Firewall Modification Request

advertisement
Request No.:
Firewall Modification Request
Information Technology Services Form ITS-8812 Rev E 5/27/08
Page 1 of 2
This form is to be used for requesting modifications to the campus firewall rules so that applications can be used securely across
various zones of the network. If you need assistance in filling out this form, contact your Information Technology Consultant (ITC):
http://www.calstatela.edu/itc. Please type or neatly print, and obtain all the required approval signatures. Instructions are available at
www.calstatela.edu/its/forms. Submit completed requests to the ITS Help Desk (LIB PW Lobby).
REQUESTOR INFORMATION
LAST NAME
FIRST NAME
MIDDLE NAME
EMPLOYEE ID NO. (Golden Eagle Card ID #)
OFFICE LOCATION (Bldg. & Room #)
OFFICE EXTENSION
DEPARTMENT
DEPARTMENT EXTENSION
COLLEGE/DIVISION
E-MAIL ADDRESS
ITC NAME
ITC EXTENSION
APPLICATION INFORMATION (this is the application/service that you want to work over the network)
1)
Application Title:
2)
Application Publisher:
3)
What will the application be used for?
4)
Where do you plan on using this application?
5)
Do you currently have the required license(s) for this application?
Yes
No
Will obtain license by (mm/dd/yyyy):
6)
Will this application be for permanent or temporary use? If temporary, provide termination date.
Permanent
Temporary If temporary, list the termination date:
7)
What type of data will be transmitted by this application (i.e., music, graphic images, database information, text, etc.)?
8)
If applicable, list the specific file extensions.
9)
Who/what needs access to this application and/or files it generates? Check all that apply.
All Students
All Faculty
All Staff/Dept Office(s)
All Open Access Labs
All Electronic Classrooms
Wireless Network
CSULA Modem Pool
CSULA Server Farm
Students in the
building
Faculty Office(s) in the
building
Staff/Dept Office(s) in the
building
Open Access Lab(s) in the
building
Electronic Classroom(s) in the
building
Research Office(s) in the
building
Common Management System (CMS)
Faculty Server - list name of server:
Staff Server - list name of server
Security Server - list name of server
Off Campus/Off Site – list hostname of site:
10)
Are User ID’s and/or Passwords required to use this application?
Yes
No
11)
Will this application generate and/or store any sensitive, personal, proprietary, or confidential information?
Yes
No
12)
If yes, how will you secure access to the data?
13)
Is this a new application to the campus?
Yes
No If no, who else or what other department is using this application?
Request No.:
Firewall Modification Request
Information Technology Services Form ITS-8812 Rev E 5/27/08
Page 2 of 2
CAMPUS SYSTEM INFORMATION
1)
System Name (hostname):
2)
Name of System Owner:
3)
Where is system equipment located?
4)
Who has access to the equipment location?
5)
Are application upgrades and system OS patches and fixes on a set schedule?
Yes
No If yes, what is the schedule (hourly / daily / monthly / yearly)?
NETWORK INFORMATION
Source IP Address(es)
Source Port(s)
Destination IP Address(es)
Destination Port(s)
Note: To get the IP Address(es), you can run “nslookup hostname” from your command prompt where “hostname” is the name of the source and
destination hosts. To find out specific port(s), you can run a port scan of the source and destination hosts to identify the port(s) required for your
application.
The protocol that this application uses is: (check one)
TCP
UDP
To get the protocol information, you must be logged onto the application server. Run “netstat –a” from the application server at the command
prompt. Look for the application port located in the second column labeled “Local Address”. When you locate the application port, the protocol will be
listed in the first column labeled “Proto” to the left of the “Local Address” column.
ACADEMIC SUPPORT (if applicable)
The ITC whose name appears on this form has contacted me about the requested software application and its use on the campus
network. I understand that allowing access to this application through our campus network traffic management control may pose a
security risk to the campus network as well as to other computers. I approve of access to the requested application being allowed on
our campus network.
DIRECTOR:
APPROVED
Reason for denial:
DATE:
DENIED
DEPARTMENT / BUSINESS UNIT ACKNOWLEDGEMENTS AND APPROVALS
I understand that allowing access to this application through our campus network traffic management control may pose a security risk to
my computer as well as to the rest of the campus network. I authorize Information Technology Services to do a security vulnerability
assessment of any system to be used for this application to identify any system oversights that could cause security risks to the
campus.
REQUESTOR SIGNATURE:
DATE:
Dept Chair/Manager Name (type or print)
Signature
Approved
Denied
Date
Dean/Director Name (type or print)
Signature
Approved
Denied
Date
If denied, give reason for denial:
Download