CWRU Network Policies - KBA 23417

All users should be adhere to UTech network and computer policies governing network activity.

Network games

In general, most games are permitted on the Case network. Games must comply with the same rules as all other network applications and must pose no risk of interference with other network operations. They must also comply with all other university policies, including ethics policies.

Student-provided network equipment, multiple IP addresses

Some students may wish to have more than one computer in their residence hall rooms, or may want to have other network devices, such as printers, in addition to their primary computer.

This is permissible with restrictions. Read restrictions and guidelines

Banned programs, servers, services, and protocols

Programs, servers, services, and protocols that interfere with proper operation of the network or offer substantial potential for such interference.


  • Any protocol, program, or server that makes heavy use of broadcast
  • Any program, protocol, server, or service not listed above that is judged to interfere with network operations, or that creates substantial risk of interference with network operations


  • KeyClient before version 4.2.06
  • HP JetAdmin before version 2.4.0


  • DOOM version 1.0
  • Spectre, all versions

Network services and equipment

  • Software or hardware implementing hub/share-based peer to peer file sharing systems used for copyright infringement, such as clients for the Direct Connect and Advanced Direct Connect networks (e.g., DC++ and ADC++)
  • Routers (of ANY protocol)
  • DHCP servers
  • BOOTP servers
  • RARP servers
  • Proxy ARP servers
  • NDS trees
  • DNS (Domain Name System) servers
  • Novell servers
  • WINS (WIndows Name Service) servers
  • Remote access (dial-in) servers of any type (including, but not limited to, modems attached to computers which are connected to the Case network)
  • VPN (virtual private network) servers
  • News (Usenet) servers
  • Tunneling services
  • Wireless Access Points (sometimes called base stations)
  • Dedicated hardware firewalls (however, software firewalls such as ZoneAlarm, Norton Firewall, BlackIce, ipchains/iptables, ipfilter, etc. on individual systems are permitted and encouraged)
  • Any service or application which communicates using IP multicast without the prior express permission of UTech. With current client speeds, the use of multicast can easily overload parts of the network.
  • Unmanaged Ethernet switches and Ethernet hubs (repeaters) are permitted. Cabling between a system and the switch or hub must be entirely contained within the immediate room where the switch or hub is located.
  • Protocols:IPX over layer 2 using a frame type other than Ethernet II
  • NetBIOS over IPX
  • NetBIOS over layer 2 (sometimes called NetBEUI)
  • Windows RAS (remote access services) protocol