Difference between revisions of "Requesting Open Ports on the JHU Firewall"
(→INTRO) |
|||
Line 1: | Line 1: | ||
==INTRO== | ==INTRO== | ||
− | CS does '''''not''''' have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU. <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider. --> | + | CS does '''''not''''' have a network firewall in place, but ''JHU has a '''perimeter firewall''''' in place between the Internet and JHU. <!-- If you are running your own server on the CS network and need ports open on the JHU Firewall, there are several items to consider. --> |
If you need a port open on the JHU Firewall, '''''you''''' need to request it from JHU. | If you need a port open on the JHU Firewall, '''''you''''' need to request it from JHU. |
Revision as of 14:08, 30 January 2017
INTRO
CS does not have a network firewall in place, but JHU has a perimeter firewall in place between the Internet and JHU.
If you need a port open on the JHU Firewall, you need to request it from JHU.
Requesting JHU to Open a Firewall Port
New, Official Method
Please see:
for instructions to request port openings through the JHU Firewall.
All questions and follow-up regarding these instructions need to be addressed to JHU Networking or JHU Network Security. The JHU Helpdesk at 410-516-HELP may be able to direct your questions to the correct team.
Alternative (Older) Method If Unable To Use Above Method (Link Not Working, Etc.)
All port opening/closing requests should be emailed by the requester to network.security@jhmi.edu as JHU's Network Security team is responsible for the JHU perimeter firewall. You will have to provide:
- a) your system's full hostname (including the domain part) and IP address.
- and
- b) specific reasons as to the need of each of your port openings.
- and
- c) allow JHU to run security scans on any equipment for which you request port openings.
All questions and follow-up regarding these instructions need to be addressed to network.security@jhmi.edu