Difference between revisions of "Network Policy"
(→Political Activity) |
(→Operating System Updates) |
||
Line 5: | Line 5: | ||
=== Operating System Updates === | === Operating System Updates === | ||
− | Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please examine our Frequently Asked Question (FAQ) pages | + | Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please examine our Frequently Asked Question (FAQ) pages. |
=== Virus Scanning === | === Virus Scanning === |
Revision as of 09:17, 7 May 2014
Contents
IGB Network Responsibility Policy[edit]
In order for an orderly computing environment to exist, we at the IGB must come up with policies regarding its use and the responsibility of those who use it. If you have any questions about these policies, please contact us.This page changes often as new issues are brought to attention, so please check regularly for any new policies.
Operating System Updates[edit]
Here at the IGB we generally have each person responsible to keep their operating system up to date with the current security patches provided by the manufacturer as it is not feasible for us to schedule time and then go to each machine on a weekly basis to check for these updates. For extremely critical updates, we will remind the everyone@igb.illinois.edu mailing list that updates are available. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please examine our Frequently Asked Question (FAQ) pages.
Virus Scanning[edit]
We also have each contact person for a machine responsible for keeping an Anti-Virus program installed on a machine and kept up to date as it is not feasible for us to schedule time and then go to each machine on a weekly (or more frequent) basis. As viruses come out that we might think could be causing problems, we will notify the everyone@igb.illinois.edu mailing list regarding them. Depending on the situation, failure to comply with this policy can result in your network connection being terminated at least temporarily. If you have questions about how to do this, please see our FAQ pages on how to use the campus provided anti-virus packages. Switches, Routers, Access Points, and Hubs
Generally speaking, switches, routers, access points, and/or hubs are not allowed on the IGB network without the express written permission of the CNRG office. This is due to our required complience with CITES regulations for the campus network, the fact that these devices will slow down the network for everyone else, difficulties this creates with backup, and difficulties they create in our need to track down problem machines on the network. On a temporary basis we will allow switches to be checked out from us on the condition that there is a sincere need, and an understood short period of them when the switch will be returned. Failure to comply with this policy will result in us removing the device and keeping it until a descussion with the appropriate professor or theme leader occurs
Network Cables[edit]
CNRG provides network cables in 5, 10, and 14 foot lengths. All non CNRG provided cables are strictly prohibited over the network because this can cause problems with the network. Network cables cannot be strung through ceilings, through walls, across doorway, or through walkways as this will cause problems on the the larger network or fire hazards. Failure to comply with this policy will result in us removing the network cable.
Existing Network Jacks[edit]
To reduce vulnerability to rogue machines on the network, all unused network jacks will be deactivated in the network closet. To get these jacks activated or to deactivate them when they are no longer in use, please e-mail the jack number and the room number the jack is into CNRG.
New Network Jacks[edit]
Network jacks can be added virtually anywhere, but need to be paid for by the user or group requesting the jacks. The normal cost for each box with lines being added it $500 for the first line and $50 for each additional line although the actual value will vary as CNRG does not do the acutal installation. If you would like a network jack installed, please contact CNRG.
Web, FTP, and other Servers[edit]
Web, FTP, and other similar type servers are permitted on the IGB network so long as they do not generate disporportionate amount of network traffic, are not involved in illegal activity, are kept secure, and do not contain content that contributes to an uncomfortable work environment
Peer to Peer Software[edit]
The presence of installed peer to peer server software is strictly prohibited on the IGB network due to the normal presence of illegal activity that accompanies this software, the associated security risks created by these normally insecure programs, and the network bandwith that these take from the other IGB users. Clients that are only able to recieve software are permitted so long as illegal activity does not occurr. We will be checking for common open ports used by peer to peer software on our network.
Political Activity[edit]
It is illegal for anyone to use any services of the IGB for overt political activities. However everyday discussion is permitted. For example, e-mailing a group of people to ask them to vote for a particular candidate, concerning a particular issue, or for get out the vote activities form a computer on the IGB network or using IGB servers is banned. Though debating issues with a friend or asking them if he/she voted will be tolerated so long as it does not cause a problem.