Skip to main content

How to write an RFP for network firewall

Requirements, questions, and evaluation criteria specific to network firewall procurement

8 min read

Network firewalls are a cornerstone of cybersecurity, but selecting the right solution requires careful consideration of evolving threats and architectural complexities. An RFP provides a structured approach to evaluate vendors and ensure the chosen firewall aligns with your organization's specific security needs and business objectives.

What makes network firewall RFPs different

Network firewall RFPs are unique due to the intricate interplay of hardware, software, and threat intelligence required for comprehensive protection. Unlike generic software procurements, firewall selection demands a deep understanding of network topology, traffic patterns, and specific threat vectors targeting the organization.

Regulatory compliance, data privacy mandates, and the need for seamless integration with existing security infrastructure further complicate the evaluation process.nnModern firewalls have evolved from simple packet filters to sophisticated, AI-powered systems capable of deep packet inspection, intrusion prevention, and cloud-native security.

This evolution necessitates RFPs that delve into the vendor's architectural approach, threat intelligence capabilities, and ability to adapt to emerging threats.

The increasing adoption of cloud and hybrid environments also requires firewalls that can seamlessly extend protection across diverse infrastructure components.nnFurthermore, network firewall RFPs must address the operational aspects of firewall management, including rule base optimization, change management, and integration with security information and event management (SIEM) systems.

The administrative burden associated with complex firewall configurations can significantly impact IT resources, making ease of use and automation critical evaluation factors.

  • Throughput and performance under load with all security features enabled (DPI, IPS, SSL decryption)
  • Integration with existing security infrastructure (SIEM, Active Directory, cloud platforms)
  • AI-powered threat intelligence and zero-day protection capabilities
  • Scalability and deployment flexibility across on-premise, cloud, and hybrid environments

RFP vs RFI vs RFQ

Here's when to use each document type when procuring network firewall software.

RFI

Request for Information

Use early in your search to understand what vendors offer and narrow your list. Gather general capabilities, company background, and high-level pricing ranges.

RFP

Request for Proposal

Use when you know your requirements and want detailed vendor solutions and pricing. This is your main evaluation document for shortlisted vendors.

RFQ

Request for Quote

Use when requirements are fixed and you just need final pricing. Often used after RFP when you're ready to negotiate with finalists.

For network firewalls, an RFI is useful for initial market research to gauge vendor capabilities and emerging technologies. An RFP is essential for detailed technical and commercial evaluations, while an RFQ is generally unsuitable due to the complexity and customization involved.

Technical requirements checklist

Use this checklist when defining your RFP scope.

Core Firewall Capabilities

  • Stateful packet inspection
  • Deep packet inspection (DPI)
  • Intrusion Prevention System (IPS)
  • Application control
  • URL filtering

Threat Intelligence & Protection

  • AI-powered threat detection
  • Zero-day exploit protection
  • Malware sandboxing
  • Botnet detection and prevention
  • Reputation-based filtering

Network & Deployment

  • Support for multiple deployment models (hardware, virtual, cloud)
  • High availability and redundancy
  • Scalability to handle increasing traffic volumes
  • Support for VPN and remote access
  • Integration with SD-WAN

Management & Reporting

  • Centralized management console
  • Real-time monitoring and alerting
  • Comprehensive logging and reporting
  • Automated rule base optimization
  • Integration with SIEM systems

Identity and Access Control

  • Integration with Active Directory and other identity providers
  • Role-based access control
  • Multi-factor authentication
  • User and group-based policies
  • Granular access control policies

Questions to include in your RFP

Architecture & Deployment

  • Describe your firewall architecture and how it ensures high availability and redundancy.
    Ensures business continuity in case of hardware or software failures.
  • What deployment options are available (hardware appliance, virtual appliance, cloud-based) and what are the pros and cons of each?
    Determines flexibility and alignment with infrastructure strategy.
  • How does your solution integrate with cloud platforms like AWS, Azure, and Google Cloud?
    Essential for organizations with hybrid or multi-cloud environments.
  • What is your approach to micro-segmentation and east-west traffic control?
    Limits the impact of a breach by preventing lateral movement within the network.

Threat Intelligence & Protection

  • Describe your AI-powered threat intelligence capabilities and how they protect against zero-day exploits.
    Proactive defense against unknown threats.
  • How does your solution handle encrypted traffic inspection (TLS 1.3/SSL) at scale without impacting performance?
    Ensures visibility into encrypted traffic without creating bottlenecks.
  • What types of malware sandboxing techniques are used to analyze suspicious files?
    Provides a safe environment to detonate and analyze potentially malicious code.
  • How frequently are threat intelligence feeds updated, and what sources are used?
    Ensures the firewall has the latest information to block emerging threats.

Performance & Scalability

  • What is the maximum throughput of your firewall with all security features enabled (DPI, IPS, antivirus)?
    Determines the firewall's ability to handle peak traffic loads without performance degradation.
  • How does your solution scale to accommodate increasing network traffic and user growth?
    Ensures the firewall can meet future demands without requiring costly upgrades.
  • What is the latency introduced by your firewall under normal and heavy traffic conditions?
    Minimizes impact on application performance and user experience.
  • Can you provide performance benchmarks from third-party testing organizations?
    Provides independent validation of the firewall's performance claims.

Management & Reporting

  • Describe your centralized management console and its capabilities for configuring and monitoring firewalls.
    Simplifies firewall administration and provides a single pane of glass for managing security policies.
  • How does your solution automate rule base optimization and identify redundant or unused rules?
    Reduces administrative overhead and improves security posture.
  • What types of reports are available for compliance auditing and security analysis?
    Supports compliance requirements and provides insights into network security events.
  • How does your solution integrate with SIEM systems like Splunk or Microsoft Sentinel?
    Enables centralized threat detection and incident response.

Integration & Compatibility

  • How does your solution integrate with Active Directory and other identity providers for user authentication and authorization?
    Enables identity-based security policies and simplifies user management.
  • Is your firewall compatible with our existing network infrastructure and security tools?
    Avoids compatibility issues and ensures seamless integration with existing systems.
  • Does your solution support API integration for automating firewall management tasks?
    Enables integration with DevOps pipelines and other automation tools.
  • How does your solution integrate with cloud access security brokers (CASBs) for securing cloud applications?
    Extends firewall protection to cloud-based resources and data.

Pricing & Licensing

  • Provide a detailed breakdown of your pricing model, including licensing fees, support costs, and any additional charges.
    Ensures transparency and avoids hidden costs.
  • What are the different licensing options available (perpetual, subscription, usage-based)?
    Determines flexibility and alignment with budget constraints.
  • Are there any volume discounts or special pricing programs available for our organization?
    Reduces the overall cost of the firewall solution.
  • What is the total cost of ownership (TCO) for your solution over a three-year period?
    Provides a comprehensive view of the long-term costs associated with the firewall.

Compliance and security requirements

Depending on your industry, you may need to require proof of these certifications and standards.

PCI-DSS

Required if processing, storing, or transmitting cardholder data. If applicable, request a copy of their latest Attestation of Compliance (AOC) and details of their PCI-DSS environment.

HIPAA

Required if handling protected health information (phi). If applicable, request a Business Associate Agreement (BAA) and documentation of their HIPAA security controls.

SOC 2 Type II

Required if providing services to other organizations. If applicable, request a copy of their latest SOC 2 Type II report and understand the scope of the audit.

GDPR

Required if processing personal data of eu citizens. If applicable, request documentation of their GDPR compliance efforts and data privacy policies.

NIST Cybersecurity Framework

Required for organizations seeking a standardized approach to cybersecurity. If applicable, inquire about their alignment with the NIST Cybersecurity Framework and the specific controls they implement.

Evaluation criteria

Here is the suggested weighting for network firewall RFPs.

Functionality Fit How well the solution meets the stated requirements and addresses specific use cases.
25%
Performance & Scalability The firewall's ability to handle current and future traffic volumes without performance degradation.
20%
Threat Protection Capabilities The effectiveness of the firewall in detecting and preventing known and unknown threats.
20%
Management & Reporting Ease of use, centralized management, and comprehensive reporting capabilities.
15%
Integration & Compatibility Seamless integration with existing security infrastructure and compatibility with network devices.
10%
Total Cost of Ownership Implementation, licensing, and ongoing costs associated with the firewall solution.
10%

Some weights were adjusted based on your priorities.

  • Increase if the organization has highly specific or complex security needs.
  • Increase for organizations experiencing rapid growth or high traffic demands.
  • Increase for organizations facing a high risk of cyberattacks.
  • Increase for organizations with limited IT resources or complex security policies.
  • Increase for organizations with a complex or heterogeneous IT environment.

Red flags to watch

  • Lack of transparency in pricing

    Vendors who are unwilling to provide detailed pricing information may have hidden costs or complex fee structures.

  • Poor performance with all security features enabled

    The firewall may not be able to handle the expected traffic volume with all security features turned on, leading to performance degradation.

  • Limited integration capabilities

    The firewall may not integrate well with existing security tools, creating silos and hindering threat detection and response.

  • Inadequate threat intelligence updates

    The firewall may not be able to protect against the latest threats if its threat intelligence feeds are not updated frequently.

  • Lack of experience in your industry

    The vendor may not understand the specific security challenges and compliance requirements of your industry.

Key metrics to request

Ask vendors to provide benchmarks from similar customers.

Exploit Block Rate

Measures the effectiveness of the IPS engine in blocking known exploits.

Mean Time to Detect (MTTD)

Indicates how quickly the system identifies and flags an intrusion.

Rule Recency Rate

Measures the hygiene of the rule base and identifies inactive or redundant rules.

False Positive Rate

Measures the operational noise level and identifies potential configuration issues.

Throughput Stability

Ensures that security is not negatively affecting business productivity.