Wireless Policy

1.0 Purpose

To explain that in order to safeguard the integrity of the computer network at Aberystwyth University only wireless systems that meet the criteria laid out below are approved for connectivity to AU networks. Access via unsecured wireless communication mechanism is prohibited.

2.0 Scope

These guidelines covers all wireless data communication devices (e.g., personal computers, mobile phones, hand-held devices, routers from rooms in halls etc.) connected to any of AU's network infrastructure. This includes any form of wireless communication device capable of transmitting packet data. Wireless devices without any connectivity to AU's network do not fall under the purview of this policy, however, to avoid any interference with AU approved equipment, approval needs to be granted by Information Services before purchase and installation.

3.0 Guidelines

3.1 Register Access Points

All wireless Access Points connected to the AU network must be registered and approved by Information Services.

3.2 Policy Restrictions

It is important that departments, research projects, or individuals do not purchase wireless access points that are not appropriate for use at AU. In order to take advantage of the AU wireless service, and to integrate with existing wireless infrastructure at AU, the following restrictions apply.

  • All new Access Points must be purchased via Information Services, in-line with AU current purchasing policy. Access Points must abide by all national regulations pertaining to wireless devices.
  • Any future request for installation of new Access Points must be directed through Information Services.
  • In line with the IT Regulations, Information Services has the right to disable any non-standard device which may cause interference with new or existing approved Access Points. The offending device may be removed without prior notice.
  • Proactive monitoring of the wireless network is undertaken by Information Services on a regular basis and any unauthorised Access Points will be removed from the network.
  • Wireless network radio spectrum must be carefully managed, and Information Services acts as the central management body in the regulating the installation and maintenance of all 802.11 wireless LANs within University premises.

3.3 Authentication and Encryption

All computers with wireless LAN devices must utilize Wi-Fi Protected Access 2 (WPA2) and be configured to drop all unauthenticated and unencrypted traffic. To comply with this policy, wireless implementations must maintain a high level of point to point encryption.

4.0 Roles and Responsibilities

4.1 Acceptance of Policies and Regulations

It is a condition of use of IT facilities provided by AU, by a student, member of staff or other authorised person, that the user agrees to be bound by the relevant University Policies and Regulations.

4.2 User Responsibilities

The following specific responsibilities apply to users of the University wireless network:

  • Users of the wireless network are responsible for their own computer equipment. The University accepts no responsibility for any loss or damage to your machine as a result of connection to the wireless network.
  • Users have the responsibility to ensure that they are running up to date antivirus software and that the operating system is fully patched with the latest service packs, and hot fixes.
  • Users will authenticate on to the wireless network for each session.

5.0 Definitions

Terms

Definitions

WPA2

Is a secured protocol for 802.11 based networks.