MANAGED FIREWALL SERVICE. Service definition

Similar documents
MANAGED FIREWALL SERVICE. Service level description

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Next Generation Network Firewall

MANAGED SECURITY SERVICES RESPONSIBILITIES GUIDE July 2013

Chapter 9 Monitoring System Performance

How To Configure Syslog over VPN

Barracuda Link Balancer

Using IPsec VPN to provide communication between offices

LifeSize Transit Deployment Guide June 2011

Customer Service Description Next Generation Network Firewall

Recommended IP Telephony Architecture

Creating a VPN with overlapping subnets

For extra services running behind your router. What to do after IP change

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

SonicWALL PCI 1.1 Implementation Guide

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Chapter 3 LAN Configuration

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Configuring IPsec VPN between a FortiGate and Microsoft Azure

GlobalSCAPE DMZ Gateway, v1. User Guide

Table of Contents. Introduction

Firewall Defaults and Some Basic Rules

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Secondary DMZ: DMZ (2)

Configuring a VPN for Dynamic IP Address Connections

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Chapter 3 Security and Firewall Protection

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Protecting the Home Network (Firewall)

IBM. Vulnerability scanning and best practices

Configuring Windows Server 2008 Network Infrastructure

FortiGate Multi-Threat Security Systems I Administration, Content Inspection and SSL VPN Course #201

E2BN Direct - Network Services for Schools and Academies

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

MCSA Windows 8 (Exam )

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

SonicOS Enhanced Release Notes

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

ICANWK406A Install, configure and test network security

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

Cisco Small Business ISA500 Series Integrated Security Appliances

Using a VPN with Niagara Systems. v0.3 6, July 2013

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

N e t w o r k E n g i n e e r Position Description

Chapter 4 Customizing Your Network Settings

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

Vantage Report. User s Guide. Version /2006 Edition 1

Check Point Security Administrator R70

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Instructions for Activating and Configuring the SAFARI Montage Managed Home Access Software Module

74% 96 Action Items. Compliance

Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services

Fortinet Certified Network Security Administrator

Feature Brief. FortiGate TM Multi-Threat Security System v3.00 MR5 Rev. 1.1 July 20, 2007

Load Balance Router R258V

About Firewall Protection

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

FatPipe Networks

Chapter 2 Connecting the FVX538 to the Internet

Gigabit Multi-Homing VPN Security Router

Customer Hosted Service Description and Service Level

Firewall Firewall August, 2003

Enabling NAT and Routing in DGW v2.0 June 6, 2012

NETASQ MIGRATING FROM V8 TO V9

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

VMware vcloud Air Networking Guide

Sophos UTM Software Appliance

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

Network Services Internet VPN

Using a VPN with CentraLine AX Systems

System Management. What are my options for deploying System Management on remote computers?

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

BroadCloud PBX Customer Minimum Requirements

SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.

Office of Information Technology Hosted Services Service Level Agreement FY2009

Edgewater Routers User Guide

Introduction. PCI DSS Overview

Voice Over IP and Firewalls

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

Designing, Deploying and Managing a Network Solution for Small- and Medium-sized Businesses Course No. MS Days

CMPT 471 Networking II

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

R4: Configuring Windows Server 2008 Network Infrastructure

Tk20 Network Infrastructure

Configuring and Administering Windows 7

Overview of WebMux Load Balancer and Live Communications Server 2005

Configuring Windows Server 2008 Active Directory

Transcription:

MANAGED FIREWALL SERVICE Service definition

Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to filter traffic coming in to Local Area Network (LAN) and going out in to the Wide Area Network (WAN), based upon predetermined criteria. No firewall can protect against all protocol or application weaknesses and new software vulnerabilities, which are discovered all the time. Any device being protected by a firewall should be administered with the same level of vigilance as if a firewall was not present. Service outline The NSMS Managed Firewall Service (MFS) provides customers with a firewall configured to their requirements, to provide control of access to local devices (such as servers and desktops) and the LAN. The MFS is designed for passive defence. The Service will provide restrictions on the source and destination TCP/IP addresses and service ports which are allowed to pass through the firewall. The service offers: Market leading firewall technology (FortiNet); Fully trained staff from NSMS; Rolling support for the firmware, patches and upgrades of the device, for the duration of its supported life (5 years); Single device or failover dual device solutions (HA) are available; Site-to-site Virtual Private Networks (VPN) and/or IPsec tunnels; Remote client VPN service (e.g. work from home); Network Address Translation (NAT) to hide the customer's network addresses from the Internet, if desired; Fully configurable rule base, managed by trained professionals; Advice and guidance on firewall security; IPv4 and IPv6 compatibility. Firewall options NSMS deploys three models from the FortiNet firewall range (FortiGate 70D, FortiGate 100D and 300D). These models allow for NSMS to manage the smaller units with only a handful of users and/or low bandwidth demands, to the medium sized units with many users and/or high bandwidth demands. Units with even higher demands may contact us directly for further discussions. Support options Once a model has been identified, we will advise on whether Unified Threat Management (UTM) is also required. Once a device has been chosen and deployed, NSMS offers an all-inclusive package for the continual support of the given device. In the support package, NSMS will provide comprehensive management of the device. From the updates issued by the vendor to notifying the customer of

Page 2 of 4 Version 1.2 (03/02/2015) when the hardware lifecycle is due to come to an end, this will be managed by NSMS. In addition, all support matters relating to the Firewall s rule set, such as: changes to the system setup, creationamendment-deletion of rules and so on, will be deployed by NSMS. Other support information Support renewal is performed every twelve months from the date of deployment of the firewall device. Support is paid for in yearly blocks and in advance. Should a customer wish to change or terminate the support contract, this can be done at any point, with three month s notification, of the yearly support contract and any difference will be refunded. Life expectancy of device A newly purchased firewall is protected for 5 years by the vendor and therefore given a life of 5 years. After this time the customer will be contacted by NSMS, to advise on the renewal process, should the customer wish to continue with this service. To ensure the best technology is adopted for our customers, NSMS reviews the chosen firewall hardware provider and supplier every 2.5 years. It is important to note, at the end of a firewall s life the replacement device may be from a different manufacturer and/or supplier. Generic firewall configuration The NSMS default configuration policy is: All outbound traffic is permitted All inbound traffic is denied NSMS will discuss and create the best configuration for your needs during the design stages. Installation/Configuration consultancy The Service offers a basic level of security policy development from NSMS s technical specialists. The aim of which is to understand the required network traffic restrictions, identify and document network objects and applications, and to agree appropriate access controls. The standard consultancy time required for this installation will typically be under half a day, but can last up to two days (dependant on the customer s requirements and setup), this is covered by a one off startup cost (please refer to the Firewall pricing document). Should the installation have special requirements (e.g. proprietary equipment requiring access through the firewall) additional consultancy may be required and will be charged for in accordance to our usual hourly or daily rates. Firewall management NSMS manages all FortiGate firewall solutions via a dedicated centralised and virtualised interface (FortiManager). NSMS will retain admin rights to any NSMS deployed firewall during a valid support contract. Read rights will be issued to a unit adopting the MFS.

Page 3 of 4 Version 1.2 (03/02/2015) Monitoring The NSMS automated monitoring service will monitor the firewall on a 24/7 basis for availability and critical events, included in the support costs. All flagged events will be viewed by our in-house technical specialists during our normal support hours. Backups Complete system configuration backups are automatically taken, assuming yearly support is adopted, every time a change is made to the configuration, and the last seven versions are kept before being deleted. Syslogs Traffic system logs (syslogs) are extracted live and stored for a period of 90 days before being deleted. Support hours NSMS offers a support service between the hours of 9am and 5pm, Monday to Friday, with the exception of public holidays, bank holidays and periods of forced closure as advertised on the University of Oxford and IT Services websites. There is no formal commitment for NSMS to respond to support requests or service change outside these hours. At risk periods Configuration changes, upgrades or hardware replacement, are carried out during the detailed NSMS support hours. 24hrs notification will be given where possible. Non critical changes requiring a reboot will be performed during the NSMS at risk period (Tuesdays between the hours of 9am and 11am). Customer Responsibilities Customer must provide their own DNS server for resolving internal addresses where appropriate. Changes to the firewall will only be actioned from pre-agreed authorised contacts for that unit. It is the customers' responsibility to ensure that NSMS have an up-to-date list of authorised technical and administrative contacts at all times. The customer is responsible for defining the security policy for their organisation. The customer should be administering servers and other network enabled devices with the same level of vigilance as if the firewall were not present. Should the customer have a local security policy or data policy or any other similar document relating to digital security, then it is the customers' responsibility to ensure that NSMS have an up-to-date copy at all times. Customer to provide a secure and a temperature controlled environment for the firewall device(s). Customer to provide NSMS staff with access to the firewall device(s) as and when requested.

Page 4 of 4 Version 1.2 (03/02/2015) Continued service delivery NSMS service delivery staff will review the proposed rule base with the customer, as and when requested by the customer to provide feedback and recommendations as required. Email communication should be used to submit any firewall related change requests throughout the duration of the contract. Please refer to the SLD for further information. Further detail and contacting NSMS Please refer to the Service Level Description for further detail relating to this service, or contact NSMS directly on nsms-firewalls@it.ox.ac.uk or 01865 (2)73209 and ask for the firewall team. Thank you.