PART D NETWORK SERVICES



Similar documents
Advantages of Managed Security Services

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109


CISCO IOS NETWORK SECURITY (IINS)

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

CALNET 3 Category 7 Network Based Management Security. Table of Contents

The Hillstone and Trend Micro Joint Solution

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

McAfee Next Generation Firewall (NGFW) Administration Course

High Speed Data Transfer from the APS. Kenneth Sidorowicz September 27, 2006

TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE AUSTRALIA

Secure Cloud-Ready Data Centers Juniper Networks

Nominee: Barracuda Networks

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

This chapter covers the following topics:

SPAM FILTER Service Data Sheet

Number: NETWORK SECURITY

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Cisco Certified Security Professional (CCSP)

Networking for Caribbean Development

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Security. on your terms SOFTSCAN

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

The Cisco ASA 5500 as a Superior Firewall Solution

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Fortigate Features & Demo

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A DEDICATED SERVER

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Deploying Firewalls Throughout Your Organization

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Firewalls for the Home & Small Business. Gordon Giles DTEC Professor: Dr. Tijjani Mohammed

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

AASTMT Acceptable Use Policy

CTS2134 Introduction to Networking. Module Network Security

Vantage Report. User s Guide. Version /2006 Edition 1

Get Started Guide - PC Tools Internet Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

DTR Business Systems, Inc. Rene Beltran

Advantages of Managed Security Services

e2e Secure Cloud Connect Service - Service Definition Document

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Intro to Firewalls. Summary

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CCNP: Implementing Secure Converged Wide-area Networks

Firewall and UTM Solutions Guide

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

TELSTRA CLOUD SERVICES RESPONSIBILITIES GUIDE V10.0

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Tk20 Network Infrastructure

Cyberoam Perspective BFSI Security Guidelines. Overview

74% 96 Action Items. Compliance

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

Solutions IT Ltd Virus and Antispam filtering solutions

Using a Firewall General Configuration Guide

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

At dincloud, Cloud Security is Job #1

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Cisco ASA 5500 Series Content Security Edition for the Enterprise

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Seamless ICT Infrastructure Security.

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Lecture 23: Firewalls

Perspective on secure network for control systems in SPring-8

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Huawei Eudemon200E-N Next-Generation Firewall

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

1. Built-In SPI Firewall to Protect Your Enterprise Network 2. Multi-Spam-Filtering Function Providing High Spam-Filtering Accuracy

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Lucent VPN Firewall Security in x Wireless Networks

CompTIA Security+ (Exam SY0-410)

1 Introduction. Agenda Item: Work Item:

Network System Design Lesson Objectives

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Virus Protection Across The Enterprise

Guardian Digital Secure Mail Suite Quick Start Guide

Firewall Firewall August, 2003

IINS Implementing Cisco Network Security 3.0 (IINS)

Zscaler Internet Security Frequently Asked Questions

DDoS Overview and Incident Response Guide. July 2014

Securing the Small Business Network. Keeping up with the changing threat landscape

Network Security. Protective and Dependable. Pioneer of IP Innovation

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

How To Protect Your Network From Attack

Application Security Backgrounder

Role of Firewall in Network. Security. Syed S. Rizvi. CS 872: Computer Network Security. Fall 2005

8. Firewall Design & Implementation

FRANKFORT PLANT BOARD CABLE MODEM INTERNET BROADBAND INTERNET SERVICE DISCLOSURES

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Simplify Your Network Security with All-In-One Unified Threat Management

Assuring Your Business Continuity

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow

Microsoft TMG Replacement. How FORTINET integrated secuity platforms Help Protect the Perimeter in a Microsoft Infrastructure Environment

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Transcription:

CONTENTS 1 ABOUT THIS PART... 2 2 PUBLIC NETWORK... 2 Internet... 2 3 PRIVATE NETWORK... 3 Global WAN services... 3 4 SECURITY SERVICES... 3 Firewall... 4 Intrusion Prevention (Network)... 5 SSL/IPSEC VPN... 5 5 SPECIAL MEANINGS... 5 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 1 OF 6

Certain words are used with the specific meanings set out below or in your Agreement with us. 1 ABOUT THIS PART 1.1 This is Part D (Network Services) of the Cloud Services (Infrastructure) Service Terms. Depending on the nature of the products and services you are receiving under these Service Terms, provisions in other parts of the Cloud Services Service Terms, as well as in your Agreement with us, may apply. 1.2 See section one of Part A (General) of the Cloud Services section for more detail on how the various parts of the Cloud Services section are to be read together. 1.3 As part of your product selection under this Part D (Network Services) of the Cloud Services section, we do not monitor or manage any of your other services, including any of your other services provided under the Cloud Services section. 2 PUBLIC NETWORK 2.1 The Public Network product provides network services required for interoperation with the products set out in Part C (Infrastructure) and includes the data services outlined in this Public Network section. Internet 2.2 If you apply for a Tailored Infrastructure product, you may acquire a Global Internet Direct service for connection to the internet. The Global Internet Direct (GID) service provides you with internet access over the public network. The terms and conditions applicable to GID are set out in the Global Internet Direct Service Terms. 2.3 If you are applying for a Cloud Infrastructure product, internet connectivity is included as a feature of your Cloud Infrastructure product. The service level for your internet connectivity is the same as the Cloud Infrastructure product. Usage charges for internet connectivity are set out in your Agreement. SMTP Mail Relay 2.4 The SMTP Mail Relay service for the Public Network product provides you with a dedicated mail relay for use with any mail servers that you operate on our service platform. DOS and DDOS Protection of Telstra Global Cloud Services 2.5 In the event of a DOS or DDOS attack directed against a customer service hosted by us, we reserve the right to take any reasonable steps to protect the hosting compute platform. Unless you are able to activate an effective DOS or DDOS mitigation strategy, this may involve rate limiting traffic or blacklisting the source IP addresses or black-holing the affected service (removing it from service). TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 2 OF 6

3 PRIVATE NETWORK 3.1 The Private Network product provides network services required for interoperation with the products provided under Part C (Infrastructure), and includes the data services outlined in this Private Network section. Global WAN services 3.2 You may apply to use the Global WAN IPVPN Service Type, which provides you with Multi Protocol Label Switching (MPLS) based layer 3 IP connectivity between designated access end points at Points of Presence on our IPVPN network. The terms and conditions applicable to the Global WAN IPVPN Service Type are set out in the Global WAN Solutions Service Schedule, together with the Global WAN Solutions IPVPN Service Type Attachment. SMTP Mail Relay 3.3 The SMTP Mail Relay service for the Private Network product provides you with a dedicated mail relay for use with any mail servers that you operate on our service platform. 4 SECURITY SERVICES 4.1 The following table sets out the availability of the Security services you can apply for in connection with your Public Network product or Private Network product in this Part D (Network Services). As set out in the table below, the availability of a service will depend on whether you select a Cloud Infrastructure or Tailored Infrastructure product under Part C (Infrastructure). Service Firewall Intrusion Prevention (Network) IPSEC VPN Feature Tailored Infrastruct ure Public Network Cloud Infrastructure Private Network Tailored Infrastructure Cloud Infrastructure Dedicated x x Virtual Dedicated x x NA x x Service is available. x Service is not available. TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 3 OF 6

Firewall 4.2 The Firewall service is a security service which is designed to provide you with functionality to assist you in restricting certain access and traffic into your network. 4.3 The Firewall service provides the following features as selected by you in accordance with your application form or other agreement with us, the availability of which may depend on the firewall tier which you select: (e) (f) (g) (h) back-up of your configuration data; reporting of traffic volumes, User activity and device performance;. an ability to make policy or configuration changes; data retention / Storage (Logs Files); site to site VPN connections (depending on your platform selection); site to client VPN support; security event monitoring; and threat analysis and intelligence service. 4.4 Under the virtual firewall configuration, the features of your service will depend on the service tier that you select. 4.5 Under the dedicated firewall configuration, the hardware that we use to provide you with the service will be dedicated to you and the services of your service will depend on the service tier that you select. 4.6 The dedicated firewall configuration also includes: custom analysis, design and configuration of your dedicated firewalls; management of change requests to your Firewall service; internal web, virus and spam filtering; and access to any additional firewall modules (such as a deep packet inspection module) where these modules are supported by your chosen firewall. 4.7 We do not promise that the Firewall service will prevent unauthorised access to your network. 4.8 We can only provide the Firewall service for the devices that are managed by us. TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 4 OF 6

4.9 If you select a dedicated firewall service, we do not guarantee that the additional modules will remove all viruses or correctly identify all viruses, screen or block all spam or correctly identify all spam, block all websites you ask us to block or correctly identify websites that you have requested to be blocked or block all network activity you ask us to block or correctly detect network activity that you deem suspicious. Intrusion Prevention (Network) 4.10 This service provides intrusion protection for the public and private networks and comprises: attack recognition and response service; notification to you if we become aware of a security threat; automatic escalation process for known threats and vulnerabilities; and monitoring of traffic and uptime when an unauthorised intrusion has occurred. 4.11 We cannot guarantee that the Intrusion Protection service will: detect all spam or viruses; not incorrectly identify some legitimate email messages as spam; function for email messages which you have not routed in the way we tell you; and prevent intrusions, viruses, Trojan horses, worms, time bombs, cancelbots or other similar harmful programming routines. SSL/IPSEC VPN 4.12 IPSEC VPN allows you to access your shared or dedicated servers over the Public Network via your Dedicated Gateway service using IPSEC tunneling technology. 4.13 SSL VPN allows you to access your shared or dedicated servers over the Public Network via your Dedicated Gateway service using SSL tunneling technology. 4.14 We do not promise that the SSL/IPSEC VPN service will prevent or detect all unauthorised access to your network. 5 SPECIAL MEANINGS The following words have the following special meanings: Spam means unsolicited commercial email. User means a person or mailbox on behalf of which email is being scanned by the relevant Internet Protection service. TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 5 OF 6

Virus means a piece of program code, including a self-replicating element, usually (but not necessarily) disguised as something else that causes some unexpected and, for the victim, usually undesirable event and which is designed so that it may infect other computer systems. TELSTRA GLOBAL. Cloud Services (Infrastructure) Part D updated as at 20.01.14. PAGE 6 OF 6