Wireless Communication Policy
To explain that in order to safeguard the integrity of the computer network at Aberystwyth University only wireless systems that meet the criteria laid out below are approved for connectivity to AU networks. Access via unsecured wireless communication mechanism is prohibited.
These guidelines covers all wireless data communication devices (e.g., personal computers, mobile phones, PDAs, routers from rooms in halls etc.) connected to any of AU's internal networks. This includes any form of wireless communication device capable of transmitting packet data. Wireless devices without any connectivity to AU's network do not fall under the purview of this policy.
3.1 Register Access Points
All wireless Access Points and Base Stations connected to the AU network must be registered and approved by Information Services.
3.2 Approved Technology
It is important that departments, research projects, or individuals do not purchase wireless access points that are not appropriate for use at AU. In order to take advantage of the AU wireless service, and to integrate with existing wireless infrastructure at AU, careful consideration must be given to a number of factors:
- whether the equipment is standards-based and inter-operates with other equipment;
- the suitability of the location and the equipment for the use that is expected;
- the capacity of any network links and the network path to the rest of JANET;
- the physical security of the wireless access point;
3.3 Authentication and Encryption
All computers with wireless LAN devices must utilize either the corporate-approved Virtual Private Network (VPN) server, or Wi-Fi Protected Access (WPA) and be configured to drop all unauthenticated and unencrypted traffic. To comply with this policy, wireless implementations must maintain a high level of point to point encryption.
3.4 Setting the SSID
The SSID must be configured so that it does not contain any identifying information about the organization, such as the University name, employee name, or other identifier.
|VPN||A way to communicate through a dedicated server securely to a corporate network over the internet, over an un-secure network.|
|WPA||Is a secured protocol for 802.11 based networks.|
Information Services, Aberystwyth University, Hugh Owen Library, Penglais, Aberystwyth, SY23 3DZ
Tel: 01970 62 2400 Email: email@example.com