ICT Documentation !Graveyard Network Device Guidelines

Network Device Guidelines

    Personal network devices can be used on the network; however, a few expectations must be met. These expectations are not listed solely for the purpose of controlling how personal property is used but instead to protect the SSIS’s network. Network devices include any networkable device someone brings to the SSIS campus. This may include a laptop, tablet PC, or smart phone. All devices on the network must be configured in such a way as to prevent problems. One incorrectly configured device can disrupt the entire network.


    The owner of the device is solely responsible for how the device is used regardless as to whether the owner or a borrower of the device is performing actions on it. The owner of the device is also solely responsible for the network configuration of the device.
    • The device is fit to be on the network. In other words, if the device has a poor quality network interface card or a corrupt operating system it could cause problems for other devices on the network.
    • The owner of the device understands how to set up the device for use on the network and owns all necessary equipment for setting up the device. Cables, network cards, dongles, and antennas cannot be borrowed from Saigon South International School.
    • The owner and all users of the device understand that no workstation will be disconnected from the network in order to provide a free drop for the device without prior permission. Remember that people doing academic work will have priority.
    • The owner of the device is responsible for the security of the device. Remember that devices have been stolen from Saigon South International School before.
    • The device is running the latest Virus Protection software including the latest updates to the virus definition files.
    • The device is running the latest Security Patches for its Operating System.
    • The device is free of spyware, adware, worms, viruses, trojan horses, and peer to peer software that could disrupt the network.
    • The device is not to be used for any illegal activity, peer to peer file sharing (including Kazaa, Limewire, Gnutella, BitTorrent, etc...), hacking or cracking this network or any other, downloading large files, or viewing (or listening) to streaming media.
    • The device is not running any Internet or web hosting services and does not have Internet Connection Sharing services turned on.

    General Steps to Putting a Device on the Network

    • Your device must have the TCP/IP protocol installed. It must be set to obtain an IP Address automatically from a DHCP server.
    • The computer name or host name for the device must be your network login name.
    • You must sign and complete this form and return it to ICT Department before connecting your device to the network. If you do not understand how to obtain this address see the attached "How to Locate Your Network Adapter Address."


    How to Locate Your Network Adapter Address

    For PC's/Windows

    1. Click Start on your task bar.
    2. Click Run.
    3. A box with the prompt Open will appear. Type in cmd.
    4. Click OK.
    5. A window will appear. At the command prompt, type in ipconfig /all. Note: there is a space between the G and the /.
    6. Press Enter.
    7. The NIC address will appear as 12 characters following the Physical Address. It should be listed under Ethernet Adapter Wireless Network Connection and Ethernet Adapter Local Area Connection.

    For Mac’s
    Click the Apple Icon in the upper left-hand corner of the screen.

    1. Click About This Mac.
    2. Click More Info.
    3. Click Network (located on the left side of the screen).
    4. Click on Airport on the top half of the window.
    5. The Adapter Address (Wireless/Airport) will appear as 12 characters in the lower pane following Mac Address.
    6. Click on Built-in Ethernet.
    7. The Adapter Address (Physical/Land) will appear as 12 characters in the lower pane following Mac Address.
    Page last modified 10:07, 6 Oct 2015 by dperkin


    You must login to post a comment.