The ITS Server Firewall Administration Standard requirements and process are outlined below. This information is provided primarily for the use of University of Idaho system administrators. Should you have questions, please contact your system administrator or the Help Desk at firstname.lastname@example.org.
Access to the NMS firewall management tools (specifically the grant of the server-admin role) is restricted to the employees of the University of Idaho.
The University of Idaho employee must meet the following requirements:
- Board appointed
- ROJD has IT network support and server administration responsibilities
- Scope of responsibility is college, division, center (including research) wide
- Dean/AVP specifically request this access
- Judgment and knowledge confirmed by CIO or designee via one or more of the following: interview, resume, or reference checks
- NMS change access
The process for granting access includes:
1. Employee who already has NMS access emails the following information to their Dean or AVP with a request for access to the ITS border firewall management tools:
- Job Title
- College/Division/Center Name
- Supervisor Name
- Name of IT Backup(s), if any
- ROJD (attached)Board appointed
2. Dean forwards this request to email@example.com stating their supportAfter approval, additional steps include:
3. The network team forwards a completed request to the CIO, or designee.
4. The CIO or designee confirms the individual(s) meet the standards outlined above
5. If the standard is met, CIO or designee sends an email granting permission for the access to the Network Team, cc’ing the Dean/AVP and individuals.
6. If the standard is not met, CIO or designee sends an email stating which elements of the standards are not met.
1. NMS Training by NetTeamExceptions:
2. Access Granted by DNS domain.
Any Dean/AVP may request an exception to above standards, for a limited time, by submitting in writing the following information through a VP or Provost to the UI Chief Information Officer (CIO):
- Requester’s Name
- Date of Request
- Requirement Number
- Rationale and time period for which exception is requested
- Steps to be taken to mitigate security risks
The CIO will consult with the Financial Vice President and/or Provost, as necessary, prior to making a decision on the request. The CIO will notify the Requester of the final decision and document any special terms/conditions.