Firewall Settings Sample Clauses

Firewall Settings. Because WorldCard Team Service uses special connection ports, you have to set up the firewall to open those ports for users to connect. The following instruction is based on the system’s firewall, please set up the system firewall, router firewall ans so on according to your company’s equipments.
AutoNDA by SimpleDocs
Firewall Settings. Your network firewall must permit access to the Company web addresses referenced by the program.
Firewall Settings. This is to configure a default SOCKS proxy server, if you would like to configure a SOCKS proxy server for a specific ICA connection entry, please refer to the description mentioned earlier in section 4.5.3. To Configure a Default SOCKS Proxy Server a. Tick Connect via SOCKS proxy.
Firewall Settings. We will select all your initial firewall settings for Managed Services. You may request changes to your initial firewall settings by submitting a ticket (through XxxxxxXxxxxx.xxx). If approved, your initial firewall settings will be changed within twenty- four hours after our receipt of your ticket. Our breach of this guarantee will be referred to as a “Firewall Setting Interruption.”
Firewall Settings. With the online Version of ZenZefi access to port 443 must be allowed as ZenZefi uses https to communicate with the PKI.

Related to Firewall Settings

  • Trunk Types 2.2.1 In interconnecting their networks pursuant to this Attachment, the Parties will use, as appropriate, the following separate and distinct trunk groups:

  • Local Switching Interfaces 4.2.13.1 D-Tel, Inc. shall order ports and associated interfaces compatible with the services it wishes to provide, as listed in Exhibit B. BellSouth shall provide the following local switching interfaces:

  • Switching System Hierarchy and Trunking Requirements For purposes of routing CSTC traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to CSTC, the subtending arrangements between CSTC Tandem Switches and CSTC End Office Switches shall be the same as the Tandem/End Office subtending arrangements that CSTC maintains for the routing of its own or other carriers’ traffic.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Switching All of the negotiated rates, terms and conditions set forth in this Section pertain to the provision of local and tandem switching.

  • Shift Rotation Routine shift rotation is not an approach to staffing endorsed by the Employer. Except for emergency situations where it may be necessary to provide safe patient care, shift rotation will not be utilized without mutual consent. If such an occasion should ever occur, volunteers will be sought first. If no one volunteers, the Employer will rotate shifts on an inverse seniority basis until the staff vacancies are filled.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Points of Interconnection and Trunk Types 2.1 Point(s) of Interconnection.

Time is Money Join Law Insider Premium to draft better contracts faster.