IT utilizes firewalls and routing protocols to protect the university's networks while permitting legitimate network traffic.
Firewalls inspect, filter and route network traffic based on a specific set of rules. These rules tell the firewall whether to permit or deny access to the network or computer, keeping out unauthorized users who may want to gain access to the information stored behind the firewall.
In some rare cases, these firewalls may be blocking legitimate network traffic and firewall routing rules may need to be adjusted.
Requesting Assistance
To request assistance with the university's firewalls or request a change, click Request Service to submit a service request.