eduroam for Windows Vista

Similar documents
eduroam for Windows Vista

eduroam for Android Devices

UCLan-Wireless for Apple iphone

How to connect to Wi-Fi

Wireless for Windows 7

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

simplifying... Wireless Access

Securewireless Windows 7 Setup Guide

Connecting to the eduroam Wireless Network. 1. If you are using a PC, move the. 2. Next Click or Tap the Settings. Help Sheet Windows 8.

Your use of AirUWS-Lite is subject to the University s IT Acceptable Use of Resources Policy.

Instructions for connecting to the FDIBA Wireless Network (Windows Vista)

Manually Configuring Windows 8 for Wireless PittNet

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR

IMPORTANT INFORMATION FOR CURTIN WIRELESS ACCESS - STUDENT / WINDOWS XP -

Configuring WPA2 for Windows XP

Manually Configuring Windows 7 for Wireless PittNet

Connecting to the NJITSecure wireless network.

Connect to eduroam WiFi

Senate House Library Guide Connecting to wifi

IT Quick Reference Guides Connecting to SU-Secure using Windows 8

Instructions for connecting to winthropsecure

Configuring 802.1X Authentication Client for Windows 8

Configure Wireless for Windows 7

Electronic Network Acceptable Use Policy

PTLGateway Acceptable Use Policy

Auburn Montgomery AUM Wi-Fi. Windows 7. User s Guide & System Documentation

Campus Wi-Fi. Set up access to eduroam: the University Wi-Fi network

Reference Card: How to connect Windows 7 to UniWireless

Johns Hopkins

Acceptable Use Policy (AUP)

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

Fair and acceptable usage policy

Acceptable Use Policy. Effective January 2017

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

IT ACCEPTABLE USE POLICY

UMDNJ Wireless Documentation Windows 7

Acceptable Use Policy

Acceptable Use Policy ("AUP")


How to connect your device using eduroam

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Connecting Devices to the PSD-BYOD Network

How to configure SecureW2

Terms and Conditions of use for the

PDMS SaaS Customer Code of Conduct

Acceptable Use Policy

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

HCC Wireless Instructions for Windows 10 (long version)

Acceptable Use Policy

Windows 7 Configuration for ORU Wireless Networks

Acceptable Use and Publishing Policy

Manual UCSFwpa Configuration for Windows 7

NT 0018 Instructions for Setting Up UoE_Secure (XP)

As Titanic Quarter we are delighted to provide telephone line and broadband services to you.

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

PDMS SaaS Customer Code of Conduct

Acceptable Use Policy

II.C.4. Policy: Southeastern Technical College Computer Use

Johns Hopkins

POLICY 8200 NETWORK SECURITY

: Acceptable Use Policy

NUCONNECT INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Configuring 802.1X Authentication Client for Windows 8

Wireless Installation Instructions for Windows Vista

USE POLICY. iprimus.com.au

Acceptable Use Policy

Brazosport Independent School District Employee/Agent Acceptable Use Agreement For Internet/Network Access and Use

Acceptable Use Policy

Internet access system through the Wireless Network of the University of Bologna (last update )

UCL Policy on Electronic Mail ( )

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Johns Hopkins

Acceptable Use Policy

Standard For IIUM Wireless Networking

Configuring the Client Adapter through the Windows XP Operating System

Service Specific Terms & Conditions

2017 Johns Hopkins Network Connectivity Guide

Acceptable Use Policy

Eduroam wireless network - Mac OSX 10.5 Leopard

Wireless Setup Instructions for Windows 7

REGULATION BOARD OF EDUCATION FRANKLIN BOROUGH

Computer Use and File Sharing Policy

TERMS AND CONDITIONS FOR USE OF THE SAFARICOM PREPAY BLACKBERRY SERVICE

Acceptable Use Policy Updated 1/16/2018

Windows VISTA Wireless Network Access Information

EacMonsterNet Wireless Access Windows XP Computers

13. Acceptable Use Policy

Johns Hopkins

Breckenridge Financial Supplies Website Use Policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy

ONUnet ONU Setup Guide for Windows 7

Funding University Inc. Terms of Service

WEBSITE USAGE TERMS AND CONDITIONS

SMS SERVICE PROVISION

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber

FPS BYOD Wireless Network

Transcription:

Please note: You must read the Wireless Network Fair Usage and Security Policy at the end of this guide. This ensures that you are aware of all the rules regarding Wireless services and prevent your internet access from being stopped. By using the Wireless service you are agreeing to these terms and conditions. Please note: Please make sure that Wireless is switched on. You will need to have administrator privileges on your computer to set up eduroam. If the computer is your own or you are using a UCLan Staff imaged Laptop then you should already have administrator privileges. Make sure Windows Vista Service Pack 2 is installed on your computer then 1. Select Start 2. Select Control Panel Page 1 of 10

3. Select Network and Internet 4. Select Network and Internet 5. Select Manage wireless networks 6. Select Add 7. Select Manually create a network profile Page 2 of 10

8. Enter or select details as follows: Network name: eduroam Security type: WPA2-Enterprise Encryption type: AES Select Next 9. Select Change connection settings 10. Select the Security tab 11. Check the settings are as follows: Security type: WPA2-Enterprise Encryption type: AES Choose a network authentication method: Microsoft: Protected EAP (PEAP) Cache user information for subsequent connections to this network should be ticked Select Settings Page 3 of 10

12. Check the settings are as follows: Validate server certificate: should be ticked Connect to these servers: should be unticked Trusted Root Certification Authorities should all be un-ticked Do not prompt user to authorize new servers or trusted certification authorities should be un-ticked Select Authentication Method: should be Secured Password (EAP-MSCHAP v2) Enable Fast Reconnect should be ticked Enable Quarantine checks should be unticked Disconnect if server does not prevent cryptobinding TLV should be un-ticked Select Configure 13. Automatically use my Windows logon name and password (and domain if any). should be un-ticked and select OK 14. Close all the configuration windows by selecting OK, Close or Cancel as appropriate 15. Select the Click to provide additional information and connect bubble Page 4 of 10

16. Enter the following information: User name: UCLan email address Password: UCLan password Logon domain: leave blank Select OK 17. Check that the server certificate in the Validate Server Certificate window says the following - AddTrust External CA Root 18. Select OK You should now be able to browse the internet. Page 5 of 10

Trouble-Shooting for eduroam on Windows Vista 1. If you are having trouble connecting to UCLan-Wireless, you can try the following, Go to Start > Control Panel and Select Network and Internet and then select Network and Sharing Center 2. In Network and Sharing Center select Manager Wireless Networks from the left menu 3. When you see the Wireless networks window double-click the eduroam connection Page 6 of 10

4. A eduroam Network Properties window will appear, select the Security tab and then the Settings button 5. When the Protected EAP Properties window appears un-tick the Validate server certificate box Select OK to close each settings window that is open 6. Select the Wireless Icon from the taskbar and Select eduroam and click Connect Enter your UCLan Email Address and Password if prompted to do so Page 7 of 10

Please read this document fully and carefully Wireless Network Service Fair Usage and Security Policy LIS reserves the right to amend or substitute the terms of this policy at any time. Any such amendment or substitution shall be posted on the LIS website and is automatically effective to all Users of the Wireless Network Service at the University of Central Lancashire when adopted by LIS. Why LIS has this Policy This policy is designed to make sure LIS can give you, the User of the Wireless Network Service at the University of Central Lancashire, a service that is fast and reliable. The policy is also designed to limit exposure to legal risk to you and UCLan arising from your use of the Wireless Network Service. Your Computer Security You are responsible for the security of your computer while connected to the Wireless Network Service as follows:- Security patches must be applied Appropriate anti-virus and anti-spyware software must be installed and set to update automatically You must not knowingly or negligently download any electronic material containing a virus, Trojan or other computer program known or likely to interrupt, impair, damage, destroy or limit the functionality of any computer software, hardware or telecommunications equipment owned by UCLan or any other Internet user or person. LIS accepts no responsibility for the potential consequences of you failing to employ adequate security measures on your computer while connected to the Wireless Network Service. Page 8 of 10

Downloading Software The downloading and installation of software and other resources from the Internet is done entirely at your own risk. LIS is not responsible for any unwanted effect on your computer that may result from doing so. It is your responsibility to comply with the laws of copyright and to abide by any software license agreements that may apply. What can the Wireless Network Service NOT be used for? The Wireless Network Service must not be used for Any unlawful, criminal, fraudulent or otherwise illegal purposes or activities Activities which breach the rights of any third party, such as the downloading, streaming or distribution of any copyrighted material of any kind Collecting, streaming, distributing or accessing any material that you know, or reasonably should know, cannot be legally collected, streamed, distributed or accessed Commercial use either self-employed or on behalf of an employer Sending or uploading unsolicited emails, advertising or promotional materials, offering to sell any goods or services, or conducting or forwarding surveys, contests or chain letters Attempting or accomplishing access to any computer system, network or account without consent or otherwise where such access is not intended for you Viewing, modifying or otherwise tampering with any data or system without owner s consent or where it is otherwise not intended you should do so Probing the security of any computer system, network or account Impairing the function of, or interfering with the proper operation of, the Wireless Network Service or any other computer system or network in any manner Consciously acting to harass, cause annoyance, anxiety or inconvenience to, invade the privacy of, or disrupt the activities of other users of the Wireless Network Service or users of any other computer system in any manner What about Excessive Network Usage? The vast majority of users of the Wireless Network Service will not have a problem under this Fair Usage Policy. Page 9 of 10

However, if it is felt that your Internet activities are excessive, LIS may enquire and ask your reasons for such high activity. You may be given a written warning (by email or otherwise). If the levels of activity do not immediately decrease after the warning, LIS may suspend your connection for a fixed period of time. In extreme circumstances, LIS reserves the right to terminate your usage of the Wireless Network Service. What happens if this Policy is breached? If any use of the Wireless Network Service constitutes a breach of this Policy, LIS may, at its sole discretion, a) give you notice to stop the unacceptable use(s), b) suspend service for a fixed period or c) terminate your connection (with or without notice as LIS considers appropriate). Page 10 of 10