Connectivity Options. The following five connectivity options are the standard methods of providing a Third Party Network Connection. Anything that deviates from these standard methods must have a waiver sign-off at the <Your Company> VP level. 1) Leased line (e.g. T1) - Leased lines for Third Parties will be terminated on the Partners network. 2) ISDN/FR - Dial leased lines will terminate on a Third Party only router located on the ECS or IT Partners network. Authentication for these connections must be as stated in Section E. below. 3) Encrypted Tunnel - Encrypted tunnels should[must?] be terminated on the Partners Network whenever possible. In certain circumstances, it may be required to terminate an encrypted tunnel on the dirty subnet, in which case the normal <Your Company> perimeter security measures will control access to Internal devices. 4) Telnet access from Internet - Telnet access from the Internet will be provided by first telneting to the Third Party gateway machine, where the connection will be authenticated per Section E. below. Once the connection is authenticated, telnet sessions to internal hosts will be limited to those services needed by using the authorization capabilities of <Your Company>Secure. 5) Remote Dial-up via PPP/SLIP - Remote dial-up via PPP/SLIP will be provided by a separate Third Party modem pool. The connection will be authenticated per Section E. below
Appears in 3 contracts
Sources: Third Party Connection Agreement, Information Technology Policy, Third Party Connection Agreement