Technical Policy Information

 Technical Policy Information

  1. Students should run operating systems that are still in primary support by the software supplier.
  2. All network devices should respond to a received ICMP Echo Request by replying with an ICMP Echo Reply. Note some firewall packages will block this behaviour by default these should be configured to allow ICMP echo traffic to pass.
  3. Running of port-scanners or similar software is prohibited.
  4. Promiscuous mode reception of network traffic is forbidden.
  5. IP or MAC address spoofing is forbidden. Systems must use IP addresses that are issued by the College.
  6. It is forbidden to emit email or news articles with false headers
  7. It is forbidden to emit email or news articles with headers advertising the client machine as a mail host. “From” and “Reply-To” fields should be an official host on which the user has an account or be an @cam.ac.uk address.
  8. Electronic mail may only be emitted via official SMTP servers in the @cam.ac.uk domain.
  9. Users machines are forbidden from saturating the network with traffic or issuing any other Denial of Service attacks.
  10. Only IP numbers issued by the College shall be used on the College network.
  11. Only DNS names issued by the College shall be used on the College network.
  12. Private DHCP, BOOTP, DNS, SMTP or NNTP servers are prohibited.
  13. IP packet forwarding is prohibited. This includes the use of Microsoft Windows Internet Connection Sharing or MacOS Internet Sharing (Note that this is default behaviour on some Linux distributions).
Maintained by David Scott | Last updated Wed, 8 May 2013 - 9:34am