Firewalls – How to Request and Manage Network Security at UofL

Before You Begin

Review UofL firewall policies and compliance standards.
Know your system or application details before submitting a request.

Objective or Task

Learn how to request new firewall rules or changes to existing firewall rules for UofL systems.

Instructions

Request Firewall Services

  • Submit a firewall request for new rules or changes via the Firewall Service Request Form.
  • Provide system details, justification and required protection level.

Review and Approval

  • ITS reviews all firewall requests to ensure campus-wide security.
  • Custom firewall requests may incur additional costs.

Remove Firewall Exception Rule

  • When decommissioning a system or no longer needing a rule, submit a Firewall Rule Removal Request.

Outcome

After completing these steps, your firewall request will be reviewed and implemented to protect your system and the university network.

Further Readings

Need Additional Help

• Contact the ITS HelpDesk: Call 502-852-7997 during business hours:

o Monday through Thursday: 6:00am – 10:00pm
o Friday: 6:00am – 5:00pm
o Saturday: 7:00am – 5:00pm
o Sunday: 10:00am – 10:00pm
o University Holidays: 7:00am – 5:00pm
o Closed on Thanksgiving, the day after Thanksgiving, and Christmas.
o If you have an emergency during off hours, call the HelpDesk to be transferred to an on-call technician, or leave your request on voicemail. Your call will be returned the next day starting at 7am unless you specify a time.

 Live Chat: Chat with the ITS HelpDesk at https://apps.louisville.edu/it/livechat/phplive.php during business hours.

• Submit a Ticket: Use the self-service portal at http://service.louisville.edu to log requests or check the status of existing tickets.

• In-Person Support: Visit the iTechConnect 1:1 help located on the lower level of the Miller Information Technology Center, Belknap Campus, during business hours.

Print Article

Related Services / Offerings (1)

We protect the university's network by using firewalls to block unauthorized access. Some approved exemptions are given to those who have need for a new firewall rule or changes to existing firewall rules. For systems needing additional protection, custom firewall rules can also be requested. The Network and Connectivity Management form can be used to request SSL/TLS Certificates.