Network Policy

From Carl R. Woese Institute for Genomic Biology - University of Illinois Urbana-Champaign
Jump to: navigation, search

IGB Network Responsibility Policy

In order for an orderly computing environment to exist, we at the IGB must come up with policies regarding its use and the responsibility of those who use it. If you have any questions about these policies, please contact us.This page changes often as new issues are brought to attention, so please check regularly for any new policies.

Operating System Updates

Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please examine our Frequently Asked Question (FAQ) pages.

Virus Scanning

We also have each contact person for a machine responsible for keeping an Anti-Virus program installed on a machine and kept up to date as it is not feasible for us to schedule time and then go to each machine on a weekly (or more frequent) basis. As viruses come out that we might think could be causing problems, we will notify the everyone@igb.illinois.edu mailing list regarding them. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please see our FAQ pages on how to use the campus provided anti-virus packages.

Switches, Routers, Access Points, and Hubs

Generally speaking, switches, routers, access points, and/or hubs are not allowed on the IGB network without the express written permission of the CNRG office. This is due to our required compliance with CITES regulations for the campus network, the fact that these devices will slow down the network for everyone else, difficulties this creates with backup, and difficulties they create in our need to track down problem machines on the network. On a temporary basis we will allow switches to be checked out from us on the condition that there is a sincere need, and that it is understood when the switch will be returned. Failure to comply with this policy will result in us removing the device and keeping it until a discussion with the appropriate professor or theme leader occurs

Network Cables

CNRG provides network cables in 5, 10, and 15 foot lengths. All non CNRG provided cables are strictly prohibited over the network because this can cause problems with the network. Network cables cannot be strung through ceilings, through walls, across doorways, or through walkways as this will cause problems on the the larger network or fire hazards. Failure to comply with this policy will result in us removing the network cable.

Existing Network Jacks

To reduce vulnerability to rogue machines on the network, all unused network jacks will be deactivated in the network closet. To get these jacks activated or to deactivate them when they are no longer in use, please e-mail CNRG the jack number and the room number where the jack is located.

New Network Jacks

Network jacks can be added virtually anywhere, but need to be paid for by the user or group requesting the jacks. The normal cost for each box with lines being added is $500 for the first line and $50 for each additional line although the actual value will vary as CNRG does not do the actual installation. If you would like a network jack installed, please contact CNRG.

Wireless Access Points

In order to ensure that the building-wide wireless network runs at optimum conditions and data is transferred securely through the building, private wireless access points are not allowed. If you are having difficulty with your wireless connection, please contact CNRG.

Web, FTP, and other Servers

Web, FTP, and other similar type servers are permitted on the IGB network so long as they do not generate a disproportionate amount of network traffic, are not involved in illegal activity, are kept secure, and do not contain content that contributes to an uncomfortable work environment.

Peer to Peer Software

The presence of installed peer to peer server software is strictly prohibited on the IGB network due to the normal presence of illegal activity that accompanies this software, the associated security risks created by these normally insecure programs, and the network bandwith that these take from the other IGB users. Clients that are only able to receive software are permitted so long as illegal activity does not occur. We will be checking for common open ports used by peer to peer software on our network.

Political Activity

It is illegal for anyone to use any services of the IGB for overt political activities; however, everyday discussion is permitted. For example, e-mailing a group of people to ask them to vote for a particular candidate, concerning a particular issue, or for get out the vote activities from a computer on the IGB network or using IGB servers is banned. Debating issues with a friend or asking them if he/she voted will be tolerated so long as it does not cause a problem.