1 Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops A wireless network for Students to use with their personal laptops, is available throughout campus with the SSID NCC-STUDENT. This network is configured with WPA Enterprise authentication and AES encryption, which utilizes your NETID and password for logon. The IT Department is not responsible for updating, configuring, repairing, or otherwise troubleshooting personal laptops. This includes, but is not limited to, damage caused by malicious software or people, both in person and over the network or Internet. Minimum requirements for Laptops: All Student owned Laptops must have a wireless network card capable of A (Wireless A), G (Wireless G), or N (Wireless N) speeds. Laptops with an B (Wireless B) network card will not be capable of seeing the wireless network, and will not be able to connect. The latest Microsoft Windows Updates are required to support authentication to this network. You will not be able to connect to the SSID NCC-STUDENT without having these updates. You must download the updates from another location (such as your home) prior to bringing your laptop to campus. Windows 8 & RT Configuration Guide: This assumes that your wireless card is already enabled and functional, there are several methods for determining the status of your network card depending on your settings. None of these methods will be included in this document. Step 1: In the lower right hand corner of the screen, hover over your wireless network card. An example of this is shown in the screen shot below. Right click on here
2 Step 2: Right click on the network icon, and choose Open Network and Sharing Center. The Network and Sharing Center window will appear, as seen in the screenshot below.
3 Step 3: Click on Set up a new connection or network and the following windows will appear on your screen:
4 Step 4: Click on Manually connect to a wireless network. The profile information window will appear, as seen in the screenshot below.
5 Step 5: Fill in the fields. The Network name is NCC-STUDENT (use the proper case). The Security Type is WPA2-Enterprise. The Encryption Type is AES. Then click Next. The Successfully Added NCC-STUDENT window appears as seen in the screenshots below.
6 Step 6: Click the Change Connection Settings option. The NCC-STUDENT Wireless Network Properties window opens as seen in the screen shot below.
7 Step 7: Choose the Security tab. Make sure that the setting for security Type is WPA2-Enterprise, Encryption Type is set to AES, and the Choose a Network Authentication Method is set to Microsoft: Protected EAP (PEAP).
8 Step 8: Click the Settings tab next to Microsoft: Protected EAP (PEAP). The Protected EAP Properties window appears as seen in the screen shot below. Uncheck Validate Server certificate and be sure that the Select Authentication Method is set to Secured password (EAP-MSCHAPv2), as seen in the screenshot below.
9 Step 9: Click OK to close the Protected EAP Properties window. Click OK to close the NCC- STUDENT Wireless Network Properties window. Step 10: At the bottom left of the screen, left click on your wireless icon as shown below. Click here Step 11: A menu of the available wireless networks will come up on the right side of your screen. Select NCC-STUDENT and make sure you check Connect automatically then click Connect.
10 Step 12: Type your NETID in the User name field. Example: Then type your Password in the Password field. Then click OK.
11 Step 13: If the Set Network Location window appears, choose Public Network, If this window does not appear, move to the next step.
12 Step 14: Finally the NCC-STUDENT Wireless Policy Splash page will automatically open up as shown in the screen shot below. Use of this wireless network indicates acceptance to this policy as well as those located at After this page displays, you can navigate to any other website.
(Guideline for ) Date: 2013-07-15 Document type: user description Version: 3.2 : Editorial team PKI cio.siemens.com Table of contents 1. Intention of the document:... 3 2. Prerequisites on business partner
INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide
CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.
Wireless Networking Mac/PC Compatibility: QuickStart Guide for Business 2 Wireless Networking QuickStart Guide for Business The Basics Wireless networking is an alternative to running cable around your
How to Add a Server/Disksafe/Volume The following document will guide you through the steps for adding a server to your HBizzDRP backup manager as well as the needed and associated aspects. Log In: Navigate
SlimDrivers User Manual Introduction: What are Updates? Updates are corrections to the software on your computer that are made to fix errors or to improve the overall performance of a particular program
Migrating From Bobcat Mail To Google Apps (Using Microsoft Outlook and Google Apps Sync) This document is intended for those users moving from WVWC s Bobcat Mail system to the new Google Apps mail system
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup IBM/Softlayer Object Storage is a redundant
Use of Amount Only Flags in ARC Guidance In an effort to provide assistance in the use of the Amount Only option when processing requisitions in ARC, the below guidance is provided. The use of this option
Information Technology Services Kennesaw State University Using Microsoft Outlook 2010 with Zimbra 1 Copyright 2010 KSU Dept. of Information Technology Services This document may be downloaded, printed
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Improving the lives of women and girls through programs leading to social and economic empowerment. SOROPTIMIST INTERNATIONAL OF THE AMERICAS Guide to Migrating Your Outlook.com Club Email & Contacts to
Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,
Database Administration Guide 013008 2008 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including photocopying,
Email-Encryption with business partners Date: 02. November 2006 Document type: User description Version: 1.2 Author: Volker Gebhard, Redaktionsteam WG PKI cio.siemens.com Table of contents: 1. Intention
Quick Start Guide Copyright Wasp Barcode Technologies 2014 No part of this publication may be reproduced or transmitted in any form or by any means without the written permission of Wasp Barcode Technologies.
Setting up WeMo is incredibly simple. All you need is: Your WeMo Switch and WeMo Motion An appliance you'd like to control iphone, ipod Touch or ipad Wi-Fi Router Using your ios device, open the App Store,
Vodafone R101 Table of Contents Welcome...3 1. Getting Started Initial Connection and Security Settings... 4 1.1 Overview... 5 System Requirements... 5 Device overview... 5 Sharing Dock and USB Stick LEDs...
Steganos Secure E-Mail Step by Step Instructions Introduction Although more and more PC users learn that an e-mail can be read by a third party as easily as a postcard, e-mail encryption is still quite
1. How to check if a network card is installed Locate the My Computer icon, found either on the Start menu or the desktop Right click on the My Computer icon and select Properties from the grey box that
This guide provides step by step instructions for using the IMF elibrary Data - area. In this guide, you ll learn how to: Access your favorite and recently used data reports. Make sure you receive email