General Configuration Requirements Sample Clauses
General Configuration Requirements. 1. All traffic between the corporate production and the lab network must go through a Network Support Organization maintained firewall. Lab network devices (including wireless) must not cross-connect the lab and production networks.
2. Original firewall configurations and any changes thereto must be reviewed and approved by Information Technology Security. Information Technology Security may require security improvements as needed.
3. Labs are prohibited from engaging in port scanning, network auto-discovery, traffic spamming/flooding, and other similar activities that negatively impact the corporate network and/or non-University of Louisiana at Lafayette networks. These activities must be restricted within the lab.
4. Traffic between production networks and lab networks, as well as traffic between separate lab networks, is permitted based on business needs and as long as the traffic does not negatively impact on other networks. Labs must not advertise network services that may compromise production network services or put lab confidential information at risk.
5. Information Technology Security reserves the right to audit all lab-related data and administration processes at any time, including but not limited to, inbound and outbound packets, firewalls and network peripherals.
General Configuration Requirements. 1. University mission critical resources must not depend upon resources not managed by the Information Technology Division.
2. Facilities not managed by the Information Technology Division must not be connected to University of Louisiana at Lafayette's internal or confidential networks, either directly or via a wireless connection.
3. Facilities not managed by the Information Technology Division should be in a physically separate room from any internal or internal secure network ports. When this is not possible, access to the facility hardware will be limited as directed by Information Technology Security.
4. Lab Managers are responsible for complying with the following related policies:
a. Password Policy
