Difference between revisions of "Requesting Open Ports on the JHU Firewall"
Line 1: | Line 1: | ||
− | CS does ''not'' have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU. <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider. --> If you need a port open on the JHU Firewall, you need to request it from JHU. | + | CS does ''not'' have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU. <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider. --> If you need a port open on the JHU Firewall, '''''you''''' need to request it from JHU. |
− | |||
==Requesting JHU to Open a Firewall Port== | ==Requesting JHU to Open a Firewall Port== | ||
− | All port opening/closing requests should be sent by the | + | All port opening/closing requests should be sent by the requester to |
[mailto:network.security@jhmi.edu network.security@jhmi.edu] as they are responsible for the JHU perimeter firewall. You will have to provide | [mailto:network.security@jhmi.edu network.security@jhmi.edu] as they are responsible for the JHU perimeter firewall. You will have to provide | ||
Revision as of 17:40, 2 October 2014
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU. If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as they are responsible for the JHU perimeter firewall. You will have to provide
a) specific reasons as to the need of each of your port openings,
and
b) allow JHU (or CS) to run security scans on any equipment for which you request port openings. (We will discuss security scans later in this page.)
You are welcome to cc support@cs.jhu.edu in your request e-mail(s) to JHU
Network Security, so that we can follow the conversation. But, for the most
part, the conversation will be between you and JHU Network Security.