Skip to main content
Main content

Network Border Firewall Security Policy

Computing devices attached to the campus network are protected by a network firewall that can block unwanted or malicious traffic from the internet. The firewall protections vary according to the firewall policy zone in which a device is placed. All devices are protected by a Baseline policy which blocks the highest severity incoming threats. Other available zones include the Protected zone, which blocks all unsolicited incoming traffic, and a Server zone, which offers high protection appropriate for servers. All zones allow outbound traffic except for a few services that are disallowed by best practice.

All zones are designed to provide protections appropriate for how a device is used. View detailed descriptions of the zones.

In response to an increase in ransomware attacks, the University requires the use of the Virtual Private Network (VPN) for off-campus use of remote access protocols. Remote access protocols are tools, platforms, or services that allow you to virtually access a remote computer (e.g., connecting to a desktop computer on campus from a computer at home). Common examples include SSH, RDP, and VNC. These remote protocols are often entry points for cyberattacks.

VPN software provides additional security, including multi-factor authentication, to protect remote protocols. Resources are available to get started with the University VPN (cVPN).