Difference between revisions of "Requesting Open Ports on the JHU Firewall"
Line 23: | Line 23: | ||
[mailto:network.security@jhmi.edu network.security@jhmi.edu] as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide: | [mailto:network.security@jhmi.edu network.security@jhmi.edu] as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide: | ||
+ | :a) your system's full ''hostname'' (including the domain part) and ''IP address''. | ||
− | :: | + | ::and |
− | : | + | :b) ''specific reasons'' as to the need of each of your port openings. |
− | :: | + | ::and |
− | : | + | :c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings. <!--(We will discuss security scans later in this page.)--> |
− | + | ''All questions and follow-up regarding the instructions need to be addressed to [mailto:network.security@jhmi.edu network.security@jhmi.edu]'' | |
− | |||
− | |||
<!-- '''NOTE:''' You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU | <!-- '''NOTE:''' You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU |
Revision as of 16:26, 11 October 2016
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
- Please see:
- for instructions to request port openings through the JHU Firewall.
- All questions and follow-up regarding the instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
Alternative (Older) Method If Unable To Use Above Method
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
- and
- b) specific reasons as to the need of each of your port openings.
- and
- c) allow JHU to run security scans on any equipment for which you request port openings.
All questions and follow-up regarding the instructions need to be addressed to network.security@jhmi.edu