Network Access Control

Zoom logoNetwork Access Control helps cultivate a secure network by only allowing access to authorized users and devices for specific purposes. These access controls also ensure that all devices connecting to the network meet security requirements and prevent malware and other unwanted connections from moving between devices located on the same network segment. Network Access Control also provides administrators with greater visibility into locating suspicious or irregular network activity. This enables them to quickly identify and respond to potential security threats, such as unauthorized devices attempting to connect or malicious activity within the network.

Getting Started

Requests can be submitted from this page for any network devices that require additional settings or configuration changes to maintain functionality. This includes settings such as:

Requirements

When submitting a request, please have the host name of the device and the Media Access Control (MAC) Address. If a device needs to be placed in a specific network role, please provide the name of that network role in the request as well.

Additional Information

The ITS Sharepoint site contains several documents that detail procedures, best practices, troubleshooting methods, and diagrams for understanding the architecture of the network. Items include:

Support

For the most efficient support experience, please submit a ticket using the request form on this page. Alternatively, contact your campus Help Center location via email, by phone, or in person.

 

 
Request Firewall Rule Request Network Authentication

Related Articles (3)

Instructions for connecting to the eduroam Wi-Fi network.
This article helps explain how to register a device in the University of Nebraska IoT Portal
This article provides answers to the most commonly received questions about the VPN service.

Service Offerings (2)

Network Firewall
Network firewalls monitor and control inbound and outbound traffic, acting as a barrier between trusted internal network segments and untrusted external networks. Firewalls prevent unauthorized access and block potential threats by filtering data packets based on predetermined security rules.
Network Access & Authentication
Network authentication is the process of verifying the identity of a user or device attempting to access a network. Requests can be submitted to allow compliant devices to authenticate at specific network levels, based on use-case.