Standing Service Level Agreement (SLA)
Firewall and VPN Services
This service level agreement (SLA) is between Information Services (IS), and any unit at the University of Oregon that makes use of the University’s Centralized Firewall Services (UO-CFS). Under this SLA, Information Services agrees to provide access to the services outlined in this document, and the unit agrees to abide by the responsibilities and other requirements of the SLA.
This SLA documents agreed-upon systems and services, covers performance and reliability, targets objectives, outlines escalation processes, and serves as an invoice for financial transactions between parties.
In support of the academic mission and administrative functions of the University of Oregon, Information Services will provide a fully managed and proactive firewall management solution where Network and Telecommunications Services (NTS) within IS is solely responsible for the administration, management, and monitoring of the firewall platform’s configuration, security policy, and rule-set in accordance to this Service Level Agreement (SLA). NTS has dedicated staff that will work with authorized departmental security contacts to review, validate, implement, and audit firewall and VPN requests/changes as needed.
Duration of Agreement:
This standing agreement covers all virtual firewalls running on the Information Services' centralized firewall and VPN hardware, as well as dedicated standalone deployments. Any modification to this agreement will be posted to the Information Services' website at the following URL: http://security.uoregon.edu/firewallSLA/
Definition of Scope:
The hardware used to provide the standalone and centralized firewall and VPN services from the UOnet core is covered by this standing agreement. This includes core switching, routing, firewall, and VPN equipment. Building infrastructure and power systems not located in IS datacenters are not covered by this service level agreement.
Additional specific information regarding infrastructure and dependencies is available upon written request.
NTS will coordinate the deployment of firewall and VPN services either as virtual services in the University’s centralized fabric or using standalone devices, depending on the user’s needs. Building and core networking will also be handled by NTS and may include billable time and materials in order to provide connectivity to the firewall and VPN systems.
NTS – Firewall, VPN and network infrastructure maintenance will occur as listed on http://status.uoregon.edu/maintenance.
Typical work performed during systems maintenance periods:
- Network upgrades or changes
- Software upgrades on network hardware
- Testing failover and other resiliency systems
- Changing or modifying firewall configuration (not including rule changes or normal non-service interrupting changes)
Every effort is made to limit the impact of maintenance periods on service availability of production instances; however during the duration of regularly schedule maintenance periods, services running on hardware covered in this document may be unavailable. While the hardware described in this document may still be operational during these time-periods, firewall or VPN servers transport may be interrupted by unrelated network maintenance.
Notification of planned maintenance events will be sent at least twenty-four (24) hours in advance via email@example.com or via direct email to the affected customer(s).
Roles and Responsibilities:
Information Services – NTS manages all firewall and network hardware infrastructure related to the centralized firewall and VPN offering, this includes but is not limited to:
- Installation, maintenance, and configuration of new and existing hardware, software, and license codes
- Integration of firewall services into monitoring and alerting systems
- Provisioning of new firewalls and related network infrastructure
- Point to point VPN connections
- End-user VPN connections
- Core and edge device availability monitoring
- Performance monitoring of firewall and network hardware with timely communication to unit about performance problems or concerns with suggested resolution paths
- Log monitoring, analysis and archival
Maintenance and Operations
- Managing and processing renewal of all support agreements covering hardware and
software related to the firewall and network hardware and related systems
- Rule-set validation, verification, tuning, and optimization
- Review of firewall policy and firewall security posture assessments
- Software upgrades, patch management and device configuration maintenance
- Device configuration change management and auditing
- Maintain backups of device configurations
- Comprehensive reporting upon written request
Emergency response and disaster recovery
- After-hours response to system outages by the NTS on-call staff
- Incident response related to disruptions of service from network or other related failures
- Network and firewall fault analysis and timely problem resolution
- Reporting errors and connectivity or performance problems between systems with traffic
traversing the firewall, including performance issues detected at the application level.
- Notifying NTS of changes in requirement needs with sufficient time to allow for adequate planning.
- Timely notification to NTS of changes to network infrastructure or protected systems behind the firewall, when these are not managed by NTS.
- Provide and maintain a list of contacts allowed to submit or approve changes for your firewall services. This list should be provided to the Security Group at
- Administration and troubleshooting of systems located behind the firewall
- Timely payment of any and all fees associated with administration or support related directly to the support of the unit needs and outlined within this document.
Initial point of contact for all configuration changes will be via a work ticket in the nethelp IT Helpdesk (Information Services' ticket tracking system) queue at firstname.lastname@example.org or the NTS Hotline 541-346-6837. All changes to firewall configuration must be tracked in a work ticket. Changes will be made during normal business hours (8-5 Monday through Friday) unless prior arrangements are made with NTS, 24 hours in advance. NTS will make every effort to meet or exceed the following times for changes once all required information has been submitted through a work ticket:
|Access List (ACL) change
||1 business day
|Provision new user VPN service
||3 business days
|Add or modify authorized users from VPN service
||1 business day
|Add or modify firewall zone
||2 business weeks
|Configure point-to-point VPN service
||1 business week
|Log analysis for application layer related issues
||1 business day
NTS reserves the right to refuse the implementation of a change if they determine that the change broadens the scope of service, or if they determine that it adversely affects other aspects of service availability.
Initial point of contact for all system availability problems will be via the nethelp IT Helpdesk queue email address or via the NTS telephone hotline.
Incident Reporting and Escalation:
Tier 1: NTS – NTS Hotline via +1.541.346-NETS (6387) or nethelp ticket email address at email@example.com
Tier 2: Andy Vaughn – Network/Telecom Operations Manager firstname.lastname@example.org or 541-346-1016
Tier 3: Steve Menken - Assoc CIO for Technology Infrastructure & Network for Education and Research in Oregon email@example.com or 541-346-1753
Tier 4: Information Services CIO (firstname.lastname@example.org or 541-346-4403)
Users can expect approximately 99.9% service availability (Approximately 8.7 hours per year of unplanned outage time) for hardware and services covered by this SLA. This downtime is measured over the time period of a year, excluding anticipated outages and downtime performed during maintenance periods.
Service availability will be measured using Nagios service monitoring and records will be retained for one year. NTS will monitor the firewall and VPN physical devices as well as the availability of the individual virtual firewalls.
Overall system performance statistics will be monitored and graphed for a period of one year using SNMP. Currently NTS uses Cacti to graph and archive system performance data.
Service availability reports are available periodically by written request to NTS. Anonymized service availability information can also be provided during briefings to the UO IT community at departmental computing meetings, or to a target audience during Lunch & Learn sessions.
No penalty for missing this availability expectation will be enforced at this time. This service expectation should be used for planning purposes only.
Required base service:
$125/month for the base firewall context license, one inside network zone and one outside network zone.
Additional services $41.66/month each:
- Additional firewall protected zone. This includes each physically separate IP network connected to the firewall, excluding the inside and outside networks included in the base service.
- Administrative VPN services. This includes both IPSec and SSL client VPN access. The VPN can be configured for split-tunneling or full tunneling. Only users identified as IT contacts for the covered department may use this VPN service.
- User VPN services. This includes both IPSec and SSL client VPN services for end-users. The VPN can be configured for split-tunneling or full tunneling. IT contacts for the department must provide and maintain a list of DuckID’s that are allowed to use this resource on at least a quarterly basis.
- Point-to-point VPN services. This includes any and all point-to-point VPN connections that must terminate on the virtual firewall.
Costs to upgrade in-building and core networking equipment are not covered by these fees and will be negotiated on a case-by-case basis if necessary.
Total cost of the UO-CFS service will be prorated to twelve months and billed on a monthly basis along with the unit’s telephone bill.
SLA version 2.42