Firewall rules and changes are approved by the University Technology Services (UTS) Security Advisory Group (SAG) and implemented by the UTS Security Team.
This wiki covers key aspects of firewall requests and provides information to assist in composing a firewall request.
Firewalls are systems that monitor and control network traffic based on predetermined rules in order to establish security barriers. A common characteristic of firewalls are to only allow approved, legitimate traffic on the network.
By default, University firewalls are configured to block all traffic, therefore firewall requests typically involve identifying what connectivity should be permitted to a server / application.
Firewall changes can be initaited by completing and submitting the appropriate electronic form located on the forms page. On the page scroll down to section "F" and select the "Firewall Change Request Form".
If you need assistance, or have questions you may create a firewall consultation ticket by sending an email to [email protected] .
There are different fields to fill out to complete the form. In order to submit a request all boxes in red must be filled out.
The type of request helps categorizes the request and aids in the process all together. The type also defines the path to completion as only certain 'New' and 'Modify' requests have to be approved by the Security Advisory Group (SAG).
Fill out what firewall rules you want to be implemented. To add a firewall rule, select the plus that is in the red circle in the image below. The trash can icon is how you remove a rule from your list.
input firewall rules" />
.