Skip to main content
Sign In

IT Services, Information Technology Services


Firewall Penetration

Firewall Penetration Standard

All university computing systems are, by default, inaccessible from outside of the campus network.
University security policies allow the Office of Information Technology to create firewall penetration for a given system (making that system accessible from off campus, either to all of the Internet, or exclusively from specific locations or IP addresses) if, upon evaluation, the risk associated with such penetration aligns with university standards. University faculty and staff may request firewall penetration for a specific system that they own or manage by providing all of the required information. The link below will take you to a login prompt for the Firewall Penetration Request Form.
Please consider using Firefox or Chrome to fill out the form, as there are problems with the most recent versions of Internet Explorer. You will receive an email when your request has been submitted: if you do not receive a confirmation email, it means that the form submittal was not successful.


© The Regents of the University of Colorado, a body corporate. All rights reserved.

Accredited by the Higher Learning Commission. All trademarks are registered property of the University. Used by permission only.