Difference between revisions of "Requesting Open Ports on the JHU Firewall"
Line 25: | Line 25: | ||
− | :a) your system's full hostname (including the domain part) and IP address. | + | :a) your system's full ''hostname'' (including the domain part) and ''IP address''. |
::and | ::and | ||
− | :b) specific reasons as to the need of each of your port openings. | + | :b) ''specific reasons'' as to the need of each of your port openings. |
::and | ::and | ||
− | :c) allow JHU <!--(or CS)--> to run security scans on any equipment for which you request port openings. <!--(We will discuss security scans later in this page.)--> | + | :c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings. <!--(We will discuss security scans later in this page.)--> |
Revision as of 15:00, 10 October 2016
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
Please see:
http://it.jhu.edu/security/Public_IP_Addressing_NEW
for instructions to request port openings through the JHU Firewall.
All questions regarding the instructions need to be addressed to JHU Networking or JHU Network Security. THe JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
Alternative (Older) Method If Unable To Use Above Method
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
- and
- b) specific reasons as to the need of each of your port openings.
- and
- c) allow JHU to run security scans on any equipment for which you request port openings.
NOTE: You are welcome to CC: support@cs.jhu.edu in your request e-mail(s) to JHU
Network Security, so that we can follow the conversation. But, for the most
part, the conversation will be between you and JHU Network Security.