This policy defines the types of devices may be connected to the University's computing network and those that are unauthorized.
Authorized network devices include:
You may not connect any device that provides network-to-network connection services. Some examples are:
This policy is designed to protect the viability of the University's computing network.
Questions regarding this policy should be addressed to: Jeff Springer, Network and Security Manager, Information Technology, Mail Stop 430, University of Nevada, Reno, NV 89557-0044, (775) 784-8247, email@example.com