Texas Tech University.
TTU Home IT Division Telecommunications

Connecting to TTUnet

  1. Departments at Texas Tech University utilize Telecommunications Network Design & Installation Services to design, install, operate, and maintain the networks - cabled and WiFi - in all buildings. This includes special-purpose "private" networks as well as building networks that are connected to the TTUnet backbone and the Internet.
  2. Devices that may be connected to TTUnet:
    1. Must properly function in an Ethernet network.
    2. WiFi devices must support WPA2-Enterprise in order to connect to TTUnet.  Exceptions must be approved by the Managing Director of Telecommunications.
    3. Must accept DHCP network configuration information.  Exceptions must be approved by Telecommunications Network Operations Center prior to connection.
    4. Non-shared workstations and laptops must be registered to the primary user.
    5. Shared workstations, shared laptops, lab computers, servers, devices and appliances must be registered to appropriate department.
    6. Must comply with all IT Security policies and configuration standards.
    7. University owned computers running Windows, Mac OS, or Linux must be a member of the TTU.EDU Active Directory domain
    8. Shall be kept free of vulnerabilities.  The network security vulnerability management system will periodically scan all devices.  Should a vulnerability be reported the device owner will be given an opportunity to address the issue; should the vulnerability not be remediated in a timely manner, network access may be removed.
  3. Devices that may not be connected to the network include Ethernet hubs, switches, routers, proxy servers, VPN concentrators, firewalls, network address translators, wireless (WiFi) access points, and bridges.
  4. WiFi access points may not operate on the Texas Tech University campuses without the written consent of the Managing Director of Telecommunications.
  5. In order to preserve wireless capacity and ensure security, wireless network adapters may not be used in desktops or server systems in lieu of cabled connections.
  6. Systems that come under the Payment Card Industry Data Security Standard must complete the following connection steps:
    1. Submit a merchant request form including a risk assessment and completed self-assessment questionnaire.
    2. Submit an online port connection request via a project request form on http://www.net.ttu.edu.
    3. Complete a PCI data flow for each application to be hosted on the connected system.
    4. A completed firewall request form must be submitted if the system is Internet facing.
    5. Gain approval that the system is required to be in the PCIDSS network from the network security manager.
    6. A PCIDSS network port will be enabled at which time system must be registered with Bradford's Network Sentry.
    7. The system must pass both OS and application vulnerability scans.
    8. The TTU IT Security Committee must approve firewall request prior to implementation.
    9. The security staff will notify the PCI QSA of the new Internet facing server's IP address.