Border Firewall Security Services
- Service Overview
- Eligibility & Costs
- Support, How-To’s & Info
The University of Arizona perimeter firewalls prevent unsolicited and often malicious internet traffic from entering the campus network.
By default, a small list of TCP/IP ports associated with frequently vulnerable services are blocked on the perimeter. Network managers can request a higher level of firewall protection, by setting up managed local firewalls or having their subnets blocked on the perimeter firewall.
Use the following forms to request changes to your frewalls, or to to request a new border or managed firewall if your building has been converted to MPLS.
Firewall Change Request
Request changes to existing firewalls
Network Operations Service Request
Select New Firewall Request for Buildings converted to MPLS
Available to University of Arizona registered network managers.
Contact the 24/7 Support Center
There is no downtime associated with configuring the new perimeter firewall rules. However, the new rules should be applied during non-peak hours, with the network manager and departmental IT staff available to test critical services after implementation.