Guidelines for Connecting Devices to the University Network
October 9, 2001
As outlined in the Information Stewardship Policy & Supporting Information Policies, the Tufts University network may only be used by authorized persons for university-related business in a manner consistent with University Information Technology Services (UIT) guidelines.
Because it is the responsibility of UIT to provide security, ensure appropriate use, and allocate access to network resources and bandwidth in an equitable manner, it has laid out several guidelines to help users understand the specifics regarding connecting devices to the network. These guidelines supplement the Information Stewardship Policies.
- Users may only connect to the network from those locations that UIT, or its designees, has specified as connectivity points: voice/data jacks or separate demarcation points. These connections are limited to end-point devices such as PCs, notebooks, workstations, printers, or other terminating devices.
- Users may not extend or modify the network in any way by installing devices such as repeaters, bridges, switches, routers, gateways, wireless access points, or permanent hubs. These devices extend a single network connection into additional unmanaged connection points and are thus prohibited unless specific permission has been obtained from UIT, or its designees.
- Users may not install mail servers without first discussing their project requirements with UIT. These devices can be used as open relays by outside e-mail firms and `spammers', making it appear that Tufts generated the mailing. Many firms block all e-mail from such originating organizations, putting Tufts at serious risk of e-mail service disruption and possible litigation. Any mail servers found not registered may be blocked by UIT staff.
- Users are encouraged to let UIT, or its designees, know when they install Web, application, music, or other types of servers or devices designed to provide file, print, application, or access services. UIT can assist with best practices and management issues involving security and maintenance.
- Users must use network services provided by UIT, or its designees, and not attempt to provision network services such as IP address assignment (i.e., DHCP servers), DNS, or other management services.
Any piece of equipment that is found in violation of these guidelines may be subject to immediate disconnection from the network and the owner/operator may be held liable for an infraction of the Information Stewardship Policies.