Case Western Reserve University


Banned Programs, Servers, Protocols, and Services

Version: 1.3.2
Last Modified: 2010 February 18

All programs, services, servers, and protocols used on the Case network must comply with all applicable standards, must comply with all University policies, and must not interfere with proper operation of the network.

The following programs, servers, services, and protocols interfere with proper operation of the network or offer substantial potential for such interference. They are therefore forbidden on the Case network without prior approval from Technology Infrastructure Services (TIS).

This list may be amended by decision of the manager of TIS or an authorized representative.

  • Utilities:
    • KeyClient before version 4.2.06
    • HP JetAdmin before version 2.4.0
  • Games:
    • DOOM version 1.0
    • Spectre, all versions
  • Network services and equipment:
    • Software or hardware implementing hub/share-based peer to peer file sharing systems used for copyright infringement, such as clients for the Direct Connect and Advanced Direct Connect networks (e.g., DC++ and ADC++)
    • Routers (of ANY protocol)
    • DHCP servers
    • BOOTP servers
    • RARP servers
    • Proxy ARP servers
    • NDS trees
    • DNS (Domain Name System) servers
    • Novell servers
    • WINS (WIndows Name Service) servers
    • Remote access (dial-in) servers of any type (including, but not limited to, modems attached to computers which are connected to the Case network)
    • VPN (virtual private network) servers
    • News (Usenet) servers
    • Tunneling services
    • Wireless Access Points (sometimes called base stations)
    • Dedicated hardware firewalls (however, software firewalls such as ZoneAlarm, Norton Firewall, BlackIce, ipchains/iptables, ipfilter, etc. on individual systems are permitted and encouraged)
    • Any service or application which communicates using IP multicast without the prior express permission of TIS. With current client speeds, the use of multicast can easily overload parts of the network.
    • Unmanaged Ethernet switches and Ethernet hubs (repeaters) are permitted. Cabling between a system and the switch or hub must be entirely contained within the immediate room where the switch or hub is located.
  • Protocols:
    • IPX over layer 2 using a frame type other than Ethernet II
    • NetBIOS over IPX
    • NetBIOS over layer 2 (sometimes called NetBEUI)
    • Windows RAS (remote access services) protocols
  • General:
    • Any protocol, program, or server that makes heavy use of broadcast.
    • Any program, protocol, server, or service not listed above that is judged to interfere with network operations, or that creates substantial risk of interference with network operations. See The Rules for the Case network.

See also the ITS Acceptable Use Policy, which imposes additional restrictions on how various programs may be used on the Case network.

Note that some of the network services listed above are permitted on the Case network after consultation with TIS. You must consult with TIS before putting these services on the Case network.

To contact Technology Infrastructure Services, e-mail

For additional information and rules for many protocols and devices, including those listed above, see the Network Policies page.

Page Last Updated: Thursday February 18, 2010 at 10:01:56