Skip to main content

Cornell University

Firewall Rules on Linux Managed Servers

Firewall rules for managed Linux servers, best practices, and how to get assistance. 

This article applies to: Managed Servers

On This Page

Linux firewall rules can be applied in two ways:

Best Practice: Standardize Rules using Classes of Servers

When planning firewall rules for your servers, it's helpful to use classes (groups of servers). For example, placing a set of Dev/Test/Prod servers in one class means you can apply firewall rule changes to the entire class and keep all of the configurations for that group identical. 

Using classes for firewall rules can greatly reduce inconsistencies between environments, leading to fewer problems with deployment. See the Server Farm Account Management page for more information about classes.

To see a list of classes on a server and firewall rules applied to those classes, connect to the Centralized Unix Configuration Information System at https://unixcfg.serverfarm.cornell.edu/.

Request a Firewall Rule

Send an email to systems-support@cornell.edu. Include the following:

  • Server information
    • If using classes, provide the class name.
    • If doing an individual server, provide the server name, and specific IPs, if the host is multi-homed.
  • Remote IP address or range of addresses.
  • Port number(s) which need to be opened.

Access Control Lists (ACLs) and Network Firewalls

It is possible that in addition to firewall rules on the server, network Access Control Lists (ACLs) or network Firewalls will need to be modified. The Systems Support group will adjust ACLs and Extra Tier firewall rules if required. 

For ACLs or Firewalls on the remote machines, coordinate with the people responsible on that end.

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.