The Macalester network may not be extended in any way other than by ITS Infrastructure staff. This means that only network access devices deployed by ITS may be used to access the Macalester network.

Misconfigured or mismanaged network access devices (aka “rogue” devices) sometimes mimic the actions of central network control equipment and prevent network access by other users of the network.

The response below to unauthorized devices will be immediate.

  1. Infrastructure staff identify the unauthorized device and the name of its owner. Infrastructure staff blocks the device’s network access. Because of the potential disruption posed by such devices, network access blocking must occur immediately.  Attempts to access resources other than the web will fail.

  2. Infrastructure staff notify the ITS Help Desk staff. ITS Help Desk staff member contacts the owner of the unauthorized device and refers them to this policy.

  3. If the device appears a third time its network access is blocked permanently.

Revised March 2016