Difference between revisions of "Requesting Open Ports on the JHU Firewall"
Line 10: | Line 10: | ||
===New, Official Method=== | ===New, Official Method=== | ||
− | Please see: | + | :Please see: |
− | [http://it.jhu.edu/security/Public_IP_Addressing_NEW http://it.jhu.edu/security/Public_IP_Addressing_NEW] | + | ::[http://it.jhu.edu/security/Public_IP_Addressing_NEW http://it.jhu.edu/security/Public_IP_Addressing_NEW] |
− | for instructions to request port openings through the JHU Firewall. | + | :for instructions to request port openings through the JHU Firewall. |
− | ''All questions regarding the instructions need to be addressed to JHU Networking or JHU Network Security.'' | + | :''All questions and follow-up regarding the instructions need to be addressed to JHU Networking or JHU Network Security.'' The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team. |
Revision as of 16:18, 11 October 2016
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
- Please see:
- for instructions to request port openings through the JHU Firewall.
- All questions and follow-up regarding the instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
Alternative (Older) Method If Unable To Use Above Method
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
- and
- b) specific reasons as to the need of each of your port openings.
- and
- c) allow JHU to run security scans on any equipment for which you request port openings.
NOTE: You are welcome to CC: support@cs.jhu.edu in your request e-mail(s) to JHU
Network Security, so that we can follow the conversation. But, for the most
part, the conversation will be between you and JHU Network Security.