Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

There will be one central Domain Naming Service (DNS) for the entire University at Albany maintained by the Office of the CIOITS.

The Office of the CIO or designee ITS may assign ranges of IP addresses (subnets) within the 169.226 domain to organizational units of the University. Subnet owners agree to assign and manage addresses in compliance with these guidelines and any others that may be issued. Subnet owners agree to demonstrate and maintain the required technical expertise to manage their subnets.

...

All devices connected to the network shall have a single media access control address (mac address) per Ethernet card. Hubs, routers, switches and wireless access points not authorized by the Office of the CIO ITS are expressly forbidden.

Devices connecting to the University network must meet the following requirements:

...

Technical Coordinators (TC) may register devices on behalf of faculty, staff and students provided the user's name is entered appropriately in NetregNetReg. The registrant serves as the point of contact for any questions regarding network traffic originating from a device registered by them.

Hard-coded IP addresses within the subnet (DHCP) range can be entered for servers only, provided there is such a notation in the University Network Registration (NetregNetReg) comment field.

Static IP numbers within the DHCP range may be used to register desktop computers and printers.

Departmental firewalls and/or NAT devices may be installed with the assistance and approval of the Office of the CIO or designeeITS. Configuration and maintenance of departmental firewalls is the responsibility of the department. However, all NATted or firewalled systems must still be accounted for in NetReg.

Devices connected to the University network are subject to periodic scanning for known vulnerabilities.

The Office of the CIO ITS reserves the right to suspend the network access of any device connected to the network that represents a security threat, impedes the functioning of the network as a community resource, or is non-compliant with regulatory or legal requirements. Such suspension shall include notification to the registered user.

Info

Adopted: 2006
Revised: 2015

...


Include Page
footer
footer