Specifications include, but are not limited to: 1. The solution shall perform packet-based, application-layer policy enforcement for traffic throughput or denial 2. The solution shall perform Intrusion Prevention and Intrusion Detection capabilities 3. The solution shall have the ability to limit or disable specific Uniform Resource Locators (URLs) or Internet Protocols (IPs) identified solely by the University of Iowa 4. The solution shall evaluate executable files passing through the device and provide automatic analysis of unknown executables 5. The solution shall not require specific software port and protocol combinations for detection, mitigation, or enforcement. 6. The solution shall deliver the required throughput and performance with all required features and applications simultaneously active. 7. The solution shall be capable of participating in routing functions between hub and border routers