Texas Tech University

Connecting to Texas Tech Networks

  1. Exclusivity: Departments at Texas Tech University must utilize Telecommunications Network Design & Installation Services to design, install, operate, and maintain the networks - cabled and WiFi - in all buildings. This includes isolated and connected special-purpose "private" networks as well as building networks that are connected to the TTUnet backbone and the Internet.
  2. Bandwidth/Throughput Expectations:  TTUnet connections (backbone to building, intra-building, and wall outlet) are typically set to 1 Gbps maximum bandwidth deployed on multi-port switches.  Since these multiple 1 Gbps connections share the available bandwidth, the throughput of any given connected system is expected to be far less than 1 Gbps (e.g., 20-30 Mbps max throughput).  If your needs exceed these expectations, submit a Network Service Request to explore options and determine costs to suit your needs.
  3. Device Requirements: The following requirements must be met by all connected devices:
    1. Must properly function in an Ethernet network.
    2. WiFi devices must support WPA2-Enterprise in order to connect to TTUnet.  Exceptions must be approved by the Director of Enterprise Network Services.
    3. Must accept DHCP network configuration information.  Exceptions must be approved by Telecommunications Network Operations Center prior to connection.
    4. Must comply with all IT Security policies and configuration standards.
    5. University owned computers running Windows, Mac OS, or Linux must be members of the TTU.EDU Active Directory domain
    6. Shall be kept free of vulnerabilities.  The network security vulnerability management system will periodically scan all devices.  Should a vulnerability be reported the device owner will be given an opportunity to address the issue; should the vulnerability not be remediated in a timely manner, network access may be removed.
  4. Not Allowed: The following devices MAY NOT be operated at TTU locations without written approval of the Director of Enterprise Network Services:
    1. Network hubs or repeaters
    2. Network switches or bridges
    3. Network routers
    4. Proxy servers
    5. VPN concentrators
    6. Network Firewalls
    7. Network address translators
    8. Wireless (WiFi) access points
  5. WiFi Network Adapter Restriction: In order to preserve WiFi capacity and ensure security, WiFi network adapters may not be used in fixed devices (i.e., desktops, office equipment, or server systems) in lieu of cabled connections.
  6. Multicast Not Supported: TTU discourages the use of multicast (e.g., Apple AirPlay or Bonjour, Crestron NVX, etc.) and does not support its use.  Additional network resources are required to handle this protocol and have been found infeasible in TTU's enterprise network environment.  Multicast has been somewhat successful for wired network devices when limited to the local area network (LAN).  If your system needs involve multicast,  it should be tested prior to purchase and full deployment to ensure feature functionality.  Submit a Network Service Request to determine if your needs can be met along with any associated costs.
  7. A/V and Other Integrator Installed Systems: Some exceptional provisions have been put in place to handle integrator installed systems which  may incorporate network equipment.  Please refer to Communications Requirements for Integrator Installed Systems (A/V, lab equipment, etc.) for more details.
  8. PCIDSS Compliance: Systems that come under the Payment Card Industry Data Security Standard must complete the following connection steps:
    1. Submit a merchant request form including a risk assessment and completed self-assessment questionnaire.
    2. Submit a Network Service Request for an online port connection.
    3. Complete a PCI data flow for each application to be hosted on the connected system.
    4. A completed firewall request form must be submitted if the system is Internet facing.
    5. Gain approval that the system is required to be in the PCIDSS network from the network security manager.
    6. A PCIDSS network port will be enabled at which time system must be registered with Bradford's Network Sentry.
    7. The system must pass both OS and application vulnerability scans.
    8. The TTU IT Security Committee must approve firewall request prior to implementation.
    9. The security staff will notify the PCI QSA of the new Internet facing server's IP address.


  • Address

    Texas Tech University, 2500 Broadway, Lubbock, TX 79409
  • Phone