Difference between revisions of "Requesting Open Ports on the JHU Firewall"
| Line 33: | Line 33: | ||
:c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings.  <!--(We will discuss security scans later in this page.)-->  | :c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings.  <!--(We will discuss security scans later in this page.)-->  | ||
| − | ''All questions and follow-up regarding the instructions need to be addressed to [mailto:network.security@jhmi.edu network.security@jhmi.edu]''  | + | ''All '''questions''' and '''follow-up''' regarding the instructions need to be addressed to [mailto:network.security@jhmi.edu network.security@jhmi.edu]''  | 
<!-- '''NOTE:'''  You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU    | <!-- '''NOTE:'''  You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU    | ||
Revision as of 16:36, 11 October 2016
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
- Please see:
 
- for instructions to request port openings through the JHU Firewall.
 
- All questions and follow-up regarding the instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
 
Alternative (Older) Method If Unable To Use Above Method
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
 
- and
 
- b) specific reasons as to the need of each of your port openings.
 
- and
 
- c) allow JHU to run security scans on any equipment for which you request port openings.
 
All questions and follow-up regarding the instructions need to be addressed to network.security@jhmi.edu