connect. communicate. collaborate.

Firewall Management

Firewalls provide protection against outside attacks by shielding your computer or network from malicious or unnecessary Internet traffic.

ITSO offers firewall management and design for the University community to ensure firewalls are deployed according to industry standards and best practices. We will work with your existing infrastructure or recommend replacements for your existing firewall infrastructure with advanced technologies that are visible or invisible to the hosts on the network. Also, we can assist you in rule base configuration according to specific policies and guidelines that your department has in place to meet.

A network housing sensitive or private data should be protected by firewalls and placed on a separate network segment. These segments often are based on security levels and allow for various security and monitoring levels. We will assist you in determining the best solution for your business requirements.

Please contact ITSO if you are interested in hearing more about how we can assist your department in developing, deploying or managing firewalls to increase your security posture.

What Do Firewalls Do?

Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet traffic. Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through. They are especially important for users who rely on "always on" connections such as cable or DSL modems.

What Type of Firewall is Best?

There are two types of firewalls: hardware (external) and software (internal). While both have advantages and disadvantages, the decision to use a firewall is far more important than deciding which type you use.


Typically called "network firewalls," these external devices are positioned between your computer or network and your cable or DSL modem. Many vendors and some Internet Service Providers (ISPs) offer devices called "routers" that also include firewall features. Hardware-based firewalls are particularly useful for protecting multiple computers but also offer a high degree of protection for a single computer. If you only have one computer behind the firewall, or if you are certain that all of the other computers on the network are up to date on patches are free from viruses, worms, or other malicious code, you may not need the extra protection of a software firewall. Hardware-based firewalls have the advantage of being separate devices running their own operating systems, so they provide an additional line of defense against attacks. Their major drawback is cost, but many products are available for less than $100 (and there are even some for less than $50).


Most operating systems include a built-in firewall that is enabled by default. Leave it enabled, as it adds an additional layer of protection behind even if you have a hardware firewall. 3rd party vendors offer more feature-rich software firewall options. If you want more visibility into and control over your firewall settings, consider purchasing a reputable software-based firewall application.

Although relying on a software firewall alone does provide some protection, realize that having the firewall on the same computer as the information you're trying to protect may hinder the firewall's ability to catch malicious traffic before it enters your system.

How Do I Know What Configuration Settings to Apply?

Most commercially available firewall products, both hardware- and software-based, come configured in a manner that is acceptably secure for most users. Since each firewall is different, you'll need to read and understand the documentation that comes with it in order to determine whether or not the default settings on your firewall are sufficient for your needs. Additional assistance may be available from your firewall vendor or your ISP (either from tech support or a web site). Also, alerts about current viruses or worms (such as US-CERT's Cyber Security Alerts) sometimes include information about restrictions you can implement through your firewall.

Unfortunately, while properly configured firewalls may be effective at blocking some attacks, don't be lulled into a false sense of security. Although they do offer a certain amount of protection, firewalls do not guarantee that your computer will not be attacked. In particular, a firewall offers little to no protection against viruses that work by having you run the infected program on your computer, as many email-borne viruses do. However, using a firewall in conjunction with other protective measures (such as antivirus software and "safe" computing practices) will strengthen your resistance to attacks.

KU IT on Twitter  KU IT on Facebook  KU IT on Google Plus


WOW customers are currently experiencing problems accessing KU resources. Access through other internet service providers appears to be working normally.

Technology Help

Call KU IT Customer Support

Phone support

Email KU IT Customer Support
Support via Email

Faculty/Staff Support

Faculty/Staff Support
Technology Support Centers

KU IT Knowledge Base

Knowledge Base
FAQs & More

Virtual Service Desk

Virtual Service Desk
Online Help

Comments or ideas on how we can serve you better? Send us your feedback!

One of 34 U.S. public institutions in the prestigious Association of American Universities
Nearly $290 million in financial aid annually
44 nationally ranked graduate programs.
—U.S. News & World Report
Top 50 nationwide for size of library collection.
23rd nationwide for service to veterans —"Best for Vets," Military Times
KU Today