You are here

FBK networks

SIT provides users with different types of networks: trusted, untrusted and DMZ.
Systems on the trusted and untrusted networks can only be accessed from inside the networks themselves and cannot therefore provide external services. Any exception must be discussed with the System Administrators.

Trusted networks

Trusted networks are high‐security environments with direct access to all facilities for storage, calculations, printing, etc purposes. This category includes the Ethernet network and the FBKWf WiFi network. In order to guarantee an adequate level of security, direct connection to these networks is granted to centrally‐managed computers only.
Users are authenticated centrally on a LDAP server with their trusted networks access credentials.

These networks are accessible in two ways:

  • using ethernet sockets located in all FBK offices;
  • connecting to the wireless FBKWf network.

All centrally-managed computers are configured to automatically connect to these networks, therefore no user intervention is required.

Untrusted networks

Untrusted networks are environments with a lower security level, with indirect access to facilities for storage, calculation and printing, etc purposes. This category includes the FBKWfGuest WiFi network. This network can be accessed by all not centrally managed computers, both private or FBK owned, provided they comply with the minimum security measures under Legislative Decree n. 196/03. Users are authenticated centrally on a RADIUS server for internet access purposes only, in compliance with Act n. 155 of July, 31 2005.

For wireless access, please connect to GuestsFBK, in Open mode. Authentication on https://wfgate.fbk.eu:444/ is required for Internet or trusted network at the first web access. Please provide your user credentials for the trusted networks or user credentials for the untrusted networks.

DMZ networks

Direct connection to the DMZ networks is restricted to servers that provide external services. In order to guarantee an adequate level of security, these networks may only be accessed by servers managed centrally by System Administrators and on which Administrators are authorised to make changes that require Administrator or Root User privileges. Users who wish to provide external services may ask the System Administrators to connect dedicated servers to the DMZ networks or request the use of shared resources.

DMZ networks are, thus, not directly accessible from user PCs.