Netopsman v1 4 - 2015
Netopsman v1 4 - 2015
Netopsman v1 4 - 2015
Operations
Manual
Prepared
by:
IT
Architecture
and
Infrastructure
The
University
of
Texas
at
Austin
Committee
Office
of
the
Chief
Information
Officer
Document
Version:1.4
Last
Edited:
4/21/2014
1. Purpose
The
Network
Operations
Manual
defines
roles,
responsibilities,
minimum
network
standards,
and
operational
requirements
for
all
university
networks
as
required
by
the
University
of
Texas
at
Austin
Information
Resource
Use
and
Security
Policy,
sections
16
and
17.
It
is
the
responsibility
of
the
University
of
Texas
at
Austin
to:
• Operate
reliable
networks
with
appropriate
redundancies
in
order
to
meet
minimum
standards.
• Designate
operational
responsibility
for
the
university’s
networking
infrastructure
to
Information
Technology
Services
(ITS)
Networking
and
Telecommunications
(henceforth,
ITS
Networking).
• Assign
Network
Custodians
to
be
accountable
for
Unit
networks.
• Centrally
maintain
accurate
records
of
all
networked
equipment
and
all
network
use
by
individuals
or
devices.
• Monitor
network
activities
in
accordance
with
Network
Monitoring
Guidelines.
• Approve
all
means
of
network
access,
connectivity,
and
configuration.
• Offer
a
process
to
allow
Units
to
file
requests
for
exceptions
(see
section
7.
Exceptions/Adjudications).
3. Audience
The
Network
Operations
Manual
is
primarily
intended
for
Network
Custodians
and
ITS
Networking.
It
also
provides
guidance
for
all
individuals
who
may
be
authorized
to
connect
to
any
University
of
Texas
at
Austin
network,
such
as,
but
not
limited
to,
faculty,
students,
staff,
contractors,
and
vendors.
These
users
may
be
concerned
with
roles
(section
4.3)
and
minimum
network
standards
(section
5).
4.3 Faculty,
Students,
Staff,
Official
Visitors,
Affiliates
and
others
granted
network
access:
4.3.1 Must
follow
the
Information
Resource
Use
and
Security
Policy.
4.3.2 Must
adhere
to
all
network
access
rules.
4.3.3 Must
not
extend
university
networks
by
any
means,
including,
but
not
limited
to
using
routers/switches/hubs,
physical
or
logical
wireless
mechanisms,
tunnels,
or
other
methods,
without
authorization
from
Unit
network
personnel
or
ITS
Networking.
4.3.4 Must
not
engage
in
activities
placing
network
operations
in
jeopardy.
*Assuming
any
cable
repair
does
not
require
construction
or
re-‐pulling.
6.2.5.1 Installations
not
following
ITS
Networking
recommendations
will
have
an
SLA
of
“Best
Effort”,
and
initial
response
during
business
hours.
Examples
include:
not
meeting
minimums
(e.g.
single
uplinks),
lack
ITS
Networking
unescorted
access,
equipment
past
recommended
lifecycle
(e.g.
Building
Report
Card
notice),
poor
support
facilities
(e.g.
inadequate/unreliable
cooling/power,
UPS
without
failover
switch
5.2.3.5),
remote
circuits
provided
by
third
parties
(e.g.
AT&T
Opt-‐e-‐man).
*Assuming
any
cable
repair
does
not
require
construction
or
re-‐pulling.
6.10.9.2 ITS
Networking
will
solely
manage
and
operate
analog
telephone
services.
6.10.9.2.1 Analog
service
availability
will
be
limited
to
reduce
university
costs.
6.10.9.2.2 ITS
Networking
will
evaluate
and
approve
requests
for
analog
service
based
on
IT
Governance
guidelines.
The
intent
of
analog
service
is
to
provide
extended
run-‐time
for
code
specified
life-‐safety
telephones
that
is
not
economically
achievable
using
VoIP
systems
on
the
university’s
networks
(e.g.
elevators
and
areas
of
refuge).
6.10.9.2.3 All
other
analog
devices
utilizing
the
service
should
be
converted
to
VoIP,
unless
exempted
by
ITS
Networking.
6.10.9.3 Units
will
conduct
all
tasks
related
to
VoIP
moves,
adds,
changes
and
instrument/end
user
support;
adhering
to
SLAs.
6.10.9.3.1 ITS
Networking
may
provide
enhanced
fee-‐for-‐service
offerings
to
perform
distributed
duties
for
Units
(envisioned
in
the
“Business
Class”
offering
of
the
initial
VoIP
governance
proposals).
ITS
Networking
must
coordinate
any
port
allocations
with
the
responsible
Units.
6.10.9.4 ITS
Networking
will
create
and
operate
segregated
voice
networks
to
provide
secure
and
reliable
telephone
services.
Only
compliant
network
equipment
managed
by
ITS
Networking
may
be
utilized
for
voice
networks.
6.10.9.5 Only
certified
telephone
instruments
may
be
connected
to
voice
networks.
6.10.9.5.1 ITS
Networking
manages
the
software,
security
and
configuration
for
the
certified
instruments.
ITS
may
delegate
support
for
certain
end
user
configuration
options
to
Units
to
reduce
fees.
6.10.9.5.2 IT
Governance
and
ITS
Networking
specify
certified
telephone
instruments.
Certified
instruments
must
be
purchased
from
ITS
Networking,
or
registered
with
ITS
Networking
for
its
management
via
its
approved
mechanisms.
(ITS
Networking
will
maintain
adequate
supplies)
6.10.9.5.3 ITS
Networking
is
responsible
for
maintaining
NetContacts
and
assessments
for
ISORA
for
certified
telephone
instruments.
6.10.9.5.4 Uncertified
devices
found
on
voice
networks
may
be
removed
from
the
network
without
warning.
6.10.9.6 Units
must
maintain
cable
number
to
switch
port
mappings
in
the
TSC
Networking
tools
for
all
certified
telephone
instruments
and
comply
with
911
safety
requirements
(all
network
devices
must
be
mapped
per
6.11.1.1).
6.10.10.2 Units
are
responsible
for
the
management,
configuration,
security,
operations
and
end
user
support
for
all
non-‐certified
telephone
instruments,
other
devices
and
software
used
with
the
system.
Best
industry
practices
must
be
followed.
6.10.10.3 ITS
Networking
has
certified
communications
software
for
some
platforms
to
work
with
the
system.
Units
should
purchase
and
utilize
these
offerings
to
reduce
support
costs
to
the
university.
6.10.10.4 Units
should
consult
with
ITS
Networking
prior
to
connecting
non-‐certified
instruments/devices
or
software
to
the
system.
[[email protected]]
6.10.10.4.1 ITS
Networking
may
disapprove
instruments/devices
or
software
due
to
impact
or
risk
to
the
system,
or
cost
of
central
support.
Those
must
be
disconnected.
6.10.10.4.2 ITS
Networking
is
not
responsible
for
compatibility
or
researching
support
issues
for
devices/software
it
does
not
certify.
6.10.10.5 Unit
must
comply
with
notification
and
procedures
related
to
911.
[TBD]
6.12 Maintenance
6.12.1 Units
should
not
conduct
other
IT
related
maintenance
during
scheduled
campus-‐wide
network
maintenance
events.
See
AIC
IT
Maintenance
Blackout
Operations
Procedure.
6.12.2 ITS
Networking
will
publish
non-‐emergency
blackout
dates
three
months
in
advance.
7. Exceptions/Adjudications
7.1 Exceptions
to
these
standards
and
operations
may
be
granted
by
ITS
Networking
and
Units
based
on
delegation
of
responsibilities.
Considerations
include:
7.1.1 The
underlying
need
for
exception
is
closely
aligned
with
the
university’s
mission.
7.1.2 Exception
is
in
alignment
with
the
overall
goals
of
this
manual.
7.1.3 Exception
does
not
conflict
with
rules,
laws,
or
policies.
7.1.4 Exception
does
not
compromise
the
integrity
of
the
network
or
the
ability
to
manage
network
resources.
Specifically,
it
may
not
impact
network
stability,
supportability,
and
maintainability.
7.1.5 Extraordinary
costs
(ordinary
costs
will
not
be
considered).
7.1.6 Requestor
assumes
all
responsibilities
incurred
if
granted
the
exception.
7.3 Exceptions
must
still
comply
with
other
requirements
outlined
in
this
document.
7.5 Exceptions will be recorded and maintained by the authorizing party.
8.3 Major
modifications
will
be
ratified
through
AIC
to
OIT,
and
possibly
SITAB,
depending
on
scope
and
impact.