Wireless Communication Policy

1.0 Purpose

To explain that in order to safeguard the integrity of the computer network at Aberystwyth University only wireless systems that meet the criteria laid out below are approved for connectivity to AU networks. Access via unsecured wireless communication mechanism is prohibited.

2.0 Scope

These guidelines covers all wireless data communication devices (e.g., personal computers, mobile phones, PDAs, routers from rooms in halls etc.) connected to any of AU's internal networks. This includes any form of wireless communication device capable of transmitting packet data. Wireless devices without any connectivity to AU's network do not fall under the purview of this policy.

3.0 Guidelines

3.1 Register Access Points

All wireless Access Points and Base Stations connected to the AU network must be registered and approved by Information Services.

3.2 Approved Technology

It is important that departments, research projects, or individuals do not purchase wireless access points that are not appropriate for use at AU. In order to take advantage of the AU wireless service, and to integrate with existing wireless infrastructure at AU, careful consideration must be given to a number of factors:

  • whether the equipment is standards-based and inter-operates with other equipment;
  • the suitability of the location and the equipment for the use that is expected;
  • the capacity of any network links and the network path to the rest of JANET;
  • the physical security of the wireless access point;

3.3 Authentication and Encryption

All computers with wireless LAN devices must utilize either the corporate-approved Virtual Private Network (VPN) server, or Wi-Fi Protected Access (WPA) and be configured to drop all unauthenticated and unencrypted traffic. To comply with this policy, wireless implementations must maintain a high level of point to point encryption.

3.4 Setting the SSID

The SSID must be configured so that it does not contain any identifying information about the organization, such as the University name, employee name, or other identifier.

4.0 Definitions

Terms Definitions
VPN A way to communicate through a dedicated server securely to a corporate network over the internet, over an un-secure network.
WPA Is a secured protocol for 802.11 based networks.