My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
TRITECH SOFTWARE SYSTEMS 2
Clerk
>
Contracts / Agreements
>
INACTIVE CONTRACTS (Originals Destroyed)
>
T (INACTIVE)
>
TRITECH SOFTWARE SYSTEMS 2
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
3/25/2024 2:41:48 PM
Creation date
10/9/2006 12:09:16 PM
Metadata
Fields
Template:
Contracts
Company Name
TRITECH SOFTWARE SYSTEMS 2
Contract #
A-2006-256
Agency
FIRE
Council Approval Date
9/5/2006
Insurance Exp Date
5/1/2007
Destruction Year
2015
Notes
Amended by A-2006-256A, A-2008-331
Document Relationships
TRITECH SOFTWARE SYSTEMS 2a
(Amended By)
Path:
\Contracts / Agreements\ INACTIVE CONTRACTS (Originals Destroyed)\T (INACTIVE)
TRITECH SOFTWARE SYSTEMS 2b
(Amended By)
Path:
\Contracts / Agreements\ INACTIVE CONTRACTS (Originals Destroyed)\T (INACTIVE)
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
160
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Appendix A -Additional VPN Information <br />Point -to -Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data <br />from a remote client to a private enterprise server, creating a virtual private network (VPN) by using <br />TCP/IP -based data networks. PPTP supports multiple network protocols (IP, IPX, and NetBEUI) and can <br />be used for virtual private networking over public and private networks. You can use PPTP to provide <br />secure, on -demand, virtual networks by using dial -up lines, local area networks (LANs), wide area <br />networks (WANs), or the Intemet and other public, TCP/IP -based networks. <br />IPSec - short for IP Security, a set of protocols developed to support secure exchange of packets at the IP <br />layer. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the <br />data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode <br />encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each <br />packet. <br />For IPsec to work, the sending and receiving devices must share a public key. This is accomplished <br />through a protocol known as Intemet Security Association and Key Management Protocol/Oakley <br />(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using <br />digital certificates. <br />IMPORTANT NOTES: <br />It is recommended that the PPTP server have 2 network adapters: one connected to the VisiCAD network <br />and one connected to the Internet router. <br />For security reasons, all users with dial -in permission should have a password assigned and change it on <br />regular basis. Please do not use blank passwords. If possible, rename the Administrator account. <br />FIREWALL <br />It is highly recommended that customers install a firewall to protect the VPN server and the VisiCAD <br />network from intrusion. <br />To allow PPTP VPN traffic through a firewall, the following ports must be opened: <br />➢ Inbound and outbound TCP port # 1723 (PPTP) <br />➢ Inbound and outbound IP port # 47 (Generic Routing Encapsulation) <br />To allow Cisco IPSec VPN traffic through a firewall, the following ports must be opened: <br />➢ Inbound and outbound UDP # 10,000 <br />➢ Inbound and outbound UDP # 4,500 <br />➢ Inbound and outbound UDP # 500 <br />Site Preparation and Support Connectivity Guide, V3.1 dated 8.12.2005 Page 13 of 13 <br />TnTech Software Systems - Confidential & Proprietary <br />
The URL can be used to link to this page
Your browser does not support the video tag.