All university computing systems are, by default, inaccessible from outside of the campus network.
University security policies allow the Office of Information Technology to create firewall penetration for a given system (making that system accessible from off campus, either to all of the Internet, or exclusively from specific locations or IP addresses) if, upon evaluation, the risk associated with such penetration aligns with university standards. University faculty and staff may request firewall penetration for a specific system that they own or manage by providing all of the required information. The link below will take you to a login prompt for the Firewall Penetration Request Form.
Please consider using Firefox or Chrome to fill out the form, as there are problems with the most recent versions of Internet Explorer. You will receive an email when your request has been submitted: if you do not receive a confirmation email, it means that the form submittal was not successful.
Firewall Penetration Request Form