Service Description Safecom Customer Connection Version 3.5
|
|
- Kathleen Hudson
- 5 years ago
- Views:
Transcription
1 Service Description Safecom Customer Connection Version Telecom NZ Ltd Commercial in Confidence
2 CONTENTS 1 INTRODUCTION SERVICE DEFINITION SERVICE OVERVIEW SERVICE FEATURES SERVICE OPTIONS SERVICE IMPLEMENTATION STANDARD FEES AND INVOICING STANDARD CUSTOMER CONNECTION OPTIONAL COMPONENTS EXCLUSIONS Telecom NZ Ltd Page 2 Commercial in Confidence
3 1 INTRODUCTION This document forms part of the Safecom Service Specification which defines the Safecom suite of services and principles. The purpose of this document is to provide a detailed service description for the Safecom Customer Connection service, whereby the overarching Safecom Service Specification document applies and this document describes information specific to this service. If you require further technical information, please contact your account manager. 2 SERVICE DEFINITION 2.1 SERVICE OVERVIEW To enable customers to use Safecom services, there needs to be a secure connection between the internal Customer Network and Gen-i s Service Delivery Platform. The service that provides this is the Customer Connection Service which is a pre-requisite service for all other Safecom services. Safecom requires customers to use IP (Internet Protocol) as defined by the IETF (Internet Engineering Task Force) RFC 791. This standard defines the method of communication between host systems using IP, the standard for communication across the Internet. The following diagram outlines the key components of the service and its boundaries: Safecom Connectivity this is the Telecom connection, address translation and routes which are required to link the Customer Network into the Gen-i Service Delivery Platform for access to Safecom Services. Security Infrastructure these comprise multiple layers of firewalls providing specific and appropriate security levels and policies for each layer. By default, all application traffic to and from the Customer Network is blocked until additional Safecom services are provisioned. Intrusion Detection Systems (IDS) detect real-time attacks by hostile users and alert the Safecom Security Operations Centre (SOC). Safecom Base Infrastructure the base infrastructure for Safecom services provides administrative tools for selfadministration of users, services and reporting and maps into the SOC for management, monitoring and helpdesk support. CUSTOMERS INTERNAL NETWORK Customer Network SERVICE BOUNDARY SECURITY BOUNDARY Telecom Network Private Connection Safecom Connectivity Gen-i SERVICE DOMAIN Network Interface Layer Firewall Systems IDS Gen-i Service Delivery Platform Safecom Base Infrastructure Security Operations Centre Managemt & Monitoring Helpdesk Security Infrastructure Safecom Services BLOCKED IDS Firewall Systems SERVICE SECURITY BOUNDARY BOUNDARY External Networks: Remote Branches Partners Internet External Networks Public Users Remote VPN Users Customer Premises Equipment Terminates network connection Boundary between customer's internal network and Telecom network Network Connection High speed IP connection Dedicated or integrated with existing IP-VPN solution Safecom Services Centralised security services 24x7 Security Operations Centre Strong Protection from external threats Safecom Customer Connection Service Internet: Global IP network Hostile - high threat environment Transport for communications from External Networks and Remote Users FIGURE 1: SAFECOM CUSTOMER CONNECTION SERVICE 2006 Telecom NZ Ltd Page 3 Commercial in Confidence
4 The main security threats addressed by the Safecom Customer Connection service are: Attacks on Customer Network computer systems from the Internet devices within the Customer Network are not visible from the Internet, therefore, are difficult to attack directly. Addresses of devices will be translated, and all access controlled by the Safecom Firewall Systems. Users hosting hidden web sites on the internal Customer Network as Safecom does not provide direct inbound access from the Internet, it is not possible for a user to host a hidden website on the customer s network. 2.2 SERVICE FEATURES This Safecom Customer Connection service includes the following features: Safecom Connectivity Termination of the Telecom Network Circuit each customer will require a Telecom network connection to Safecom. It typically includes Customer Premises Equipment (CPE) such as a router at the customer site, network access connection and Virtual Circuit or connection to Safecom. This is terminated within Safecom at the Network Interface Layer. Network Address Translation Management (NAT) as customers often utilise private IP addressing within their internal networks, it is necessary to implement network address translation. This ensures that there are no conflicts of addressing within Safecom. The allocation of NAT address ranges is managed by the Safecom implementation team. Firewall and Intrusion Detection Systems These systems define the secure interface between the Customer Network and the Security Infrastructure including: Firewall Port a firewall port is dedicated to each customer and is used to enforce firewall policies to control all traffic that passes in and out of the port. Segmentation and security is maintained between the customer and other Safecom customers. The bandwidth of this port will be limited to the capacity purchased by the customer. Multi-layer Protection the Customer Network and all interfaces to Safecom are protected by firewalls, which provide a very high level of control and monitoring. Safecom provides multiple layers of Security Infrastructure, with each layer including firewall and intrusion detection systems. All layers are monitored to detect suspicious activity and alert where action is required. Intrusion Detection in Safecom, IDS are used in various locations to detect and alert on suspicious activity. The IDS alerts are managed by the Safecom Management Systems, which escalate alerts to the Security Operations Centre (SOC). Safecom Base Infrastructure Firewall Policies the default security policy blocks all direct inbound and outbound traffic to and from the Internet or external networks. When additional Safecom services are implemented, these policies are modified to allow specific communication between the Customer Network and the selected service. Safecom User Database the Safecom user database is central to the Safecom security model. This database holds profiles for each user, defining the Safecom services the user is authorised to access. While there are no users for the Safecom Customer Connection service itself, the user database container for this service includes a customer administrative user who is able to provision users for any implemented Safecom services using the Safecom Administration system. Safecom Administration system this web portal provides the ability for customers to administer their own users profiles in the Safecom user database. Users with administrative permissions are able to access the restricted website, add user accounts, delete users or modify user profiles. Reporting the Safecom Online Reporting system provides information on the traffic patterns through the customer connection for some core and optional services. This includes the data sent and received for those services as well as total throughout each day. Overall Security Infrastructure and monitoring all of the Safecom services are provided on hardened systems, managed and monitored 24 hours x 7 days per week, 365 days per year. Helpdesk Safecom support is provided by the Security Operations Centre (SOC), who is available to provide 2nd and 3rd level assistance to customer helpdesks as required. This includes testing and monitoring access through the Safecom systems Telecom NZ Ltd Page 4 Commercial in Confidence
5 Exclusions This service does not provide: Other Safecom Services Safecom provides a suite of services such as Secure Internet Browsing and Secure Mail Relay which function over the Safecom Customer Connection service. Where the customer requires applications which fall outside of the available service standards, the Restricted Inbound/Outbound services can be considered. Examples of this include outbound FTP, virus pattern updates, DNS forwarding or certificate authority services. Direct Communication from the Internet to the Customer Network this includes applications and protocols such as real audio, streaming video and chat which can open security risks and are not supported by Safecom. 2.3 SERVICE OPTIONS The following option exists for the Safecom Connectivity component: IPsec Encryption - this option allows for encryption over the connection from the Customer Network to Safecom. Safecom IPSEC Encryption is the provision of IPSEC (3DES encryption) across the Customer Connection specifically from the CPE (router) to the Safecom network interface termination point. To enable this functionality, the connecting router at the edge of the Customer Network is required to comply with Safecom IPSEC connectivity software with appropriate memory as defined by the router supplier Telecom NZ Ltd Page 5 Commercial in Confidence
6 2.4 SERVICE IMPLEMENTATION This section of the service description provides information on the provisioning process for the Safecom Customer Connection, and the steps involved. The overarching Safecom Service Specification should be reviewed as this table is specific to the Customer Connection service. As this service provides the interface between the customer s network and Safecom, it is required to be provisioned before any other Safecom service is provisioned. The Safecom implementation team will manage the provisioning process, and work with customer technical staff until the Safecom services are available and working for end users. Following is an outline of a typical implementation of this service: Implementation Team Responsibilities Customer Responsibilities Pre-Sales Scope pre-implementation work and estimate costs. Complete Design Proposal (if applicable) Provide accurate information for business and technical requirements. Contract, Technical Specification & Statement of Work Prepare Safecom Contract. Design Engineer completes the Safecom Customer Connection service section of the Technical Specification. Complete Statement of Work. Sign Safecom Contract. Develop a test plan to set the criteria for successful implementation of all functionality. Agree and signoff Statement of Work. Establish Connection to Safecom This involves provisioning a network connection between the Customer Network and Safecom. The Safecom Implementation team will work with the Telecom Network implementation group to coordinate the provisioning of these components. This usually includes the following components: Ensure skilled technical expertise is available to assist the Safecom engineer during the integration phases. Customer Premises Equipment this is the router which terminates the network connection from Safecom to the customer network. This is typically the demarcation point between the customer s internal network and Safecom. Telecom Access Connection the capacity of this connection will vary depending on customer requirements. Virtual Circuit such as a Frame Relay PVC or MPLS VLAN connection between the customer premises equipment and Safecom. Configure Safecom Network Interface This involves terminating the PVC and establishing the routing configuration to establish the connection to the Safecom Firewall port. Configure Routes and End-User Devices To establish routes for Safecom addresses, the customer s internal network should be configured to direct all end-user devices traffic destined for the Safecom servers ( x) to the router (CPE) terminating the connection to Safecom. In most cases this is done by configuring specific routes for each server on the CPE. Configure Safecom Firewall Port This involves setting up the Safecom Firewall infrastructure to allow communication between the customer s internal network and the Safecom Secure Infrastructure Telecom NZ Ltd Page 6 Commercial in Confidence
7 Test This involves testing communication from within the Customer Network to the Safecom Infrastructure. As setup of any additional Safecom Services is completed, testing to the Internet is conducted. The Safecom Implementation Engineer will assist the customer s technical person with configuration of a workstation and remote testing issues. The customer s technical person will work with the Safecom Implementation Engineer to test the service from the customer s site. This includes: Providing skills to diagnose integration issues that arise within the customer s environment. Testing all services according to test plan. Integration Completion Work with customer to ensure all requirements in the Statement of Work are met. Sign off Safecom solution to acknowledge delivery of functionality as agreed. Handover to SOC (Security Operations Centre) Ensure customer is aware that the services are in production and are aware of SOC s problem management and change control processes. Ensure support processes are communicated to all relevant internal parties. Each of the above stages includes discussions between the Safecom Implementation Engineer and the customer technical contact, as well as testing and sign-off processes. Safecom DNS As most Safecom Services provide name resolution for Internet domain names, the DNS systems in Safecom are not usually provided as a service to customers Telecom NZ Ltd Page 7 Commercial in Confidence
8 3 STANDARD FEES AND INVOICING The actual costs for the services provided in Safecom are detailed in the Safecom Price Schedule. In addition to the Safecom Service Specification fee information provided, the following information pertains to the Safecom Customer Connection service specifically. 3.1 STANDARD CUSTOMER CONNECTION ONE-OFF INSTALLATION FEES Installation fees include the cost of the initial configuration of Safecom Connectivity, Firewall and Intrusion Detection Systems and the Safecom Base Infrastructure components to allow customers to access additional Safecom services. This also includes liaising with customers regarding configuration of the Customer Network to connect to Safecom and testing. FIXED MONTHLY FEES The monthly fees cover the on-going use of Customer Connection service: Firewall port fees will vary per customer depending on the bandwidth required, starting at 512KBps up to 10MBps. Firewall port bandwidths are defined as the committed rate that will be provided. Firewall port speed chosen should match the committed information rate of the connection between the Customer Network and Safecom. Firewall ports will allow burst above the bandwidth, any burst over the committed bandwidth is dependant on current capacity. 3.2 OPTIONAL COMPONENTS The Safecom IPSEC Encryption option is priced separately to the standard Customer Connection service price. ONE-OFF INSTALLATION FEES This includes the initial configuration of IPSEC on the customer connection and testing with the customers. FIXED MONTHLY FEES: This includes the ongoing fee for providing this service option. 3.3 EXCLUSIONS The fees for other Safecom services such as Secure Internet Browsing, Secure Mail Relay and Secure Remote Access are detailed in separate service descriptions. Currently the Safecom Customer Connection fee does not include: Telecom Lanlink Network Charges such as: o o o Customer Premises Equipment (CPE) this is typically a managed router service provided by Lanlink. Access Circuit this is the connection between the CPE and the Telecom network at the customer site. Connection this is connection between the customer premises router and Safecom Telecom NZ Ltd Page 8 Commercial in Confidence
Service Description Safecom Simple Mail Relay Version 3.5
Service Description Safecom Simple Mail Relay Version 3.5 2006 Telecom NZ Ltd Commercial in Confidence CONTENTS 1 INTRODUCTION... 3 2 SERVICE DEFINITION... 3 2.1 SERVICE OVERVIEW... 3 2.2 SERVICE FEATURES...
More informationSAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION 2. SERVICE DEFINITION. 2.1 Service Overview. 2.2 Standard Service Features APPENDIX 2
APPENDIX 2 SAFECOM SECUREWEB - CUSTOM PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the Safecom SecureWeb Custom service. If you require more detailed technical information,
More informationCORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION
CORPORATE GLOBAL ROAMING PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Corporate Global Roaming service. If you require more detailed technical information, please contact
More informationSchedule 2g(b) additional terms for VPN Branch service 1. SERVICE DESCRIPTION
1. SERVICE DESCRIPTION Interoute s VPN Branch service (hereinafter the Service ) is a Fully Managed IPSec access service allowing connection to the Customer s VPN Branch and/or any IP VPN Sites provided
More informationONE OFFICE LITE - PRODUCT SPECIFICATION
1. INTRODUCTION ONE OFFICE LITE - PRODUCT SPECIFICATION This document contains product information for the One Office Lite service. If you require more detailed technical information, please contact your
More informationSERVICE DESCRIPTION MANAGED FIREWALL/VPN
Contents Service Overview.... 3 Key Features... 3 Service Features... 3 Responsibilities... 5 Additional Services.... 5 Implementation... 6 Validation... 6 Implementation Process.... 6 Customer Kick-Off...
More informationADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)
ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access
More informationMETRO LAN EXTENSION - PRODUCT SPECIFICATION
METRO LAN EXTENSION - PRODUCT SPECIFICATION 1. INTRODUCTION This document contains information on the Metro LAN Extension service. If you require more detailed technical information, please contact your
More informationTiscali Business Services Wholesale IPVPN Services Summary
Tiscali Services Wholesale IPVPN Services Summary Products covered: WIPVPN Standard WIPVPN WIPVPN Premium WIPVPN Premium WIPVPN May 2007 V.2.0 1 Table of Contents 1. Introduction... 3 2. Core product offering.
More informationLinchPin. Managed Service For IP VPN Networks. Web Site Telephone
LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks
More informationBT One Cloud Cisco UK Schedule to the General Terms
BT One Cloud Cisco UK Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 2 4 Service Management Boundary... 3 5 Associated
More informationXO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services
1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking
More informationBT Ethernet Connect Global Service Annex to the General Service Schedule (Doc Ref: 13.1 July 2013)
1 Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General s Schedule. ATD means BT s supplier s Access Terminating Device. BT NTE means a device
More informationAT&T NetBond User Guide
AT&T NetBond User Guide AWS GovCloud Publication Date: 2/04/2016 Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.
More informationSERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS. Classification: Open
SERVICE DEFINITION G-CLOUD 7 THALES PSN REMOTE ACCESS Classification: Open Classification: Open ii MDS Technologies Ltd 2015. Other than for the sole purpose of evaluating this Response, no part of this
More informationWho We Are.. ideras Features. Benefits
:: Protecting your infrastructure :: Who We Are.. ideras Features Benefits Q&A Infosys Gateway Sdn Bhd. Incorporated in 2007 Bumiputra owned Company MSC Status Company Registered with Ministry of Finance
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- IP ENABLED PVC ATTACHMENT Last Revised 2/1/2017
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- IP ENABLED PVC ATTACHMENT Last Revised 2/1/2017 1. Private Mobile Connection IP Enabled PVC. Pursuant to the terms and conditions
More informationSCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017
SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017 SCHEDULE DOCUMENT 1.2 N4PROTECT DDOS This schedule contains additional terms and conditions, service description & Service Levels
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- MPLS INTERCONNECT ATTACHMENT Last Revised 12/20/17
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) -- MPLS INTERCONNECT ATTACHMENT Last Revised 12/20/17 1. Private Mobile Connection MPLS Interconnect. Pursuant to the terms and
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More informationMANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification
MANAGED WAN SERVICE 1. GENERAL 1.1 Service Definition 1.2 Standard Service Features 1.3 Optional Service Features 1.4 Customer Responsibilities 2. SUPPLEMENTAL TERMS 3. SERVICE LEVEL AGREEMENT 4. FINANCIAL
More informationCOMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN)
ATTACHMENT IDENTIFIER: SD-WAN, Ver. 1.0 COMCAST ENTERPRISE SERVICES PRODUCT-SPECIFIC ATTACHMENT SOFTWARE-DEFINED WIDE AREA NETWORKING (SD-WAN) The following additional terms and conditions are applicable
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE VIRTUAL SERVER (DEDICATED) GEN2 PRICING GUIDE AUSTRALIA WELCOME TO TELSTRA CLOUD GEN2 SERVICES Our cloud infrastructure solutions are made up of a combination
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection AT&T VPN Access. Pursuant to the terms and conditions
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) AT&T VPN ACCESS ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection AT&T VPN Access. Pursuant to the terms and conditions
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationNEOBROADBAND LTE SERVICE SCHEDULE
Liquid Telecommunications South Africa (Pty) Ltd 401 Old Pretoria Main Road Halfway House, Midrand 1685 South Africa T +27 11 585 0000 NEOBROADBAND LTE SERVICE SCHEDULE Liquid Telecom Offices Mauritius
More informationHttp://www.passcert.com Exam : 642-889 Title : Implementing Cisco Service Provider Next-Generation Egde Network Services Version : DEMO 1 / 6 1.Which type of VPN requires a full mesh of virtual circuits
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationSD-WAN. Managed Services. Expereo SD-WAN Managed Services Overview.
SD-WAN Managed Services Expereo SD-WAN Managed Services Overview www.expereo.com/sd-wan Contents 1 SD-WAN MANAGED SERVICES DESCRIPTION... 3 1.1 Consult & Design... 4 1.2 Procurement & Logistics... 4 1.3
More informationService Activation of AT&T NetBond
Service Activation of AT&T NetBond For SunGard Availability Services TM (AS) and AT&T Enterprise Recovery Services (ERS) Publication Date: 11/16/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationNetwork Service Description
Network Service Description Applies to: Office 365 Dedicated Topic Last Modified: 2015-09-03 Contents... 1 Network Architecture... 2 Customer Connectivity to Services... 5 Customer-Owned Private Network
More informationSchedule 2e. Schedule 2E Additional Terms for Carrier Ethernet Services Eng Lang v page 1 of 11
1. SERVICE DESCRIPTION The Interoute E-CERTUS and E-AGILIS Services offer Carrier Ethernet Services between Interoute Demarcation Points on the Interoute Network and/ or on the Customer s Premises. The
More informationXO SITE SECURITY SERVICES
XO SITE SECURITY SERVICES 1.0 Product and Services 1.1 Product Description. XO Site Security (the "Service") is a managed security service which uses Premises-based, multi-threat sensing Customer Premises
More informationService Activation for AT&T NetBond For AT&T Control Center
Service Activation for AT&T NetBond For AT&T Control Center Revision: 1.0 2016 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo, Mobilizing Your World, DIRECTV and other marks are
More informationBT Assure Cloud Identity Annex to the General Service Schedule
1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person
More informationManaged Internet Service (MIS) gives you these features:
Product Description Managed Internet Service (MIS) is an Internet access service that combines a symmetrical, dedicated connection with consolidated application management. MIS includes proactive, 24x7
More informationSERVICE DESCRIPTION MANAGED BACKUP & RECOVERY
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationGÉANT L3VPN Service Description. Multi-point, VPN services for NRENs
GÉANT L3VPN Service Description Multi-point, VPN services for NRENs Issue Date: 1 November 2017 GÉANT L3VPN Overview The GÉANT L3VPN service offers the National Research and Education Networks (NRENs)
More informationSecurity Annex for Firewalls Additional Terms for Firewall Service
CONTENTS 1 Glossary of Terms & Definitions... 2 2 Service Description... 2 2.1 Firewall Service... 2 2.2 Provisioning... 2 3 Firewall throughput... 3 4 Vendor Change... 3 5 Charges... 3 5.1 Charges payable
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationOUR CUSTOMER TERMS M2M VPN SOLUTION
CONTENTS Click on the section that you are interested in. 1... 2 What is the M2M VPN Solution?... 2 Availability... 2 Minimum commitment... 2 Your responsibilities... 2 Use of M2M VPN Solution and Suspending
More informationNetwork Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationConnection Requirements Specification. GEC Hub
Connection Requirements Specification Connection Requirements Specification... 1 GEC HUB... 1 1. General... 4 1.1 INTRODUCTION... 4 1.1.1 ANX Connectivity Method... 4 1.1.2 VAN Connectivity Method... 4
More informationAT&T NetBond Service Activation Onboarding Guide
AT&T NetBond Service Activation Onboarding Guide For VMWare Publication Date: 09/28/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and
More informationSecure Managed Firewall
Secure Managed Firewall Product Specification Spark New Zealand Trading Limited 2018 Spark owns copyright and all other intellectual property rights in this document. You may not copy or redistribute any
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationManaged Services Rely on us to manage your business services
Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these
More informationC L O U D V O I C E Y E A L I N K S I P - C P 8 6 0
C L O U D V O I C E Y E A L I N K S I P - C P 8 6 0 I P P H O N E C O N F I G U R A T I ON G U I D E V E R S I O N 2. 0 Contents Introduction... 3 Overview... 3 Audience... 3 Supported Devices... 4 Network,
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT Last Revised 2/1/2017 1. Private Mobile Connection Frame Relay. Pursuant to the terms and conditions of
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) FRAME RELAY ATTACHMENT 1. Private Mobile Connection Frame Relay. Pursuant to the terms and conditions of the Agreement and this
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationChoosing a WAN Solution IP VPN vs. Frame Relay or ATM
W H I T E P A P E R Choosing a WAN Solution IP VPN vs. Frame Relay or ATM 555 Anton Boulevard, Suite 200 Costa Mesa, CA 92626 877.634.2728 Introduction At MegaPath, we are committed to providing the right
More informationDeployments and Network Topologies
TECHNICAL GUIDE Deployments and Network Topologies A technical guide to deploying Family Zone School in different network topologies. Contents Introduction...........................................3 Transparent
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationVERIZON SELECT SERVICES INC. Page 1. SECTION 13 - EXHIBIT M - Network-Based IP VPN SERVICE
VERIZON SELECT SERVICES INC. Page 1 Quote Number or CBS/CNE Tracking Number: 1) Description of Service. Internet Protocol-Virtual Private Network (IP VPN) Service (Service) is a packet-based advanced data
More informationNetwork Services BT Internet Connect
Contents 1. 2. Network Services Customer responsibilities 3. Network Services General 4. Domain Name Registration 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationThomson Reuters. FCN Services
Thomson Reuters FCN Services Zajil International Telecom is one of the primary FCN Service providers in the MENA region designated and certified by Thomson Reuters as an approved solutions provider for
More informationE FAX - PRODUCT SPECIFICATION
E FAX - PRODUCT SPECIFICATION 1 INTRODUCTION This document contains information on the efax service. information, please contact your Account Manager. If you require more detailed technical Telecom will
More informationSERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8. Classification: Open
SERVICE DEFINITION SECURE ZONE GATEWAY G-CLOUD 8 Classification: Open Classification: Open ii MDS Technologies Ltd 2016. Other than for the sole purpose of evaluating this Response, no part of this material
More informationAT&T NetBond User Guide
AT&T NetBond User Guide For HPE Rapid Connect Publication Date: 11/1/2015 Revision: 1.0 Legal Disclaimer Copyright AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T
More informationPaperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201
Paperspace Security Primer & Architecture Overview Copyright 2017 Paperspace, Co. All Rights Reserved - 1 - Business Whitepaper Paperspace www.paperspace.com Paperspace Virtual Desktops: A foundation for
More informationEnd User Terminal Service
Service Definition End User Terminal Service V1.0 Signoff Name Role Signature & Date Jim Leeper Acting, Delivery Services Manager Page 1 24/04/2012 Document Control Information Document Change History
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationNSG100 Nebula Cloud Managed Security Gateway
Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive
More informationSo Your Customer Wants a VPN. Howard C. Berkowitz
NANOG 16 -- May 1999 -- Eugene, OR So Your Customer Wants a VPN Howard C. Berkowitz Gett Communications hcb@clark.net (703)998-5819 1 Issues Understanding Requirements Managing Expectations Defining your
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationCLOUD GATEWAY USER GUIDE
CLOUD GATEWAY USER GUIDE PAGE 1/42 DRAFT [SECURITY CLASSIFICATION] WHAT S INSIDE OVERVIEW... 5 COMPATIBLE CLOUD PROVIDERS... 6 USING THIS GUIDE... 6 PURCHASING A CLOUD GATEWAY... 7 REGISTERING FOR CLOUD
More informationSchedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
Schedule document N4MDM PUBLIC Node4 limited 31/11/2018 Schedule document N4MDM This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management
More informationSCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ
SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017 SCHEDULE This Schedule contains additional terms, Service Description & Service Level Agreement applicable to the N4 End Point Management Service
More informationABOUT THIS SECTION...
CONTENTS 1 ABOUT THIS SECTION... 2 2 MANAGED SECURITY SERVICES... 2 3 WHAT IS SECURITY MONITORING?... 3 4 WHAT ARE THE SECURITY MONITORING SERVICE LEVELS?... 6 5 WHAT IS SECURITY INTELLIGENCE?... 10 6
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationADVANCED CUSTOMER SERVICES ORACLE TRANSITION SERVICE EXHIBIT
ADVANCED CUSTOMER SERVICES ORACLE TRANSITION SERVICE EXHIBIT This exhibit incorporates by reference the terms of the order for Oracle Transition Service. A. Description of Services. i. If Your order contains
More informationEducation Network Security
Education Network Security RECOMMENDATIONS CHECKLIST Learn INSTITUTE Education Network Security Recommendations Checklist This checklist is designed to assist in a quick review of your K-12 district or
More informationBT IP Connect Global Schedule to the General Terms
BT IP Connect Global Schedule to the General Terms Contents A note on we and you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 5 4 Service Management Boundary... 11
More informationReaping the Full Benefits of a Hybrid Network
Singtel Business Product Factsheet Managed Hybrid Network Reaping the Full Benefits of a Hybrid Network Singtel Managed Hybrid Network is an innovative offering that extends the enterprise s network coverage
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) PERMANENT VIRTUAL CIRCUIT ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICES (CCS)) PERMANENT VIRTUAL CIRCUIT ATTACHMENT Last Revised 12/20/17 1. Private Mobile Connection Permanent Virtual Circuit. Pursuant to
More informationAT&T NetBond for SoftLayer
NetBond for Service Activation Overview 2016 Intellectual Property. All rights reserved., Globe logo and other marks are trademarks and service marks of Intellectual Property and/or affiliated companies.
More informationXrio UBM Quick Start Guide
XRIO UBM QUICK START GUIDE V.2.0 Updated September 2009 Xrio UBM Quick Start Guide Page 1 of 35 UBM QUICK START GUIDE CONTENTS 1.0 Getting Started Page 04 1.1 Connecting to Your UBM Appliance Page 05 1.2
More informationzsah Cloud Offering Security FAQ In partnership with Clearswift
zsah Cloud Offering Security FAQ In partnership with Clearswift zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available
More informationNetwork Services BT MPLS (Marketed as IP Connect Global)
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects Service as detailed in
More informationBT IP Connect Global Schedule to the General Terms
BT IP Connect Global Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 5 4 Service Management Boundary... 10 5 Service
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More informationJ Detail Billing File Services Type Telecommunications Services Communications Transport IP Based Optical. Circuit Switched Data.
Voice Circuit Switched Data Toll-Free Combined Private Line Frame Relay Asynchronous Transfer Mode Ethernet Premises-Based IP VPN Network-Based IP VPN Voice over IP Transport Content Delivery Network Converged
More informationNetwork Services Enterprise Broadband
Contents 1. 2. ADSL/Broadband Provisions 3. Network Services Customer Responsibilities 4. Network Services General 5. Service Management Boundary 6. Defined Terms Network Services Where the Customer selects
More informationSERVICE DESCRIPTION DEDICATED SERVER
Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....
More informationGDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ
GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool Contact Ashley House, Ashley Road London N17 9LZ 0333 234 4288 info@networkiq.co.uk The General Data Privacy Regulation
More informationSpectrum Enterprise SIP Trunking Service Vertical TM Wave IP500TM / Wave IP2500 TM Release 4.0, 4.5 IP PBX Configuration Guide
Spectrum Enterprise SIP Trunking Service Vertical TM Wave IP500TM / Wave IP2500 TM Release 4.0, 4.5 IP PBX Configuration Guide About Spectrum Enterprise: Spectrum Enterprise is a division of Charter Communications
More informationV I R G I N M E D I A B U S I N E S S C L O U D V O I C E
V I R G I N M E D I A B U S I N E S S C L O U D V O I C E P H O N E C O N F I G U R A T I O N G U I D E P O L Y C O M S O U N D P O I N T / S O U N D S T A T I O N V E R S I O N 2 Contents Introduction...
More informationCOMPUTER NETWORK SECURITY
COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (9 th Week) 9. Firewalls and Intrusion Prevention Systems 9.Outline The Need for Firewalls Firewall Characterictics and Access Policy Type of Firewalls
More informationModular Policy Framework. Class Maps SECTION 4. Advanced Configuration
[ 59 ] Section 4: We have now covered the basic configuration and delved into AAA services on the ASA. In this section, we cover some of the more advanced features of the ASA that break it away from a
More informationReliable, fast data connectivity
Data Reliable, fast data connectivity Discover business-grade, high speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity services connects your
More informationFireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.
Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which
More informationModule Overview. works Identify NAP enforcement options Identify scenarios for NAP usage
Module 6: Network Policies and Access Protection Module Overview Describe how Network Policies Access Protection (NAP) works Identify NAP enforcement options Identify scenarios for NAP usage Describe Routing
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 2/1/2017 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More information