Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
OIT Support Center
Sign In
Search
Home
Software Index A-Z
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
Networks, Connectivity, and Troubleshooting
ResHall Network
Acceptable vs Unacceptable Devices
Acceptable vs Unacceptable Devices
Acceptable Devices
Personal Desktop Computers - Windows, Mac, Linux/UNIX
Laptops
Tablets
Gaming Consoles
Entertainment Systems
Unacceptable Devices
Routers
Switches
Wireless Access Points
Firewalls
Hubs
Bridges
Computers running any server-type process such as DHCP, DNS, Web Servers, FTP Servers, etc.
Peer-to-Peer Connections (P2P) - Settings or software installed on such devices as Smart TV's, Amazon Echo, Wireless VR Headsets, etc. that allow direct device to device connection. If these settings can be disabled or the software uninstalled, the devices may be able to properly connect to the ResHall/IOT network after they are removed.
Unacceptable devices compromise the design and security of the ResHall network. Unacceptable devices detected on the network will lose access to the network (port and login will be blocked). Reread the ResHall Policy or contact the
OIT Support Center
for assistance if you are unsure about whether a particular device is allowed on the network.
Sign in to leave feedback
0% helpful - 1 review
Blank
Blank
Blank
Blank
Print Article
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the OIT Support Center knowledge base.<br /><br /><a href="https://unr.teamdynamix.com/TDClient/2684/Portal/KB/ArticleDet?ID=116826">https://unr.teamdynamix.com/TDClient/2684/Portal/KB/ArticleDet?ID=116826</a><br /><br />Acceptable vs Unacceptable Devices