Information Security Standards
FIREWALLS
GENERAL
A firewall is the first line of defense against unauthorized or malicious access to East Texas A&M University information resources. It is important to ensure that firewalls protecting University information resources are correctly configured. This procedure provides users information on both host-based firewalls and requesting exceptions to the campus-wide firewall.
APPLICABILITY
This procedure applies to all University information resources. The purpose of this procedure is to provide a set of standards for how firewalls are configured to protect University Information Resources.
PROCEDURES
1. The campus-wide firewall operates on a default-deny policy.
2. The university network is separated into multiple VLANs. Each VLAN has a designation of whether new inbound connections are allowed or not.
a. In a VLAN designated for servers, inbound and outbound connections are allowed on a port-by-port and host-by-host basis.
b. In a VLAN designated for clients, inbound connections are not allowed, but outbound connections are minimally restricted.
3. Host-based firewalls should be used on servers to restrict access from computers within the University network.
STANDARD APPROVED PORTS
The following ports are generally approved for public usage:
1. TCP/80 (HTTP/Web Servers)
2. TCP/443 (HTTP with SSL or TLS)
STANDARD PROHIBITED PORTS
The following ports are approved only in specific cases, with restrictions on the remote IP address
1. TCP/22 (SSH) - (Restricted to a single IP or small network block)
2. TCP/21 (FTP) – (Restricted to a single IP or small network block, unless using TLS)
HISTORY
Updated October 15, 2013
Last Updated March 31, 2014