Network Access Control. A computer referred to as a “router” is located between the Internet backbone connection and the DST Web server. The purpose of the router is to control the connectivity to the DST Web server at the port level. This equipment is located at DST’s Winchester data center, but it is administered and maintained by an independent firewall provider. Changes to the systems residing on this computer are submitted to the firewall provider for remote administration. DST is advised by its current firewall provider that this equipment will not interrogate data, and that its only function is to limit the type of traffic accessing the DST Web server to the suite of Hyper-Text Transfer Protocols (“HTTP”) transmissions. Ports on the router are configured to be consistent with ports on the DST Web server. DST is advised by its current firewall provider that all other ports on the router other than those configured for the DST Web server are not accessible from the Internet. The DST Web server utilizes a UNIX operating system. All services and functions within the DST Web server operating system are deactivated with the exception of services and functions which support HTTP. This is the required service for HTML content which is what the FAN Transactions are based upon. The general purpose of this feature is to prevent external users from entering UNIX commands or running UNIX based processes on the DST Web server. All ports on the DST Web server, except those required by FAN (the ports accessed through the fire wall provider’s router), are disabled. All “listeners” are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated. DST administrators gain access to the DST Web server through the physical console connected to the DST Web server, or through the internal network via DST Secure ID. FAN also incorporates a data mapping system referred to as the “CICS Mapper”. The function of the CICS Mapper is to perform data packaging, security interrogation, and protocol conversion. Data received by the CICS Mapper from the DST Web server is interrogated for authenticity, repackaged for the DST TA/2000 mainframe system, and protocols are converted for communication. The CICS Mapper is programmed to terminate the session/Transaction between the shareholder and FAN Web if data authentication fails. Alerts are provided to system administrators upon termination.
Appears in 34 contracts
Samples: Transfer Agency and Services Agreement (ALPS Series Trust), Transfer Agency and Services Agreement (ALPS Series Trust), Transfer Agency and Services Agreement (ALPS Series Trust)
Network Access Control. A computer referred to as a “router” is located between the Internet backbone connection and the DST Web server. The purpose of the router is to control the connectivity to the DST Web server at the port level. This equipment is located at DST’s Winchester data center, but it is administered and maintained by an independent firewall provider. Changes to the systems residing on this computer are submitted to the firewall provider for remote administration. DST is advised by its current firewall provider that this equipment will not interrogate data, and that its only function is to limit the type of traffic accessing the DST Web server to the suite of Hyper-Text Transfer Protocols (“HTTP”) transmissions. Ports on the router are configured to be consistent with ports on the DST Web server. DST is advised by its current firewall provider that all other ports on the router other than those configured for the DST Web server are not accessible from the Internet. The DST Web server utilizes a UNIX operating system. All services and functions within the DST Web server operating system are deactivated with the exception of services and functions which support HTTP. This is the required service for HTML content which is what the FAN Transactions are based upon. The general purpose of this feature is to prevent external users from entering UNIX commands or running UNIX based processes on the DST Web server. All ports on the DST Web server, except those required by FAN (the ports accessed through the fire wall provider’s router), are disabled. All “listeners” are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated. DST administrators gain access to the DST Web server through the physical console connected to the DST Web server, or through the internal network via DST Secure ID. FAN also incorporates a data mapping system referred to as the “CICS Mapper”. The function of the CICS Mapper is to perform data packaging, security interrogation, and protocol conversion. Data received by the CICS Mapper from the DST Web server is interrogated for authenticity, repackaged for the DST TA/2000 mainframe system, and protocols are converted for communication. The CICS Mapper is programmed to terminate the session/Transaction between the shareholder Shareholder and FAN Web if data authentication fails. Alerts are provided to system administrators upon termination.
Appears in 3 contracts
Samples: Transfer Agency and Services Agreement (Dfa Investment Trust Co), Transfer Agency and Services Agreement (Dimensional Investment Group Inc), Master Agreement (BofA Funds Series Trust)
Network Access Control. A computer referred to as a “router” is located between the Internet backbone connection and the DST Web server. The purpose of the router is to control the connectivity to the DST Web server at the port level. This equipment is located at DST’s Winchester data center, but it is administered and maintained by an independent firewall provider. Changes to the systems residing on this computer are submitted to the firewall provider for remote administration. DST is advised by its current firewall provider that this equipment will not interrogate data, and that its only function is to limit the type of traffic accessing the DST Web server to the suite of Hyper-Text Transfer Protocols (“HTTP”) transmissions. Ports on the router are configured to be consistent with ports on the DST Web server. DST is advised by its current firewall provider that all other ports on the router other than those configured for the DST Web server are not accessible from the Internet. The DST Web server utilizes a UNIX operating system. All services and functions within the DST Web server operating system are deactivated with the exception of services and functions which support HTTP. This is the required service for HTML content which is what the FAN Shareholder Portal Transactions are based upon. The general purpose of this feature is to prevent external users from entering UNIX commands or running UNIX based processes on the DST Web server. All ports on the DST Web server, except those required by FAN the Shareholder Portal (the ports accessed through the fire wall provider’s router), are disabled. All “listeners” are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated. DST administrators gain access to the DST Web server through the physical console connected to the DST Web server, or through the internal network via DST Secure ID. FAN The Shareholder Portal also incorporates a data mapping system referred to as the “CICS Mapper”. The function of the CICS Mapper is to perform data packaging, security interrogation, and protocol conversion. Data received by the CICS Mapper from the DST Web server is interrogated for authenticity, repackaged for the DST TA/2000 mainframe system, and protocols are converted for communication. The CICS Mapper is programmed to terminate the session/Transaction between the shareholder and FAN Web the Shareholder Portal if data authentication fails. Alerts are provided to system administrators upon termination.
Appears in 2 contracts
Samples: Transfer Agency and Services Agreement (Forward Funds), Transfer Agency and Services Agreement (Salient MF Trust)
Network Access Control. A computer referred to as a “"router” " is located between the Internet backbone connection and the DST Web server. The purpose of the router is to control the connectivity to the DST Web server at the port level. This equipment is located at DST’s 's Winchester data center, but it is administered and maintained by an independent firewall fire wall provider. Changes to the systems residing on this computer are submitted to the firewall fire wall provider for remote administration. DST is advised by its current firewall fire wall provider that this equipment will not interrogate data, and that its only function is to limit the type of traffic accessing the DST Web server to the suite of Hyper-Text Transfer Protocols (“"HTTP”") transmissions. Ports on the router are configured to be consistent with ports on the DST Web server. DST is advised by its current firewall fire wall provider that all other ports on the router other than those configured for the DST Web server are not accessible from the Internet. The DST Web server utilizes a UNIX operating system. All services and functions within the DST Web server operating system are deactivated with the exception of services and functions which support HTTP. This is the required service for HTML content which is what the FAN Transactions are based upon. The general purpose of this feature is to prevent external users from entering UNIX commands or running UNIX based processes on the DST Web server. All ports on the DST Web server, except those required by FAN (the ports accessed through the fire wall provider’s 's router), are disabled. All “"listeners” " are deactivated. Directory structures are “"hidden” " from the user. Services which provide directory information are also deactivated. DST administrators gain access to the DST Web server through the physical console connected to the DST Web server, or through the internal network via DST Secure ID. FAN also incorporates a data mapping computer system referred to as the “CICS Mapper”"FAN Switch". The function of the CICS Mapper FAN Switch is to perform data packaging, security interrogation, and protocol conversion. Data received by the CICS Mapper FAN Switch from the DST Web server is interrogated for authenticity, repackaged for the DST TA/2000 mainframe system, and protocols are converted for communication. The CICS Mapper FAN Switch is programmed to terminate the session/Transaction between the shareholder Shareholder and FAN Web if data authentication fails. Alerts are provided to system administrators upon termination.
Appears in 1 contract
Network Access Control. A computer referred to as a “"router” " is located between the Internet backbone connection and the DST Web server. The purpose of the router is to control the connectivity to the DST Web server at the port level. This equipment is located at DST’s 's Winchester data center, but it is administered and maintained by an independent firewall provider. Changes to the systems residing on this computer are submitted to the firewall provider for remote administration. DST is advised by its current firewall provider that this equipment will not interrogate data, and that its only function is to limit the type of traffic accessing the DST Web server to the suite of Hyper-Text Transfer Protocols (“"HTTP”") transmissions. Ports on the router are configured to be consistent with ports on the DST Web server. DST is advised by its current firewall provider that all other ports on the router other than those configured for the DST Web server are not accessible from the Internet. The DST Web server utilizes a UNIX operating system. All services and functions within the DST Web server operating system are deactivated with the exception of services and functions which support HTTP. This is the required service for HTML content which is what the FAN Transactions are based upon. The general purpose of this feature is to prevent external users from entering UNIX commands or running UNIX based processes on the DST Web server. All ports on the DST Web server, except those required by FAN (the ports accessed through the fire wall provider’s 's router), are disabled. All “"listeners” " are deactivated. Directory structures are “"hidden” " from the user. Services which provide directory information are also deactivated. DST administrators gain access to the DST Web server through the physical console connected to the DST Web server, or through the internal network via DST Secure ID. FAN also incorporates a data mapping system referred to as the “"CICS Mapper”". The function of the CICS Mapper is to perform data packaging, security interrogation, and protocol conversion. Data received by the CICS Mapper from the DST Web server is interrogated for authenticity, repackaged for the DST TA/2000 mainframe system, and protocols are converted for communication. The CICS Mapper is programmed to terminate the session/Transaction between the shareholder Shareholder and FAN Web if data authentication fails. Alerts are provided to system administrators upon termination.
Appears in 1 contract
Samples: Transfer Agency and Services Agreement (Dimensional Emerging Markets Value Fund)