Smartcard VPN Access to the NHS National Network Service Description
|
|
- Iris Scott
- 8 years ago
- Views:
Transcription
1 Smartcard VPN Access to the NHS National Network Service Description Page 1 Issue 1 - December 2014
2 1. Introduction Smartcard VPN Access to the NHS National Network is a simple to use Secure Remote Access Service (RAS) providing a fast and secure way for healthcare professionals to access NHS applications whilst away from their usual work location. The Service uses the NHS issued Smartcard (JCOP41 or later) to provide the two factor authentication required by the NHS in support of RAS services. Provision of a RAS service using the NHS issued Smartcard and a static IP address for authentication and individual user traceability. Each authentication required real time checking for rescinded cards meaning that once a Smartcard is revoked centrally, access to VPN and NHS applications are simultaneously barred. End user service commissioning process/documents for local IT departments to implement the service Configuration support for VPN software and associated supported operating systems (Windows 7 32-bit, and Windows 8 32-bit and 64bit) but not smartcard readers/reader software outside of the supported environments which is a Customer responsibility. Access to the Internet once remotely connected via the Service. Assignment of local LAN WINS/DNS configurations which must be requested at the time of order, facilitate access to local networks BT will supply to Customers, by provision of a link, at order fulfilment time, a Smartcard VPN Access to the National NHS Network Enablement Guide for local network and firewall configuration requirements. The authentication platforms and VPN infrastructure are hosted in secure UK data centres, with connectivity to the NHS National Network and the internet. Important Note: Customer lost/stolen smartcards and PIN resets are resolved by NHS SPINE and local IT helpdesks, not BT. Page 2 Issue 1 - December 2014
3 2. Overview of Smartcard VPN Services The core components of the Smartcard VPN Access service are: Remote Access Service authentication by healthcare professionals using NHS-issued smartcards (no need to distribute a second authentication method). The Service supports defined Windows 7 32-bit (BT identity Agent) and Windows 8 32-bit (BT Identity Agent) with Windows 64-bit (the Microsoft Identity Agent) are the warranted environments in terms of software. The Helpdesk (as a desk a desk single point of contact for all Trouble to Resolve issues) is designed for local IT helpdesks to raise specific VPN access issues, or assistance in resolving WINS/DNS issues. The Helpdesk will assist in all contract changes, queries and service issues. No usage charges. Two year term with annual invoicing. Connectivity to the NHS National Network and onward connectivity to Customer own NHS Network-connected LANs. Page 3 Issue 1 - December 2014
4 3. Product overview Smartcard VPN Access to NHS National Network service This Service provides a Remote Access Service based on the use of an NHS-issued Smartcard and the use of the VPN client software to create a secure data path via the Internet to the National NHS Network. There are no controls placed on the destination addresses reachable by the NHS end users. The Service will be delivered using the following components: Hardware: Customer provided portable computer platform and a tablet/computer platform for the residence of the NHS Smartcard reader. Healthcare professionals own NHS Smartcard (JCOP 41 or later). Network Access: GPRS, 3G, 4G, DSL, Wi-Fi Hotspots, Managed WLAN or Private Wi-Fi from a number of commercial providers of these services but provisioned by the Customer, independently of the Service. Security: The Customer is responsible for ensuring security in line with appropriate NHS security policies including for all for Customer device (i.e. PCs/end devices). Two- factor authentication for this Service will be enabled by the use the NHS provided PIN available on the NHS provided Smartcard, and the X.509 digital certificate, inherent in the Smartcard provided to the NHS end user. Software: VPN client software allows the formulation of the SSL cryptographic tunnel between the end device and the Virtual Private Network concentrators. A link to the VPN Client software for supported operating systems, will be provided (via ) as part of the provisioning process for the VPN service. This software may be upgraded by the end user, in line with Cisco release of the software, but support of new releases of VPN software (not provided at the time of provisioning) is subject to testing and release by BT. User Enablement: To use the Service the Customer must ensure the instructions in the Smartcard VPN Access to the National NHS Network Enablement Guide are implemented. The Guide will be be issued to the customer on despatch of the Smartcard activation information. It is possible that local firewalls will require changes to configuration to allow VPN traffic into the local network see Smartcard VPN Access to the National NHS Network Enablement Guide. The Guide will provide the information to enable Customer IT teams to configure local firewalls to allow traversal of VPN traffic from the NHS National Network and local networks. Helpdesk support for the Service (set up and ongoing) is provided UK time Monday to Friday 0800 to excluding public holidays in England. The Helpdesk will not diagnose, or support smartcard reader-based issues, outside of the supported operating systems and Identity Agent clients. Page 4 Issue 1 - December 2014
5 3.1. Security The Service complies with IG security policy for platform design and build. It is the responsibility of the Customer and healthcare professional to comply with appropriate, prevailing NHS IT security policies or other local information governance security/ good practice operational requirements. To use the Service the Customer and healthcare professional must supply a laptop or PC with a supported operating system (currently Microsoft Windows or Windows 7/8) and specification that has associated VPN client software, and NHS Smartcard/ card reader and appropriate middle ware. It is the responsibility of the customer to download the VPN client software from the relevant locations and configure them correctly. Personal firewall and anti-virus software should be implemented on the remote devices, in accordance with current NHS Security policy and local IT policies - this is not a BT responsibility. Page 5 Issue 1 - December 2014
6 3.2. Ordering the service The Customer will use the G-Cloud portal to request the service, which is via a G-Cloud call-off contract. The Customer will be asked to provide: o Access agreement number o Customer (individual or trust) o Billing address o Account holder name o address o 12-Digit NHS Smartcard Numbers and WINS/DNS settings of smartcards requiring the VPN service Billing Billing will be in advance annually Technical Assistance and Fault Reporting A link to the Smartcard VPN Access to the National NHS Network Enablement Guide will be provided with the Service, which can be used by to local IT teams to aid the end users connectivity. If a fault arises, the healthcare professional should call their local IT Helpdesk. Page 6 Issue 1 - December 2014
Network Services Internet VPN
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order
More informationREDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION. SD045 V4.1 Issue Date 04 07 2014. Page 1 Public
REDCENTRIC N3 SECURE REMOTE ACCESS SERVICE DEFINITION SD045 V4.1 Issue Date 04 07 2014 Page 1 Public 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s N3 Secure Remote Access (N3-SRA) Service offers
More informationRemote Access Portal (RAP) Installation and User Guide
Remote Access Portal (RAP) Installation and User Guide W:\data02\Helpdesk\Procedures\RAP\RAP Installation Guide 2015.doc Page 1 of 12 1. Introduction 3 2. Support 3 3. Technical Requirements 4 4. First
More informationAgilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
More informationRemote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
More informationData Network Security Policy
Authors: Mike Smith Rod Makosch Network Manager Data Security Officer IM&T IM&T Version No : 1 Approval Date: March 2005 Approved by : John Aird Director of IM&T Review Date : 1 April 2006 Trust Ref: C7/2005
More informationService Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001
Service Desk Triage for Cloud Support (Lot 4) Service: 5.G5.1414.001 CONTENTS 1. WHY LEICESTERSHIRE HEALTH INFORMATICS SERVICE?... 3 2. SERVICE OVERVIEW... 3 3. ON-BOARDING... 8 4. OFF-BOARDING SERVICES/TERMINATION...
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationipass FAQs Q: What is ipass? Q: Who should use ipass? Q: How do I get ipassconnect? When can I start using it?
ipass FAQs Q: What is ipass? A: The ipass service provides local dialup and wireless internet access in most cities and towns within the USA and many locations throughout the world. Many of these locations
More informationWhite Paper. The risks of authenticating with digital certificates exposed
White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric
More informationMillbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
More informationUsing ipass Secure Anywhere. Secure Remote Access for Hallmark Independent Retailers
Secure Remote Access for Hallmark Independent Retailers ipass Inc. Managed Network Services 125 Technology Drive, Suite 100 Irvine, CA 92618 USA www.ipass.com +1 949-681-5076 +1 949-681-5114 fx TABLE OF
More informationHow To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key
How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key Objective This article will detail how to setup Cyberoam VPN Client to securely connect to a Cyberoam for the
More informationTime Warner Cable Business Class IP VPN & Managed IP VPN User Guide
Time Warner Cable Business Class IP VPN & Managed IP VPN User Guide Table of Contents 1. TWCBC IP VPN & Managed IP VPN Service Overview... 4 2. How to Order New Services... 5 2.1 Mobile IP VPN Client Licenses...
More information1. To be the principal point of contact and have responsibility for IT support incidents.
JOB TITLE: RESPONSIBLE TO: RESPONSIBLE FOR: Service Desk Engineer Service Desk Supervisor N/A JOB OUTLINE The Service Desk Engineer will be responsible for providing an effective first-line support service
More informationSSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.
Contents Introduction... 2 Prepare Work PC for Remote Desktop... 4 Add VPN url as a Trusted Site in Internet Explorer... 5 VPN Client Installation... 5 Starting the VPN Application... 6 Connect to Work
More informationConfiguring IPsec VPN with a FortiGate and a Cisco ASA
Configuring IPsec VPN with a FortiGate and a Cisco ASA The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another site
More informationX2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3
X2 CONNECT NETWORKS SUPPORT SERVICES PRODUCT DEFINITION LEVEL 1, 2 & 3 Date : 09/08/06 Issue: 6 This is an unpublished work the copyright in which vests in X2 Connect Limited. All rights reserved. The
More informationBusiness Hosted Product Guide
Business Hosted Product Guide Overview Hosted Telephony Service Description: EMIS offers a revolutionary, next-generation telephony service.. By carrying calls over an internet connection, it makes PBXs
More informationConditions for ICT Partner Solutions Service Schedule for SecureData Service
1. Definitions & Interpretations Conditions for ICT Partner Solutions Service Schedule for The following definitions shall apply to the provisions of the Service, in addition to those in the General Terms
More information2-FACTOR AUTHENTICATION SERVICE
2-FACTOR AUTHENTICATION SERVICE SD043 v1.0 Issue Date 4 th May 2012 SECTION 1: OVERVIEW SERVICE OVERVIEW InTechnology s 2-factor Authentication Service offers a robust, flexible and secure way to authenticate
More informationMary Immaculate. ICT Services. ICT Helpdesk. User Guide
Mary Immaculate ICT Services ICT Helpdesk User Guide Table of Contents 1. Introduction 3 2. How To Log A Call With The ICT Helpdesk 3 2.1 Email 3 2.2 Phone 3 2.3 Voicemail 3 2.4 Web Self Service Option
More informationCUSTOMER SUPPORT DETAILS (CSD)
CUSTOMER SUPPORT DETAILS (CSD) Thank you for your recent purchase with NEWT, the Business Services Division of Fibernetics Corporation. You are a valued customer to us. We welcome you to contact us at
More information3.2 This situation is also experienced by Officers who also need remote access to Council networks.
Report Asset Management Committee 29 September 201 15- BROADBAND ACCESS TO COUNCIL NETWORKS 1. Reason for Report To seek Members' approval to undertake a pilot project which will lead to the introduction
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationManaged Service For IP VPN Networks
LinchPin Managed Service For IP VPN Networks Web Site www.linchpinnetworks.co.uk Email info@linchpinnetworks.co.uk Telephone 01284 830 841 Introduction The LinchPin CPE Managed Service for IP VPN Networks
More informationData Center & Helpdesk Services Documentation
Data Center and Helpdesk Services Service Levels of Understanding Last updated 03/26/2008 LH DCHS SERVICE LEVELS OF UNDERSTANDING Purpose Data Center and Helpdesk Services (DCHS) provide Service Levels
More informationTotal Office Top Support Requests
Total Office Top Support Requests 1. Support Contacts The Bell Aliant service desk is available Monday Friday: 8:00am 8:00pm (excluding statutory holidays) Call us toll free at 1-888-752-2191 Or, e-mail
More informationMobile Health Worker. BT Mobile Worker. Service Description. Page 1
BT Mobile Worker Service Description Page 1 1. Introduction BT has been involved in supporting a mobile workforce for the last 10 years and has delivered this service and support to over 30,000 field based
More informationBusiness Internet Banking security user guide
Business Internet Banking security user guide You must read this user guide before using Business Internet Banking. It is a very important document as it sets out security obligations you must comply with.
More informationProduct Support and Maintenance Terms & Conditions
Product Support and Maintenance Terms & Conditions 1. Customer Information Customer site address: As per invoice (unless otherwise agreed) Equipment or Software to be covered: Refer to invoice Contract
More informationEnterprise Broadband Customer Service Description
BT 2012 Issue 2_8 Table of Contents INTRODUCTION... 3 SERVICE OVERVIEW... 4 BENEFITS OF CHOOSING ENTERPRISE BROADBAND... 5 SERVICE DETAILS... 5 THE WORKPLACE... 5 COVERAGE... 5 ENTERPRISE BROADBAND...
More informationHow To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key
More informationUCL Remote Access VPN Service Microsoft Windows XP User Guide
INFORMATION SERVICES DIVISION (ISD) NETWORK SERVICES GROUP UCL Remote Access VPN Service Microsoft Windows XP User Guide Version 0.2 Date 27 th July 2011 Author MC Document Details N/A Last Updated 13
More informationUSING GENIE REMOTELY
USING GENIE REMOTELY This document outlines the available options for using Genie in offsite logging mode (Genie single user) or remotely in real-time via a remote desktop (terminal services) connection.
More informationCisco Clientless VPN Installation and Troubleshooting Tips
Barbara Ann Karmanos Cancer Institute Instructions for updating the Cisco Systems VPN Client connection DISCLAIMER: IMPORTANT INFORMATION - PLEASE READ THIS AGREEMENT CAREFULLY BEFORE OPENING THE PACKAGE
More informationTechnical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
More informationBlue Ridge Community College Information Technology Remote Access Policy
Blue Ridge Community College Information Technology Remote Access Policy Last Revised June 13, 2008 1. Purpose Blue Ridge Community College Information Technology Remote Access Policy This policy provides
More informationG Cloud Service Description Premier Hosted Voice Software as a Service March 2014
G Cloud Service Description Premier Hosted Voice Software as a Service March 2014 Premier Choice Telecom has been a trusted provider of communications solutions for businesses for over 12 years. Our clients
More informationSupport Services Department
Support Services Department SUBJECT: Consideration of a Resolution and a recommendation authorizing execution of a contract amendment with Prescient Solutions, of Schaumburg, IL for staffing in the total
More informationWeb Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING
Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the
More informationManaged WiFi. Choosing the Right Managed WiFi Solution for your Organization. www.megapath.com. Get Started Now: 877.611.6342 to learn more.
Managed WiFi Choosing the Right Managed WiFi Solution for your Organization Get Started Now: 877.611.6342 to learn more. www.megapath.com Everyone is going Wireless Today, it seems that everywhere you
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationFaculty/Fellows Computer Orientation at DCRI FREQUENTLY ASKED QUESTIONS
Faculty/Fellows Computer Orientation at DCRI FREUENTLY SKED UESTIONS Denotes a cost that will be charged to your departmental fund code. Why do I have to sign the DCRI Secure System Usage document and
More informationEnterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love
Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love Advanced Network Systems now offers ShoreTel s Mobility Solution. ShoreTel Mobility enables businesses of all
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationHow To Support Spirent Service Experience (Previously Metrico Wireless)
Service Experience Group 10/1/2014 Version 2.0 Table of Contents 1. Purpose... 1 2. Scope of Support... 2 2.1 Included... 2 2.2 Not Included... 2 3. Support Fees... 3 4. Customer Obligation... 4 5. Spirent
More informationConnecting an Android to a FortiGate with SSL VPN
Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must
More informationUCL Remote Access VPN Service Windows User Guide
INFORMATION SERVICES DIVISION (ISD) NETWORK SERVICES GROUP UCL Remote Access VPN Service Windows User Guide Version 3.0 Date 6 th July 2011 Author MC Document Details N/A Last Updated 05 November 2015
More informationRelease the full potential of your Cisco Call Manager with Ingate Systems
Release the full potential of your Cisco Call Manager with Ingate Systems -Save cost with flexible connection to Service Providers. -Save mobile costs, give VoIP mobility to your workforce. -Setup an effective
More informationBronze Silver Gold Telephone Support & Remote Yes 1 hour per month Yes 3 hours per Yes - 5 hours per month
Voluntary & Charity Organisations ICT Support Contract All organisations wishing to partake in the service have a choice of 3 products depending on the amount of computers in the organisation itself. These
More informationA Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide
p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing
More informationWindows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved. Introduction Last few years
More informationFortigate Features & Demo
& Demo Prepared and Presented by: Georges Nassif Technical Manager Triple C Firewall Antivirus IPS Web Filtering AntiSpam Application Control DLP Client Reputation (cont d) Traffic Shaping IPSEC VPN SSL
More informationUnderstanding VPN Technology Choices
Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt
More informationTech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
More informationGlobal Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationCatapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationCampus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
More informationVirtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
More informationLifeSize Transit Deployment Guide June 2011
LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationTechnical White Paper
Instant APN Technical White Paper Introduction AccessMyLan Instant APN is a hosted service that provides access to a company network via an Access Point Name (APN) on the AT&T mobile network. Any device
More informationConfiguring an IPsec VPN to provide ios devices with secure, remote access to the network
Configuring an IPsec VPN to provide ios devices with secure, remote access to the network This recipe uses the IPsec VPN Wizard to provide a group of remote ios users with secure, encrypted access to the
More informationConfiguring IPsec VPN between a FortiGate and Microsoft Azure
Configuring IPsec VPN between a FortiGate and Microsoft Azure The following recipe describes how to configure a site-to-site IPsec VPN tunnel. In this example, one site is behind a FortiGate and another
More informationSophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
More informationService Schedule for BT Mobile Device, Application, Content and E-mail Management
Service Schedule for BT Mobile Device, Application, Content and E-mail Management 1. SERVICE DESCRIPTION General Description 1.1. The Service is a suite of software products and includes: Mobile Application
More informationRethink Remote Access
Rethink Remote Access Next Generation Network Access Technology Next Generation Remote Access Technology Today s remote access technology landscape is a patchwork of point solutions of mixed hardware and
More informationTalk2M ewon Internet Connection How To
AUG: 003 Rev.: 1.0 How To GPRS Contents: This guide will explain how to set up the Internet connection of your ewon for the Talk2M connection. Table of Contents 1. Hardware and software requirements...
More informationVPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu
VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
More informationConfiguring a VPN for Dynamic IP Address Connections
Configuring a VPN for Dynamic IP Address Connections Summary A Virtual Private Network (VPN) is a virtual private network that interconnects remote (and often geographically separate) networks through
More informationUnderstanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationPCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy
PCN Cyber-security Considerations for Manufacturers Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy Contents CPChem PCN Philosophy and Policy Remote Access Considerations
More information[Type text] SERVICE CATALOGUE
[Type text] SERVICE CATALOGUE IT Services 1 IT Support and Management Services SERVICE AREA: SERVICE DESK Users can contact the Service Desk via the phone or an online web form for all their ICT service
More informationMSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
More informationWireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business. www.megapath.com
Wireless Services The Top Questions to Help You Choose the Right Wireless Solution for Your Business Get Started Now: 877.611.6342 to learn more. www.megapath.com Why Go Wireless? Today, it seems that
More informationEXAM - 70-980. Recertification for MCSE: Server Infrastructure. Buy Full Product. http://www.examskey.com/70-980.html
Microsoft EXAM - 70-980 Recertification for MCSE: Server Infrastructure Buy Full Product http://www.examskey.com/70-980.html Examskey Microsoft 70-980 exam demo product is here for you to test the quality
More informationHow To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
More informationNew Trusted Partner Client-Based Access for Windows XP and Windows 7 Includes Juniper Netconnect VPN client and CyberGatekeeper client
New Trusted Partner Client-Based Access for Windows XP and Windows 7 Includes Juniper Netconnect VPN client and CyberGatekeeper client Copyright 2011 FMR Corp. February 2011 Trusted Partner Access Pre-InstallationWorksheet
More informationI d like our employees to be able to access all the files in our network that are important to them anywhere and anytime. Simply and securely.
VPN Distances? Companies network themselves with their branches, set up decentralized offices, encourage teleworking or integrate mobile employees and external service providers into their networks. The
More informationXXXXXX Trade mark of Telstra Corporation Limited ABN 33 051 775 556. Registered trade mark of Telstra Corporation Limited. JUN 09
F O R f u rt h er informat i o n refer to the TElstra Business broadband SALES handbook B u i l d t h e best B us i n e ss Broadband solu t ion for your customer XXXXXX Trade mark of Corporation Limited
More information10.3.2015 Company Name IT Support
1 New Bond St t:+44 (0)20 7403 4031 London WC1 w:www.networkfish.com 10.3.2015 Company Name IT Support We are your reliable London based IT Support department Because you can achieve more. We are the backbone
More informationHow To Authenticate An Ssl Vpn With Libap On A Safeprocess On A Libp Server On A Fortigate On A Pc Or Ipad On A Ipad Or Ipa On A Macbook Or Ipod On A Network
Authenticating SSL VPN users using LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user
More informationConnecting from Home & Drop-In Session
Connecting from Home & Drop-In Session Bruce M Gittings Session 2 Connecting from Home & Tie-Up This section of the Introductory Computing Course will: Review options for getting access from home Connecting
More informationUsing IPsec VPN to provide communication between offices
Using IPsec VPN to provide communication between offices This example provides secure, transparent communication between two FortiGates located at different offices using route-based IPsec VPN. In this
More informationIQSweb Reference G. ROSS Migration/Registration
ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationMaaS. MaaS. UNIVERSAL WIRELESS CLIENT: How to simplify mobility and reduce the cost of supporting mobile workers. www.maas360.com.
UNIVERSAL WIRELESS CLIENT: How to simplify mobility and reduce the cost of supporting mobile workers www.360.com Table of Contents THE PRICE OF FREEDOM...1 THE UNIVERSAL WIRELESS CLIENT...1 Connecting
More informationDIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6)
Infrastructure as a DIR Contract Number DIR-SDD-2263 Appendix C Pricing Index (per Amendment 6) All customer data is located entirely in the contiguous United States. When required the data will be located
More informationREDCENTRIC MANAGED FIREWALL SERVICE DEFINITION
REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION SD007 V4.1 Issue Date 04 July 2014 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s managed firewall service (MFS) is based on a hardware firewall appliance
More informationHow To Use Bbt 1.1.1 (Bbt) For Business
Service Description 1. Service Description The solution provides business customers a telecommunication solution which contains the following basic elements: Delivery and operation of a hosted PBX service
More informationALM - Key benefits. t: +31(0) 88 1221 800 f: +31(0) 88 1221 899. Oude Oeverstraat 120-5 6811 JZ Arnhem The Netherlands. ALM Key benefits 01/01/2014 1
ALM - Key benefits Oude Oeverstraat 120-5 6811 JZ Arnhem The Netherlands t: +31(0) 88 1221 800 f: +31(0) 88 1221 899 ALM Key benefits 01/01/2014 1 Key benefits What problems are we solving? Active Login
More informationService Definition Nine23 MDM
Service Definition Nine23 MDM G-Cloud iv Contents 1 Service Nine23 Mobile Device Management System.....4 1.1 Overview Nine23 MDM...... 4 1.2 Open Standards. 5 1.3 User requirements.....5 1.3.1 Client Browser....5
More informationMANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013
MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013 1. ABOUT THIS GUIDE...3 1.1 S NEW CTOMERS...3 1.2 S ALL CTOMERS...3 1.3 OUR S...3 1.4 KEEPING R CONTACT DETAILS UP-TO-DATE...4 1.5 RECORDING R
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More information