Found Network Security Firewall Breach Request | Information Security | Information Technology | University of Denver

Network Security Firewall Breach Request

Only appointed faculty and staff of the University of Denver may request a firewall breach. Students and others who would like access through the firewall, must work with an appointed faculty or staff member who is willing to submit the request and be held accountable for the breach.

Your Name


Phone Number

Email Address

What is the purpose of this access?

If this breach will be needed for less than one year please enter the last date needed. *

Please Note: We will contact you, at a minimum, annually, to verify the continued need for any breach you request.

Describe the inside connection. (i.e., the connection on the DU network)

The DNS name of computer at DU

The computer's operating system

The application or software

The computer's IP Address

Tell us what protocols are needed. We recognize the names of most protocols. However, if you are working with special application software if you are aware of online documentation that describes the firewall requirements for the software, please include the URL(s) here.

Describe the outside connection(s). (i.e., the connection(s) coming from the Internet)
Where possible, we prefer to limit the connections to particular IP addresses or networks. If that is the case, please fill in this information.

Name of technical contact

Their e-mail address

Their phone number

Their location

The IP address(es) they will be connecting from and any other relevant information.

Terms and Conditions:

By submitting this form, I assert that I am a currently appointed faculty or staff member. I also have read understand the following:

  • I am asking Information Technology to create a breach in the University's Internet Firewall. I understand the security implications of this request and that I am responsible for the overall security of this system. I will practice accepted security procedures and apply appropriate security patches to the affected system(s) when they become available.
  • IT will perform regular checks of the port settings and security procedures of the server. I understand that the access through the firewall can be discontinued at any time, without notice, in the event that University Security Policies are not followed.
  • If there is evidence that the exposed system has been compromised or otherwise is determined to present a risk to the rest of the network, the system could be blocked from network access until the vulnerability has been identified, the compromise removed and additional procedures, configuration changes or patches have been introduced to prevent future related compromises.

If you have problems with this form, please email