Texas Tech University

Connecting to Texas Tech Networks

  1. Departments at Texas Tech University utilize Telecommunications Network Design & Installation Services to design, install, operate, and maintain the networks - cabled and WiFi - in all buildings. This includes isolated and connected special-purpose "private" networks as well as building networks that are connected to the TTUnet backbone and the Internet.
  2. Devices that may be connected to TTUnet:
    1. Must properly function in an Ethernet network.
    2. WiFi devices must support WPA2-Enterprise in order to connect to TTUnet.  Exceptions must be approved by the Director of Telecommunications.
    3. Must accept DHCP network configuration information.  Exceptions must be approved by Telecommunications Network Operations Center prior to connection.
    4. Non-shared workstations and laptops must be registered to the primary user.
    5. Shared workstations, shared laptops, lab computers, servers, devices and appliances must be registered to appropriate department.
    6. Must comply with all IT Security policies and configuration standards.
    7. University owned computers running Windows, Mac OS, or Linux must be members of the TTU.EDU Active Directory domain
    8. Shall be kept free of vulnerabilities.  The network security vulnerability management system will periodically scan all devices.  Should a vulnerability be reported the device owner will be given an opportunity to address the issue; should the vulnerability not be remediated in a timely manner, network access may be removed.
  3. Devices that may not be operated on Texas Tech University property include Ethernet hubs, switches, routers, proxy servers, VPN concentrators, firewalls, network address translators, wireless (WiFi) access points, and bridges.
  4. WiFi access points may not be operated on Texas Tech University property without the written consent of the Director of Telecommunications.
  5. In order to preserve WiFi capacity and ensure security, WiFi network adapters may not be used in desktops or server systems in lieu of cabled connections.
  6. Systems that come under the Payment Card Industry Data Security Standard must complete the following connection steps:
    1. Submit a merchant request form including a risk assessment and completed self-assessment questionnaire.
    2. Submit a Network Service Request for an online port connection.
    3. Complete a PCI data flow for each application to be hosted on the connected system.
    4. A completed firewall request form must be submitted if the system is Internet facing.
    5. Gain approval that the system is required to be in the PCIDSS network from the network security manager.
    6. A PCIDSS network port will be enabled at which time system must be registered with Bradford's Network Sentry.
    7. The system must pass both OS and application vulnerability scans.
    8. The TTU IT Security Committee must approve firewall request prior to implementation.
    9. The security staff will notify the PCI QSA of the new Internet facing server's IP address.


  • Address

    Texas Tech University, 2500 Broadway, Lubbock, TX 79409
  • Phone