Advanced Firewall Sample Clauses

Advanced Firewall. Advanced Firewalling applies when servers are connected to Combell’s redundant Firewall Infrastructure (hardware firewall cluster). During the initial setup, the configuration of the firewalls is determined. Traffic via the following ports is admissible: POP3 (110), SMTP (25), HTTP (80), FTP (21), Remote Desktop (3389), Plesk (8443), MySQL (3306) and MS SQL (1433). By default, not all ports are opened. Upon the Customer’s request via e-mail, traffic via some of the abovementioned ports can be authorised. The Customer is free to have changes made in the configuration without extra cost, provided that he can explain why he wants these ports to be open. Xxxxxxx always reserves the right to refuse certain changes. For this, the Customer shall contact Combell. A maximum of fifty firewall rules (objects) can be set per server.
AutoNDA by SimpleDocs

Related to Advanced Firewall

  • Cameras j) Portable music player, headphones.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.

  • Reverse ADSL Loops If a CLEC’s ADSL Transmission Unit (including those integrated into DSLAMs) is attached to Sprint’s Network and if an ADSL Copper Loop should start at an outside location, and is looped through a host or remote, and then to the subscriber, the copper plant from the outside location to the Sprint host or remote central office must be a facility dedicated to ADSL transmission only and not part of Sprint’s regular feeder or distribution plant.

  • Unbundled Digital Loops 2.3.1 BellSouth will offer Unbundled Digital Loops (UDL). UDLs are service specific, will be designed, will be provisioned with test points (where appropriate), and will come standard with OC and a DLR. The various UDLs are intended to support a specific digital transmission scheme or service.

  • Mowing Mowing, edging (of sidewalks, paved approaches and curbs), litter removal, herbicide treatment, grass clipping removal, and brush control are included under one bid item. Regular mowing under this contract is generally limited to mowing areas of shoulders, front and back slopes of ditches less than or equal to three-to-one (3:1) slope, roadside retention areas, dry roadside ditch bottoms, median islands and various width utility strips and similar areas. Slope mowing, which is also a contract requirement, is generally limited to slopes greater or steeper than three-to-one (3:1) and are relatively inaccessible to the use of conventional mowing equipment (e.g., steep slopes, retention area banks and shores, bridge/overpass banks, canal banks, wet roadside ditches, etc). These types of areas will normally require equipment specifically designed for this type of work. When slope mowing is performed, it will incorporate the use of string trimmers to protect the integrity of the slope and prevent damage to the turf. Sign posts, mailboxes, guardrails, trees, roadside outfall structures, fences, divider walls, shrubs, plants, light poles, utility flags or other such obstacles to mowing will be hand mowed or trimmed around as necessary to present a groomed appearance. Top of vegetation on wet bottom ditches areas must be cut-off to the water’s level. Particular attention will be paid to planted areas. Any damage that occurs to plants, trees, shrubs, mulched beds, tree rings, sprinkler heads, etc., will be repaired or restored, at the Contractor’s expense, before the cycle is completed. Mowing will also include grass clipping removal and litter removal, edging, and herbicide treatment. These costs will be included in the unit price bid for right-of-way mowing.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

Time is Money Join Law Insider Premium to draft better contracts faster.