Difference between revisions of "Requesting Open Ports on the JHU Firewall"

Line 1: Line 1:
 
==INTRO==
 
==INTRO==
  
CS does '''''not''''' have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.  <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider.  -->  
+
CS does '''''not''''' have a network firewall in place, but ''JHU has a '''perimeter firewall''''' in place between the Internet and JHU.  <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider.  -->  
  
 
If you need a port open on the JHU Firewall, '''''you''''' need to request it from JHU.
 
If you need a port open on the JHU Firewall, '''''you''''' need to request it from JHU.

Revision as of 14:08, 30 January 2017

INTRO

CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.

If you need a port open on the JHU Firewall, you need to request it from JHU.


Requesting JHU to Open a Firewall Port

New, Official Method

Please see:

http://it.jhu.edu/security/Public_IP_Addressing_NEW

for instructions to request port openings through the JHU Firewall.

All questions and follow-up regarding these instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.


Alternative (Older) Method If Unable To Use Above Method (Link Not Working, Etc.)

All port opening/closing requests should be emailed by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:

a) your system's full hostname (including the domain part) and IP address.
and
b) specific reasons as to the need of each of your port openings.
and
c) allow JHU to run security scans on any equipment for which you request port openings.

All questions and follow-up regarding these instructions need to be addressed to network.security@jhmi.edu