器,能够监测服务器的CPU使用率、内存使用率、磁盘使用率,安装的软件、运行的进程等参数。另外还要求可以通过自定义SNMP监控,监视用户指定的性能指标

14、MS-SQL监控:能够监测Read/Writ统计、日志空间统计、用户连接数、缓冲击中率等参数。

15、Oracle监控:能够监测数据文件读写次数、数据文件分配空间、库缓冲获取数、库缓冲重载数,用户提交数等数据。

16、MS-Exchange监控:能够监测连接统计、消息队列统计、未转发统计、消息尺寸等参数。

17、支持Windows服务的监控:允许用户在本地监控Windows服务,也要能面向网络中的多个服务器远程监控windows服务。要能通过WMI来监控Windows服务,而且不需要在远程机器上安装代理。如果监控的服务失败,要能自动执行下列操作:重启失败的服务,重启机器

18、Windows事件日志监控,产品要能提供了自动的规则,用于监控网络中所有windows服务器和工作站的重要安全日志。这样用户就能轻易地检测诸如失败登录、由于密码错误而导致登陆失败、帐户锁定、访问安全文件失败、窜改安全日志等事件。还要能创建许多自定义规则用以巩固公司所采用的安全策略。除了安全日志外,要能还能监控应用、系统和其他事件日志

19、URL监控:产品要能检查URL以确保其要能访问且呈现页面,比起依赖ICMP ping或在端口80上执行TCP端口检测,这是一个更加可靠的网站监控方法。要能监控公共网站以及内部互联网上运行的web应用的可用性和健康状况。而且,要能提供网站的可用性和性能趋势

故障告警

1、可以对被监控的对象设置阈值,在出现严重问题前及时告警,实现主动监控;且可以为不同严重程度设置不同警告级别,并通过颜色区分告警;可以设置告警产生轮询

2、告警和阈值,产品要支持多种告警机制,能在设备或服务出现故障或降级时警告操作员。操作员要能配置在某个设备上的服务或健康状况检查计数高于或低于一定界限时发出告警。操作员还要能为某个服务、应用或设备指定阈值,并配置在阈值被超越时发出告警

3、支持各种通知方式,包括短信,邮件,可以在第一时间将故障报告给管理人员

4、可以发送SNMP陷阱,方便与其它管理软件联动起来

5、可以通过执行程序自动修复一些故障

6、可以生成工单发送到帮助台管理软件中,实现流程化故障处理

7、SNMP陷阱和自定义MIB支持:操作员要能为来自任何自定义SNMP MIB的陷阱添加支持。要能提取随SNMP陷阱以变量绑定的形式发送的有用信息(SNMP变量绑定),根据供应商相关的MIB,要能监控那些设备上重要的变量

8、可以提取告警,添加注释,或清除告警

9、对于没有及时处理的告警,可以进行告警升级

10、具有SNMP陷阱监听器工具,可以处理来自外界的SNMP陷阱

11、支持syslog监控

报表功能

1、TopN报表:产品要为服务器、交换机、路由器等所有设备提供了独立的Top N报表,这将有助于操作人员更加直观地了解服务器、路由器、交换机以及整个网络的性能

2、日、周、月报表和自定义报表:操作人员要能快速且即买即得地获得日、周、月或自定义周期的图表和报表。操作人员要能针对同一个参数快速对比两个或更多的设备。这些报表和图表还要能输出为其它格式,如HTML、PDF或JPG

其他管理功能

1、支持多种类型用户,且为不同用户分配不同权限

★2、第三方集成 :要求要能够方便地和网络流量分析系统、资产软件及帮助台集成起来,以便为用户提供更全面的功能

3、支持用户免费下载升级包做产品升级

4、支持用户自己为设备和端口添加附加说明字段 套

10 核心交换机 总体要求:一体化机箱、成套产品资料以及相应的线缆、防静电护腕等附属配件。

产品架构: 要求必须采用分布式转发架构,避免单点故障。

主控板槽位数: ≥2

★业务板槽位数: ≥6

★背板带宽:≥6Tbps;

★交换容量:≥2T

★包转发率: ≥1080Mpps

扩展性: 整机支持≥240个万兆接口

★功能性:支持独立的硬件监控模块;支持无源背板; 支持全分布式线速转发;支持POS接口单板,支持622M、2.5G POS接口

电源要求: 支持分区供电,颗粒化电源,支持N+N电源冗余(AC和DC均支持)

★配置要求:双主控、双电源、千兆以太网光接口数量≥24;千兆以太网电接口数量≥48;如果交换网板非集成,需要将交换网板插槽配满;

部件冗余: 支持冗余电源、冗余主控板、冗余风扇,支持业务板的在线插拔

★业务板要求: 万兆单板端口密度≥40;

虚拟化功能: 支持虚拟化功能,可将多台物理设备虚拟成1台逻辑设备,多台设备中的任意端口可进行链路捆绑;虚拟化链路带宽≥256G

可靠性: 支持双引擎快速倒换,主备切换时候板内转发无丢包;支持各种配置数据在主备主控板上实时热备份,支持热补丁功能,可在线进行补丁升级;支持硬件OAM,保证设备高可靠性;

二层特性: 支持整机MAC地址\u0026gt;512K;支持RRPP多实例;支持LLDP;支持VCT,端口环路检测;

★路由协议:支持IPv4静态路由、RIP V1/V2、OSPF、BGP,支持IPv6静态路由、RIPng、OSPFv3、BGP4+等;路由表数≥512K; 支持路由协议多实例 MCE

MPLS : MPLS分布式处理,全线速转发 MPLS TE;支持VLL, 支持实例数量≥4K;支持VPLS,VPLS实例≥1K,

★安全特性:支持MFF,用于减轻网关ARP处理负担,降低网关受ARP攻击的风险,实现用户间的二层隔离。CPU队列≥1K

访问控制: 支持双向ACL; ACL≥64K;

Qos特性: 优先级队列调度:每端口支持8个优先级队列;

★多业务特性:支持Firewall功能、支持NAT功能、支持IPSec功能、支持负载均衡功能、支持无线AC控制器

★绿色节能:支持802.3az能效以太网

成熟度: 在网运行超过2年

★设备管理:支持SNMPv1、SNMPv2、SNMPv3、RMON等网络管理协议,支持NQA;并且支持通过网管软件远程进行设备软件升级、配置等

★时钟同步:主控板支持时钟能力

★认证: 提供中华人民共和国工业和信息化部IPV4和IPV6入网证复印件

要求设备生产商具有TL9000通信行业质量证书、ISO9001管理体系

设备核心软件平台通过CMM 五级及以上认证,提供证书复印件;

★服务: 提供原厂商服务承诺函

其它要求: 为保证产品质量,投标商需提供原厂商针对此项目的授权书。

所投产品厂商需在省内设有本地服 台

11 UPS电源    ★1、UPS采用在线双转换式模块化UPS。采用60KVA容量,具有N+1冗余功能,最大可扩容到480KVA,电池采用120节100AH电池,从而保证在系统满负荷的情况下,配备电池能持续工作2小时。

★2、UPS必须采用模块化热插拔技术,以降低MTTR(平均故障修复时间),单个模块必须支持在线并入或退出,使维护与升级都简单、安全、易行。单模块容量:20KVA。单机最多允许模块数量6个。除模块并联之外,UPS需同时支持机架并机技术,机架并联数量不少于4台。

★3、为后期负载增加扩容需要,所有2台以上的并机UPS电源机柜必须能够共享同一套蓄电池。

4、UPS必须采用IGBT整流技术。

5、UPS采用内置同步控制技术。

6、UPS输入

(1) 输入电压: 三相五线制,,AC380V -45%~+25%;

(2) 输入频率: 50Hz±10%

(3) 输入功率因数:≥0.99

(4) 输入电流谐波含量:≤3%

7、UPS输出

(1) 输出功率: 60kVA

(2) 输出电压: 三相五线制, AC380V±1%

(3) 输出波形: 正弦波

(4) 输出频率精度: 50HZ±0.05%

(6) 同步速度: ≤1HZ/sec

(7) 谐波失真: ≤3%(非线性负载),≤1%(线性负载)

(8) 峰值因数:≥3:1

(9) 三相不平衡负载能力:100%

(10) 过载能力: 110% 60分钟,125%10分钟, 150 %1分钟

(11) 动态稳定性: 当负载100%突变时,输出电压波动小于5%,并在20毫秒内恢复到1%以内

8、其它参数

(1) 效率: \u0026gt;94%(25%-100%负载)

(2) 噪声: \u0026lt;65db(在1米处)

(3) 平均无故障时间MTBF: 不少于20万小时

9、UPS应为长效型,整流器输出直流电压应满足外接长延时蓄电池组电压等级的运行要求。

★10、UPS应具有模块扩容能力,以满足未来不断增长的负载需求,单一机架容量可扩容至120KVA。

★11、UPS在不配置内置蓄电池的情况下确保能正常可靠运行。

12、逆变器采用IGBT技术,当由蓄电池组供电时,在其最高电压和最低电压范围内,逆变器均应正常工作,当蓄电池组电压降至放电终止电压时,逆变器应能停止工作以保护蓄电池。

13、外壳防护要求:UPS保护接地装置与金属外壳的接地螺钉间应具有可靠的电气连接,其连接电阻应不大于0.1Ω。

14、静态旁路开关

静态旁路开关应采用高可靠性的器件。UPS装置逆变器输出应对旁路输入进行连续跟踪,当逆变器失去输出或太大的冲击负荷、过负荷及负荷侧短路,超过了逆变器的能力时,静态旁路开关应能无间断自动地将负荷从逆变器切换到旁路电源,当故障消失后,静态旁路开关应能无间断自动地将负荷切换到由逆变器供电,与旁路电源的切换,不应有相位突变。

15、UPS应具有的功能

(1) 具备面板显示运行情况(中文大屏幕显示)。

(2) UPS在电池放电时,应可预测并显示电池的剩余放电时间。

(3) UPS输出端有电路保护及限流功能。

(4) 具备完善的保护功能:输出短路保护、输出过载保护、过温度保护、电池电压低保护、输出过欠压保护、抗雷击浪涌能力。UPS发生故障时必须发出声光告警。

(5) 具有并联冗余扩容功能,并机环流\u0026lt;2%。

(6) UPS必需采用双DSP芯片纯数字化控制,进行全自动操作。

(7) 安全操控设计、使用安全方便,即使不按程序开机也不会造成UPS损坏;模块插拔应有机械闭锁装置以防插错位置,还有电气联锁以防在其它电路板未装时系统误操作。

★(8) UPS模块必需具有故障隔离功能,单一模块故障时,系统能迅速自动隔离故障模块,避免故障蔓延,影响其余模块的工作。

(9) UPS装置带30When the following load is running under %, all technical indexes shall be guaranteed within the required range, and the overall efficiency shall be ≥ 94%.

(10) The UPS device has ventilation and cooling devices to ensure that the components work normally at the rated ambient temperature, and there is an expandable metal protective cover for the air inlet and exhaust holes; when the ventilation device fails, it should be able to promptly report an alarm, and the power can be The inverter automatically switches to the bypass AC power supply;

(11) UPS should be equipped with emergency stop (EPO function) as standard.

(12) The UPS must have detailed fault information records and can store no less than 500 messages.

(13) It has long-distance online self-diagnosis, fault sound alarm, remote monitoring and control function, two independent communication of monitoring system and information network (must have physical isolation), realize network monitoring and remote 24-hour acousto-optic fault alarm monitoring function, including 24-hour acousto-optic fault alarm implementation in the alarm terminal need to consider RS485 converted to RS232 and optical input.

(14) The power management software can run under operating systems such as UNIX, WIN NT, WINXP, and WIN2000. It monitors the running status of the UPS system through the network and has the SMS alarm function.

(15) Has a variety of communication interfaces with external computers and provides related software.

(16) Intelligent battery detection and automatic battery discharge maintenance.

(17) The UPS power system has dry contact signals (in the form of dry contacts) and intelligent communication interfaces RS232, RS485, SNMP, and provides communication protocols, and provides communication cables and various alarm signal output terminals for use with communication interfaces. When the UPS has a variety of faults, abnormalities, or all the working power disappears, the UPS should be able to issue audible and visual alarms.

Second, the basic technical requirements of valve-regulated sealed lead-acid batteries

1. Type: Valve-controlled sealed lead-acid battery

2. Single cell specification capacity: 12V/100Ah

3, single battery float voltage: 13.5 ± 0.12V

4, single cell battery charging voltage: 13.8V ~ 14.1V

5, battery voltage: ± 240V

6, the total number of batteries: 120 only

7. Storage and combination of batteries: 40 batteries in each group (20 for positive and negative electrodes). Each battery is placed in the battery cabinet and has a shock-resistant platform.

12 Server Cabinet (including KVM LCD Kit) The 42U standard cabinet is made of high-quality cold-rolled steel plate. The front and rear meshes are used to dissipate heat. The high-density mesh double-opens the back door, and the left and right side doors can be quickly disassembled. The cabinet can be run up and down. Thickness: square hole bar ≥ 2.0, other ≥ 1.5, specification: 2000*600*900, 16 standard server PDU, 16 KVM with laptop keyboard/touch mouse/19 inch LCD monitor

13 Server Cabinets The 42U standard cabinets are made of high quality cold-rolled steel plates. The front and rear meshes are used to dissipate heat. The high-density mesh double-opens the rear doors, and the left and right side doors can be quickly disassembled. The cabinets can be routed up and down. Thickness: square hole bar ≥ 2.0, other ≥ 1.5, specification: 2000*600*900, 16 standard server PDU, Taiwan

14 Portable PC CPU: dual core, four-threaded clock speed≥2.5GHz 3rd-level cache≥3MB)/memory≥4GB DDR3 1600/HDD:≥500GB SATAII/Intel HD 4000 Core Graphics/genuine Windows7/Wireless LAN Card/P Webcam / Support APS Dynamic Energy Saving Technology / Keyboard Light / Fingerprint Identification System / Bluetooth 4.0 Module / USB3.0 / HDMI / 12.5 inch LED Backlight Anti-glare Slim LCD Display 16:9/8 Cell 2200mAH Battery / 180 Degree High Intensity Alloy shaft / spill-resistant keyboard / carbon fiber body / three years full protection three-year door / year accident protection platform

In the event you loved this short article in addition to you would want to obtain guidance regarding usb backup storage device generously stop by our web-page.

Location

There is no location information for this user

21 City Walls Rd
Clochtow, NA
Somalia
Ab41 4sw

Ways To Get In Touch

There is no contact information from this user
  • Telephone 079 6571 7199
  • Email
  • Website http://www.linkbermuda.com/UserProfile/tabid/57/UserID/366192/Default.aspx
  • IM

Activity Feed

My Profile