Network Security

Frequently Asked Questions

Q: How will the enhanced security affect me?
A: For most users of desktop computers the primary effect will be an improvement in security. However:

If you are accessing UVM servers from outside UVM and are not currently using encryption capable client software for Web, email and telnet access, you will need to upgrade the software prior to July 1, 2002. Ultimately, this software will also be required to access computers from within UVM as well.

If you have configured email, FTP, Web and other server software on your computer, those services will no longer be accessible from outside the University unless you waive the default firewall protection. Note that in order to waive protection, you must agree to maintain normal security precautions, to be available to address security issues related to your server, and have the approval of your department or college's management.
Q: Can I still use my desktop computer for my personal Web page?
A: Yes, but it will not be assessible from outside UVM. If you wish to have Web pages accessible from outside of UVM, you should use a server with security class 2, 3 or 4. Web space on www.uvm.edu is available to every UVM student and employee. An account on the Zoo cluster is necessary to use the Web space.
Q: My department runs our own Web server and we have a knowledgeable systems administrator who keeps assures that the server is secure and up-to-date. We understand the security risks, but nonetheless need for the server to be accessible from outside of UVM. What do we need to do?
A: The server administrator should send email to security team requesting a firewall waiver.
Q: I am responsible for a server my department bought for us a couple of years ago. We set it up with Web, email, Telnet, FTP and other services enabled for our convenience. We don't have funding for a professional systems administrator and no one in our department has time or inclination to keep up with operating system maintenance or security alerts. Will this change in network security affect us?
A: Yes. Your system, which is currently almost certainly vulnerable to attack, will receive a much higher level of firewall protection. Without appropriate system administration, a firewall waiver will not be granted. Systems, such as the one your describe, have been among the most likely to be compromised and subsequently used to attack other computers (within and without UVM) and compromise the security of our entire network.
Q: We can get along without the off-campus access to our email, FTP and Telnet server, but we don't have time to move our Web pages to www.uvm.edu (and we aren't sure they would function properly without some work). Can we waive just the Web server protection?
A: Yes, if Web security can be satisfactorily maintained. Although Web servers are also a source of security penetrations and routine systems administration is still required, the burden is much less if the other vulnerable protocols have been turned off. Your manager may be willing to support the lower amount of time it will take to secure a Web-only environment.
Q: What kind of help can I expect from CIT?
A: CIT will manage the firewall and the VLANs. CIT will maintain this Web site and the Security list, sharing information on important security matters. CIT will regularly scan systems in security classes 2-4 for vulnerabilities. However, CIT, despite declining resources, is already devoting considerable effort to this matter and is not able to provide direct assistance with system administration or system recovery for departmental systems. However, the Engineering & Mathmatics (EM) Computing Facility may be available for such assistance on a contract or time and materials basis.
Q: What if my unprotected server is hacked into?
A: We expect these security measures to reduce, but not eliminate, that risk. The first step will be to remove it from the campus net and report the intrusion. A compromised server threatens every host on the net. Before the server can be reestablished, the assigned systems administrator will need to reconstruct the server. If the breakin is discovered by CIT(or some one whose system is being attacked by the compromised server) and the assigned systems administrator is not available to address the problem, the system will be isolated to protect the campus network.