Network Access Control helps cultivate a secure network by only allowing access to authorized users and devices for specific purposes. These access controls also ensure that all devices connecting to the network meet security requirements and prevent malware and other unwanted connections from moving between devices located on the same network segment. Network Access Control also provides administrators with greater visibility into locating suspicious or irregular network activity. This enables them to quickly identify and respond to potential security threats, such as unauthorized devices attempting to connect or malicious activity within the network.
Getting Started
Requests can be submitted from this page for any network devices that require additional settings or configuration changes to maintain functionality. This includes settings such as:
Requirements
When submitting a request, please have the host name of the device and the Media Access Control (MAC) Address. If a device needs to be placed in a specific network role, please provide the name of that network role in the request as well.
Additional Information
The ITS Sharepoint site contains several documents that detail procedures, best practices, troubleshooting methods, and diagrams for understanding the architecture of the network. Items include:
Support
For the most efficient support experience, please submit a ticket using the request form on this page. Alternatively, contact your campus Help Center location via email, by phone, or in person.