This document sets forth the guidelines for using wireless technologies for data connectivity and identifies responsibilities for the deployment of wireless connectivity services and the administration of the wireless radio spectrum.  These guidelines describe how wireless technologies are to be implemented, administered and supported at the University of Arizona campus.  It supplements the guidelines in the CCIT Computer and Network Usage Policy by adding specific content addressing wireless data connectivity and the resolution of interference issues that might arise during use of specific frequencies.  The guideline couples the desire for campus constituencies to deploy wireless technologies with a central administrative desire to encourage all constituents to deploy such systems with an acceptable level of service quality and security. 


Wireless Ethernet systems and interface cards can be deployed at University of Arizona to support both administrative and academic applications. This document guides such deployments.  Guidelines for deployment of these systems are essential to:

1.       Prevent interference between different departmental implementations and other uses of the wireless spectrum

2.       Safeguard security of campus network systems

3.       To ensure that a baseline level of connection service quality is provided to a diverse user community.  


Scope of the Guideline

Telecommunications is responsible for providing a secure and reliable campus network to support the mission of the University. Under this broad responsibility, Telecommunications must foster campus-wide network standards (wired and wireless) to meet the networking requirements of all campus constituencies and limit access to network connections which do not conform to generally accepted standard network protocols and security measures.  The guidelines stated below deal with known concerns and in aggregate do not necessarily form a comprehensive guideline statement. Electronic communications is changing rapidly both in terms of technology and application, and additional guideline questions will surely arise in this area. This guideline, other relevant University of Arizona and system policies, and all applicable laws govern the use of electronic communications resources.


Scope of Service: This guideline defines the roles of the campus units and Telecommunications for deploying and administering the wireless infrastructure for the campus.


Network Reliability: In a wireless environment, network reliability is a function both of the level of user congestion (traffic loads) and service availability (interference and coverage).   In efforts to provide an acceptable level of reliability, this guideline establishes a method for resolving conflicts that may arise from the use of the wireless spectrum.  The campus approaches the shared use of the wireless radio frequencies in the same way that it manages the shared use of the wired network.  While the Center for Computing and Information Technology (CCIT) does not actively monitor use of the airspace for potential interfering devices, CCIT will respond to reports of specific devices that are suspected of causing interference and disrupting the campus network. Where interference between the campus network and other devices cannot be resolved, Telecommunications reserves the right to restrict the use of all wireless devices in university-owned buildings and all outdoor spaces.



Security: The maintenance of the security and integrity of the campus network requires adequate means of ensuring that only authorized users are able to use the network.  Wireless devices utilizing the campus wired infrastructure must meet certain standards to insure only authorized and authenticated users connect to the campus network and that institutional data used by campus users and systems not be exposed to unauthorized viewers.


Support: This guideline defines the responsibilities of campus units and centralized support organizations for the planning, deployment, management and development of wireless network equipment and services.  The guideline describes the responsibilities for Departments that want to provide wireless network facilities and the role of CCIT and Network Managers for ensuring the overall integrity of the campus network.  Guideline statements herein generally provide for Telecommunications to support the public accessible wireless environments on the campus and departments providing support for wireless networking within campus buildings used by departments.  However, Telecommunications may delegate responsibility for public accessible wireless environments where the public area is used exclusively by a campus department and may at the request of a department to provide support to the department under negotiated terms and conditions.






Access Point:  An access point is a piece of wireless communications hardware, which creates a central point of wireless connectivity.  Similar to a  “hub”, the access point is a common connection point for devices in a wireless network.  Access points can be used to connect segments of a LAN, using transmit and receive antennas instead of ports for access by multiple users of the wireless network.  Similar to standard wired “hubs”, access points are shared bandwidth devices that can be connected to the wired network via a Network Access Medium (NAM), allowing wireless access to the campus network.


Baseline Level of Connection Service Quality: The baseline level of connection service quality is determined by factors that can affect radio transmissions, such as distance from the access point, number of users sharing the bandwidth, state of the environment from which the transmission is taking place, and the presence of other devices that can cause interference. Acceptable throughput levels should be specified within service level agreements.


Coverage:  Coverage is the geographical area where a baseline level of wireless connection service quality is attainable.


Interference:  Interference is the degradation of a wireless communication signal caused by electromagnetic radiation from another source.  Such interference can either slow down a wireless transmission or completely eliminate it depending on the strength of the signal.


Privacy:  Privacy is the condition that is achieved when successfully maintaining the confidentiality of personal, student, and/or employee information.


Security:  Security not only includes measures to protect electronic communication resources from unauthorized access, but also includes the preservation of resource availability and integrity.


Wireless Infrastructure:  Wireless infrastructure refers to wireless access points, antennas, cabling, power, and network hardware associated with the deployment of a wireless communications network.







Responsibility for Wireless Access Points:  Campus responsibility for electronic communication resources resides with Telecommunications.  Telecommunications must approve all installations of wireless access points used on the campus.


  1. Wireless equipment and users must follow general communications guidelines. Wireless services are subject to the same rules and guidelines that govern other electronic communications services at UA. 


  1. Abuse or interference with other activities is a violation of acceptable use. Interference or disruption of other authorized communications or unauthorized interception of other traffic is a violation of guideline.


  1. Radio communication, due to its dependence on a scarce-shared resource, is subject to additional rules concerning interference and shared use.

a.       Wireless access points must meet all applicable rules of regulatory agencies, such as, the:

1.       Federal Communications Commission

2.       Arizona Corporation Commission

b.       Wireless access points must be installed so as to minimize interference with other RF activities described below.


  1. Only hardware and software recommended by Telecommunications shall be used for wireless access points. All implementations should meet Wi-Fi standards.


  1. Deployment and management of wireless access points in common areas of the campus must be coordinated with Telecommunications and Network Manager(s).  Common areas of the campus include, but are not limited to,

a.       Public access area and general conference room areas

b.       Open seating areas where members of the community may sit and work

c.       Cafes

d.       Lounges

e.       General Lecture halls

f.         Where wireless networks installed by two or more campus units might interfere

g.       Outside space where people meet/gather/study


  1. A department head or designee (i.e. Department Network Manager) is responsible for wireless access points within campus buildings used by the department.  Where more than one department share a common building, the department heads or designees may jointly share the responsibility for wireless access points in that building.


  1. Department heads or designees shall register any installation or changes, including moves, of wireless access points with Telecommunications.  This registration shall provide information requested by Telecommunications.

a.       Registration can be performed via a web form at http://wireless.arizona.edu

b.       Information about registered stations will be available to system administrators at http://wireless.arizona.edu


  1. Installation of Access Points

a.       Installation of antennas must comply with all federal and state regulations for antennas

b.       The installation of access points and bridging devices must be consistent with health, building, and fire codes.

c.       Equipment mounted on external structures must be approved prior to installation.

Security:  General access to the network infrastructure, including wireless infrastructure, will be limited to individuals authorized to use campus and Internet resources. Users of campus and Internet resources shall be authenticated.  Exhibit A contains further information on security architectures for wireless networks.


1.       Physical Security of wireless access points will be maintained to protect the access point from theft or access to the data port.

2.       Password and data protection is the responsibility of the application.  The wireless infrastructure may not provide specialized encryption or authentication that should be relied on by applications. In particular, no application should rely on IP address based security or reusable clear text passwords. It is expected instead that service machines will expect/require their own general or applications authentication, authorization and encryption mechanisms to be used by clients entering from any unprotected network.

3.      Access points should enforce user authentication at the access point before granting access to campus or Internet services.  Wireless network interfaces should support authentication to access the campus wireless network.

Interference:  Wireless networking equipment is a shared medium technology that uses the unlicensed frequency bands to create small local area network cells. These cells can be further linked together over an underlying wired network to create an extended wireless network covering whole buildings or wider areas. The success of any wide deployment wireless networking requires that all equipment that operate in the frequency spectrum to be carefully installed and configured to avoid physical and logical interference between components of different network segments and other equipment.

  1. In the event that a wireless device interferes with other equipment, Telecommunications shall resolve the interference as determined by use priority.
  2. The order of priority for resolving unregulated frequency spectrum use conflicts shall be according to the following priority list:

a.       Research

b.       Instruction

c.       Administration

d.       Public Access

e.       Personal


Suitability:  Wireless networks are not a substitute for wired network connections.  Wireless should be viewed as an augmentation to the wired network to extend the network for general purposed to common and transient areas.

  1. Wireless is appropriate for “common areas” where students, staff, and faculty gather.  Common areas most appropriate for wireless use include but not limited to, instructional labs, public areas, and research labs.
  2. Wireless networking is most applicable for uses such as email and web browsing.  Unless using encrypted protocols, wireless devices should not be used for connecting to campus business systems such human resources, payroll, student information, financial information systems, or other systems that contain sensitive information or are critical to the mission of the University.
  3. Wireless access points provide a shared bandwidth.  As the number of users increase the available bandwidth per user diminishes.  Before deploying wireless networking in common areas, the advice of Telecommunications should be sought regarding the ratio of users to access point.
  4. New plans for buildings and gathering areas should consider the need for and use of wireless networking, similar to the planning done currently for wired networking.
  5. Users of wireless should consider all unencrypted communications over the network as insecure and available and all content as clear text.






·        Responsible for creating/maintaining/updating wireless communications guidelines and wireless security standards.

·        Responsible for maintaining a registration of all wireless networks and access points on campus.

·        Responsible for resolving wireless communication interference problems.

·        Responsible for coordinating and approving wireless communications systems in common areas of the campus.

·        Responsible for recommending wireless communication hardware and software used by campus depts.

·        Responsible for coordinating departmental installations of wireless communication systems/access points.

·        Responsible for creating/maintaining/updating wireless communication network security guidelines.

·        Responsible for informing wireless users of security and privacy guidelines & procedures related to the use of wireless communications.

·        Responsible for monitoring performance and security of all wireless networks within public common areas and maintaining network statistics as required to prevent unauthorized access to the campus network.

·         Responsible for monitoring the development of wireless network technologies, evaluating wireless network technology enhancements and, as appropriate, incorporating new wireless network technologies within the University of Arizona network infrastructure.

Campus Units

·        Responsible for adhering to Wireless Communications Guidelines.

·        Responsible for managing access points within departmental space and assuring proper network security is implemented.

·        Responsible for registering wireless access point hardware, software & deployments with Telecommunications.

·        Responsible for informing wireless users of security and privacy guidelines & procedures related to the use of wireless communications.

·        Responsible for monitoring performance and security of all wireless networks within departmental control as required to prevent unauthorized access to the campus network.


1.       The University of Arizona Manual of Design and Specification Standards

2.       CCIT Computer and Network Usage Guideline

3.       NFPA 70, National Electrical Code

4.       Federal Communications Commission Regulations, Part 15




** This policy document is subject to review and changes as technology in wireless communications changes over time.
Exhibit A

Draft Wireless Security Standards


1)   Introduction

The use of wireless network technology must not reduce the availability, integrity and confidentiality of critical and essential applications and/or the University of Arizona computing network.  Accordingly, any implementation of wireless network systems at University of Arizona should comply with the security standards described below for authentication, monitoring, reporting and user awareness. Due to the lack of privacy of network communication over existing wireless network technology, all wireless traffic is presumed to be insecure and susceptible to unauthorized examination. 



2)   Authentication

Access to wireless network connectivity should be limited to authenticated users and authorized wireless client devices.  Authentication may be performed based on the following requirements:

a)       All authorized wireless network users will be required to be authenticated and operate through the campus VPN.

b)       All authorized wireless network users must register the MAC address of the wireless network interface card (NIC) to the local or campus Dynamic Host Configuration Protocol (DHCP) service.

c)       Wireless NICs and user accounts are not to be shared. (See Network Usage policy)


d)       Users are prohibited from using wireless network technology to access critical and essential applications without the wireless network connections being appropriately encrypted.



3)   Security Awareness

All wireless network managers should be aware of the following issues:     

a)       Authentication for wireless network access and protection of passwords

b)       Authorized use of wireless network technology

c)       Wireless interference issues

d)       Privacy limitations of wireless technology

e)       Report wireless network service problems

f)         Respond to a suspected privacy violation

g)       Revoke DHCP registration due to termination of an affiliation with University of Arizona



4)   Monitoring and Reporting

The use of wireless network technology is to be monitored on a regular basis for security and performance. 


·         Authentication, authorization and usage and wireless network performance reports are to be made on an individual basis

·         Any unusual wireless network event that may reflect unauthorized use of wireless network services will be immediately reported by the wireless system administrator to the campus Security Incident Response Team (SIRT) for review and, if appropriate, investigation.