Physical Layer – Network. Perimeter protection is implemented through the use of controlled devices at the network edge and on points throughout the network. The overarching principle of Xxxxxxx’x network security is to allow only connections and communications that are necessary to allow systems to operate, blocking other ports, protocols and connections. Access control lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers. Xxxxxxx uses edge router security for monitoring at the network layer. Networks within Xxxxxxx’x datacenter are further segmented to provide physical separation of critical back-end servers and storage devices from the public-facing interfaces. Xxxxxxx retains system logs for auditing and review.
Appears in 15 contracts
Samples: Itrack Terms, Iwarehouse Telematics System Terms, Raymond Iwarehouse Real Time Location System Terms