Difference between revisions of "Requesting Open Ports on the JHU Firewall"
Line 34: | Line 34: | ||
:c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings. <!--(We will discuss security scans later in this page.)--> | :c) allow JHU <!--(or CS)--> to run ''security scans'' on any equipment for which you request port openings. <!--(We will discuss security scans later in this page.)--> | ||
− | ''All '''questions''' and '''follow-up''' regarding | + | ''All '''questions''' and '''follow-up''' regarding these instructions need to be addressed to [mailto:network.security@jhmi.edu network.security@jhmi.edu]'' |
<!-- '''NOTE:''' You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU | <!-- '''NOTE:''' You are welcome to CC: [mailto:support@cs.jhu.edu support@cs.jhu.edu] in your request e-mail(s) to JHU |
Revision as of 16:37, 11 October 2016
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
- Please see:
- for instructions to request port openings through the JHU Firewall.
- All questions and follow-up regarding the instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
Alternative (Older) Method If Unable To Use Above Method
All port opening/closing requests should be sent by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
- and
- b) specific reasons as to the need of each of your port openings.
- and
- c) allow JHU to run security scans on any equipment for which you request port openings.
All questions and follow-up regarding these instructions need to be addressed to network.security@jhmi.edu