How Can We Help?

Firewall Rule Request in Tikit

You are here:
< All Topics

How submit a firewall rule request in Tikit

**NOTE** Only approved people will be allowed to successfully submit a firewall rule request. You will be allowed to submit the request in Tikit, but the ticket will automatically be denied, and your ticket will be closed. To request permission to submit firewall rules, open a separate ticket.

In teams, open the ITHelp Virtual Assistant (Or https://web.tikit.ai/requests if you do not use Teams) and enter “Firewall Rule” into the chat. The Virtual Assistant will respond with the following form,

A screenshot of a black box

Description automatically generated

Fill out the form and hit the submit button.

The key word “ANY” can be used in the IP and Port fields. However, this should be used only in certain cases if really needed (except the “Source Ports” field, which is almost always “ANY”). An adequate justification will be required if very permissive rules are needed.

  • Source IPs: A list of IP addresses or subnets where the traffic will originate.
  • Destination IPs: A list of IP addresses or subnets where the traffic needs to go (the machines to which you need to connect).
  • Source Ports: A list of TCP or UDP ports from which the source IPs will be connecting. Note that in almost all cases, this should be left as the default “ANY”.
  • Destination Ports: A list of TCP or UDP ports on the destination IPs (the ports on the destination IPs to which you need to connect). Please indicate TCP, UDP, or both TCP and UDP and not just the port numbers.
  • Protocols: The IP protocols that are needed on the destination IPs (the protocols on the destination IPs to which you need to connect). Note that these are not needed for TCP and UDP (see the destination ports field). This is for other protocols like ICMP (ping) and ESP/AH (IPSec).
  • CC List: List of emails separated by a semicolon (;). These are other people that need to be informed of the firewall request’s status other than the person that submitted the ticket.
  • Justification: A reason that the rule is needed. This must be a good justification that explains the need, or the request may be denied.
  • Removal checkbox: Check this box if requesting that rules matching the above information should be removed from all firewalls instead of being added to them. For example, if a server is decommissioned.

If you have access to submit a firewall rule request, your ticket will be entered, and you will receive an email notification that your ticket has been submitted. If you do not have access, you will receive an email notification that your ticket has been closed due to lack of permission.

5 out Of 5 Stars

1 rating

5 Stars 100%
4 Stars 0%
3 Stars 0%
2 Stars 0%
1 Stars 0%

Leave a Reply

Table of Contents