Stronghold
HomeServicesDocumentationBlog
  • Highly Secure Computing (Stronghold)
  • Data Management
    • SFTP Data Transfers
      • Data Imports
      • Data Exports
    • HTTPS Direct Downloads
      • FastX 3
      • FastX 2
    • Data Storage
    • Globus Transfers
      • Windows Tenants
      • Adding New Users
  • Usage
    • New Tenant Onboarding
    • Windows Environments
      • Access from Mac
      • Access from Windows
      • RDP Gateway from Mac
      • RDP Gateway from Windows
    • Linux Environments
      • FastX 3
      • FastX 2
  • Software
    • Windows Standard Software
    • Linux Standard Software
      • Julia
    • Package Archive Mirrors
      • BioConductor Mirror
      • CRAN Mirror
      • PyPI Mirror
    • Install R/Python Packages from Local File
    • Jupyter Lab on Linux Workstations
    • Changing the temporary folder for softwares
      • SAS
      • STATA
      • RStudio
    • Changing Default Package install locations on Windows
      • Python (Pypi packages)
      • R (CRAN Packages)
      • Stata packages
  • Git
    • Git Sync
    • GitLab
  • Access & Security Groups
    • User Groups
    • Lifespan Staff Access
  • Multi-Protocol Access
    • Access Same Data from Windows and Linux Workstations
Powered by GitBook
On this page

Was this helpful?

  1. Access & Security Groups

Lifespan Staff Access

The following instructions are for authorized Lifespan staff attempting to access Stronghold workstations without the use of Brown's VPN

Hospital personnel inform LifeSpan network personnel they need to access Stronghold at Brown via the tunnel. They must provide their workstation IP address. If no action is required on LifeSpan's part to facilitate access to the tunnel on their end (e.g., firewall rules, tunnel entrance NAT), then LifeSpan's network personnel pass the user's IP address on to Brown's Network Technology Group (NTG).

NTG creates a one-to-one NAT for the LifeSpan user's IP to convert their 10-net address to Brown's use of the 10-net address space.

Once the NAT is assigned and implemented, NTG forwards the NAT IP to ISG for inclusion on the appropriate firewall rule for the specific tenant.

The network object in the firewall will be created using the name of the user associated with the IP address (e.g., WKSN_LifeSpan_JDoe) to maintain the association of identity with IP address.

The user should now have access to the workstation.

PreviousUser GroupsNextAccess Same Data from Windows and Linux Workstations

Last updated 5 years ago

Was this helpful?