Registration of devices (desktops, laptops, printers, IP phones, etc.) connecting to the Coral Gables campus network is required as of June 1, 2004.
This page addresses common questions concerning this initiative. If your question remains unanswered after reviewing the information on this page, contact the UM Telecom Help Desk or IT Security Department.
Frequently Asked Questions
What network devices must be registered?
The MAC address of any network device (desktop, laptop, printer, IP phone, etc.) attempting to use the Coral Gables campus network for Internet or departmental computing must be registered. Devices that have not been properly registered as of June 1, 2004 will be given a 7-day grace period to register or they will be denied access to the Coral Gables campus network.
What is a "MAC" address?
A MAC (Media Access Control) is one of the two addresses every networked device has; the other is an IP (Internet Protocol) address. The MAC address is unique and used in locating devices on the networks. It is usually coded into the NIC (Network Interface Card) of your computing device. Learn more about MAC's, IP's, and NIC's.
Does this affect users on other campuses?
Users at the Medical, RSMAS, or South campus are not affected by this initiative unless the user attempts to obtain Coral Gables network connectivity while on the Coral Gables campus. Vendors, visitors, faculty, or staff members must register all computing devices that attempt use of the Coral Gables campus network.
What do I need to do?
IT Security staff has been working with system administrators to register devices currently used by departments and vendors on campus. But just in case they have missed one, you should check with your system administrator to ensure that your device(s) have been properly registered.
How do I find out who is my system administrator?
Contact the UM Telecom Help Desk or IT Security Department.
More about MAC's, IP's, NIC's.
A NIC is a special hardware card within any networked device that handles all the technical aspects of sending and receiving data packets over a computer network. The MAC is the distinctive address that identifies a NIC to the rest of the world. Because a NIC's MAC address is permanent, it's often referred to as the "real", or "physical" address of the device.
Networking is possible because each of the networked devices has both a MAC address and an IP address. IP addresses route a data packet across the whole global Internet, while MAC addresses help the data packet make the small, local hop between hardware devices on the local networks within your home or office building.
Background: A stable and well functioning network is critical to the research, academic and service missions of the University. Information Technology (IT) Security has experienced increased numbers of computer intrusions which threaten the integrity of the Coral Gables campus network or can result in Denial of Service Attacks. These attacks can thwart the capacity of entire departments to teach, conduct research, or perform normal administrative functions, and can put sensitive data at risk of unauthorized disclosure. By maintaining a database of legitimate devices and using that database in the authentication process, IT Security can minimize opportunities for unknown devices to obtain network access, thereby reducing risks of harm and potential disruption to network performance. If you have questions or concerns concerning this procedure, contact email@example.com.
Purpose: The goal of this procedure is to document all computers and network devices using the University's network.
Procedure: All devices connecting to the to the Coral Gables campus network must be registered. Local Network/System Administrators or departmental computing staff have access to register devices.
Scope: This policy only applies to computers and network attached devices to the Coral Gables campus network.
Implementation: Local Network/System Administrators or departmental computing staff must register all computing devices (desktops, laptops, printers, IP phones, etc.). To register a device, an entry must be created in the AAA Database bearing information describing the device. Devices not registered in the AAA Database will not be allowed to connect to the Coral Gables campus network. Access to the AAA Database is restricted to Network/System Administrators.
AAADatabase: A computer database provided by IT Security where local System Administrators or departmental computing staffs maintain information concerning network devices in their computing environment such as IP address, user name and location, etc.
Denial of Service Attack: An attack where someone takes up so much of a shared resource that insufficient is left for others. Denial of service attacks threaten the availability of resources, including computer processes, disk space, or network capacity among other things. The result is a degradation or loss of service.
Local Network/System Administrators or departmental computing staff: Departments/Units at UM appoint departmental staff to provide information technology support to departmental computing functions.