Submitted by: Submitted by ccom48
Views: 271
Words: 795
Pages: 4
Category: Science and Technology
Date Submitted: 02/24/2013 08:10 PM
Introduction to WAN Technologies with Lab
Week 7 February 21, 2009
Cleveland Satellite Office LAN/WAN Expansion.
Once the network between the Cleveland office and the Pittsburg Office is up and operating, network access rules will need to be established to both allow and prevent users from actions that would compromise the network security and operation. In addition, we’ll need to setup and implement a set of network management tools and processes to administer network operations and to provide uninterrupted network resources to users.
There must be a required set of procedures implemented to ensure proper usage of networked information, programs and facilities offered by the company. These rules involve user actions, computer software, and computer hardware. Practices that will not be permitted will include:
• Placing unlawful information on the Internet or with intent to commit a crime.
• Installing software that has not been authorized.
• Using the network or network resources to make copyrighted music, movies, or images available to others.
• Using the network to break into another node, server, or client PC.
• Offering advertising on a web page while providing accounts on your machine to others.
• Using the network to copy company owned or licensed software.
• Using the network for personal financial gain or allowing access to unauthorized persons.
• Performing activities that interfere with the ability of others to use the network.
• Streaming audio or video servers that are not owned and operated by the company.
• Proxy servers of any type will not be allowed.
• SMTP relaying will be prohibited.
• Non-company operated FTP servers will not be permitted.
• Tampering with company-owned computing equipment or wiring.
• LAN wiring may not be split, re-wired, or re-configured.
• Employee owned hubs, routers, switches, bridges, or other network hardware will not be allowed to connect to the network.
• Using network...