Policy Handbook

professor at blackboard 1
Affinity:

Wireless Network Security

CTS

WIRELESS NETWORK SECURITY
06/10/04 AMW

In an effort to allow further access to network resources, Network Services has extended services beyond the traditional copper and fiber connections through the integration of wireless networks. Upon the decision to integrate wireless on a wide-scale,security measures were taken to protect user integrity and privacy. With the current configuration users must first be authenticated via VPN before obtaining access to EagleNet. VPN provides a very secure tunnel through which data may then flow.Without this secure tunnel EagleNet is vulnerable to attacks from any computer with a wireless network adapter.

Because of this security risk it is imperative that each and every wireless accesspoint attached to EagleNet be secured. The current method of security requires special configurations in the network closets of each building providing wireless access.Because this security may not be administered by the end-user, the use of wireless access points without the permission of computer network support is strictly prohibited.

Remember that services may not be extended or retransmitted according to thepolicies agreed upon in the Ethical and Responsible Use of EagleNet documenthttp://services.juniata.edu/cts/forms/EthicalUse.pdf.

Juniata Network Services staff reserves the right to scan buildings for wireless access points. If a non-campus-owned access point is found, Network Services will disconnect the port servicing that wireless access point.

Guest Wireless access is available in specific areas to support connectivity needsfor guests of the college. This service is only intended for guests who are on campusattending specific college functions or using specific college services other than Internetconnectivity.


Search for policies:  

Click here to login as either a Faculty Member or Trustee in order to view additional policies.