RFP/Network Plan Q & A

American Healthcare Connect Consortium, Inc. has received additional requests from some vendors to extend the time frame for submitting proposals, as many vendors have staff vacationing in July and August and are unable to complete their responses by the end of August.

Therefore, American Healthcare Connect Consortium, Inc. has decided to extend again the time period for submitting proposals in response to our RFP until Friday, September18, 2015, at 5:00 pm EDT.


Questions Submitted from July 1 – July 10.   Answers are in italics.

Some carriers need site survey’s do you have local contacts and phone numbers for each site? Site surveys have already been completed but are not available at this stage in RFP process.


1. Reviewing the RFP it seems you want Internet access at each site. (CORRECT) Knowing these accounts some are smaller than others. Can you breakdown the speeds of each site for DIA? Not available at this stage of the process. 

It also looks like you want to set up Wan for each account and using multiple Vlan’s.              YES


Can you breakdown the speeds for each site for the Wan? Not available at this stage of the process.

I know some of these customers are in contracts for 3 years for the Wan/Internet what are you intentions for those sites?

The Healthcare Connect Fund (of the Universal Services Administrative Company) will subsidize 65% of your current and future broadband communications monthly service. The following helps to explain the steps to be taken to cause this to happen.

 To provide this subsidized service (and eligible equipment) to an eligible healthcare provider such as CHS Hartford, a vendor (Earth Link) must have an HCF/USAC SPIN (Service Provider Identification Number) against which the HCF will pay to Earth Link the 65% of their monthly service cost formerly to CHS Hartford. The remaining 35% of the monthly service fee will be paid to Earth Link by CHS Hartford. Information describing the SPIN application process can be found at http://www.usac.org/sp/tools/forms.aspx. 

  • The existing Earth Link service to CHS Hartford must be documented in order for CHS Hartford to receive the 65% monthly subsidy. This will be done by CHS Hartford providing to American Healthcare Connect Consortium, when requested, the following documents for their submission to HCF as part of the Form 462 (Funding Request Form):
  • A copy of the Earth Link winning proposal for current services submitted to CHS Hartford, in open competition.
  • A copy of the existing Earth Link/CHS Hartford monthly service agreement.
  • A copy of a current Earth Link monthly invoice.

In addition, to prove an open competition was held for your current broadband services, CHS Hartford will provide two competing proposals submitted by losing broadband service providers. 

  • Funding is provided as a 2/3 HCF subsidy with 1/3 matching funds paid by the recipient (CHS Hartford). This subsidy can be applied by CHS Hartford in two ways.
  • CHS Hartford can use the 2/3 subsidy as a cost reduction for monthly services and pay their 1/3 of the monthly cost (to Earth Link). CHS Hartford’s monthly cost is reduced by 65% and the Earth Link services stay the same. This subsidy use method requires submission of documentation as described in point #2 (above).
  • CHS Hartford can consider 100% of their monthly cost as their 1/3 matching funds and apply the 65% subsidy for additional services. This results in a 3X increase in Earth Link services with the CHS Hartford monthly cost staying the same. This subsidy use method requires submission of an Earth Link proposal for expanded services in response to the AHCC posted RFP.


  • Confirm that the specific bandwidth to be priced out for each of the 67 locations. 20 Mbps, 50 Mbps, 100 Mbps, 300 Mbps, 500 Mbps, 750 Mbps, 1 Gig, 2 Gig, 3 Gig, and 4 Gig.

Page 8, item 2, Access bullet point: What does access imply, will members require remote access (I.e. SSLVPN access)? YES


  • Definitions:
    1. Web filtering – the use of a program that can screen and exclude from access or availability Web pages or email to determine whether some or all of it should not be displayed to the user
    2. Identity Based Management – a more robust security system that includes a user’s human identity as a part of the firewall rule matching criteria
    3.  Intrusion Detection System (IDS) – a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management system
    4.  Intrusion Prevention System (IPS) – a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits
    5.  Data Leak Prevention – a system designed to detect potential data breach / data ex-filtration transmissions and prevent them by monitoring, detecting, and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage)
    6.  Antivirus – software designed to detect and destroy computer viruses
    7.  Anti-spam – any software, hardware, or process that is used to combat the proliferation of spam or to keep spam from entering a system
    8.  Static routing – when you statically configure a router to send traffic for particular destinations in preconfigured
    9.  Dynamic routing –when you use a routing protocol such as OSPF, ISIS, EIGRP, and/or BGP to figure out what paths traffic should take
    10.  Application control – controls over the input, processing, and output functions. Ensure the input data is complete, accurate and valid. Ensure the internal processing produces the expected results
    11.  Wireless LAN Controller functionality – a wireless LAN controller is a device that directs or regulates traffic on the wireless network and is sold by WLAN controller vendors
    12.  Network Access Control – an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement
    13.  User Access Control – a feature designed to prevent unauthorized changes to your computer
    14. Role Based Access Control – a method of regulating access to computer or network resources based on the roles of individual users within an enterprise. In this context, access is the ability of an individual user to perform a specific talk, such as view, create, or modify a file
    15. Summary of IT Requirements by Site: