ResNet Security Standards

1.0 Overview
This standard defines terms and procedures that are important for understanding the proper use of ResNet.

2.0 Purpose
The purpose of this standard is to provide all ResNet users the appropriate information to abide by the ResNet Use policy.

3.0 Scope

This standard addresses ResNet use only. All other Murray State University networks are bound by other policies and standards.

4.0 Standard

4.1 Connection Requirements 
All computers connected to ResNet must meet the minimum requirements that are enforced through a Network Access Control (NAC) System.  Some of these minimum requirements:  
  • Supported Operating Systems
  • Antivirus/spyware protection with up to date definitions
  • Updated Operating System Service packs and patches
For a full list of supported software, users can click here.

All computers must also abide by the following rules:
  • Users must install the NAC client application
  • Users must use Murray State's DHCP and DNS servers
The following list, while not complete outlines some of the items that are strictly prohibited on ResNet:
  • Hubs/switches
  • Routers
  • Wireless access points
  • DHCP servers
  • DNS servers
  • Proxy servers
  • Port scanners
  • Vulnerability scanners
  • Key loggers
  • Network sniffers
4.2 Alternative Connections 
Users deciding to purchase any type of connection, other than ResNet, must first fill out the Alternative Connection Form and submit it to Information Systems for approval. Once approved, the users must then abide by the following standards:

  • Users may not bridge their alternative connection with ResNet
    • This includes plugging in a switch, router, hub, etc from the external connection and then also plugging into ResNet
  • Users must still abide by the Wireless Communication Policy, which states no one outside of Information Systems is allowed to install any wireless communication equipment
5.0 Definitions
Network Access Control (NAC)

Is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.


6.0 Revision History

Comments