[Jhs-leads] FW: firewall penetrations

Kirkpatrick, Ivan Ivan.Kirkpatrick@dep.state.fl.us
Tue, 17 May 2005 13:03:08 -0400


Please find the repsonse from the Unix guys here.


-----Original Message-----
From:	Casey, Travis
Sent:	Tue 5/17/2005 12:13 PM
To:	Kirkpatrick, Ivan; UNIX
Cc:=09
Subject:	RE: firewall penetrations
The hole for epic36:1525 is now open.  The hole for 1521 is pending =
action by
Hayes, our DMZ router/firewall provider.  The hole for tlhdsl7:1521 is
pending action by Hayes as well, but may require further work -- =
epic52's
giving an odd error message with it, and we haven't had holes from Linux
machines to the non-routable addresses before.

It typically takes up to 24 hours to update firewall holes.  We've just
completed a review of unused holes (done as of Friday), which had us
backlogged.  Incomplete requests tend to take longer, of course.

Those three holes where the only ones I could find, going back a few =
days in
my email.  If there are any others you know of that have been requested =
but
not yet opened, please let me know.

--Travis


-----Original Message-----
From: Kirkpatrick, Ivan=20
Sent: Tuesday, May 17, 2005 11:35 AM
To: UNIX
Subject: firewall penetrations


We have several pending requests regarding opening up firewall =
penetrations
for the database connections to epic36 using ports 1525 and I believe =
1521.

I believe at least three of our applications are down due to the =
placement of
the epic52 machine in the DMZ.

Can one of the System Administrators attend to this condition =
immediately?
If not can we have a date or time as to when this will be finished?  If =
there
is any question as to what has been requested I can provide information.

Thanks for your help