Connecting Windows Vista to DragonFly3

Size: px
Start display at page:

Download "Connecting Windows Vista to DragonFly3"

Transcription

1 ConnectingWindowsVistatoDragonFly3 Thefollowinginstructionswillguideyouthroughthesetupprocessforconnectinga MicrosoftWindowsVistacomputertotheDrexelDragonFly3wirelessnetwork. PLEASENOTE:Dell,Hewlett Packard,Compaq,Lenovo,IBMandsomeotherlaptop manufacturerssometimesinstalltheirowncustomwirelessnetworkconfiguration softwareontheirequipment.theinstructionsbelowwerecreatedforusingthe MicrosoftWindowsVistautilitiesforwirelessnetworkconfiguration.Assuch,if yourlaptopusescustomsoftware,thepromptsyouseeandthepop upwindows youencountermaydifferfromtheinstructionsbelow.ifthatisthecase,youshould stillbeabletousesteps6 9toobtainthecorrectconfigurationinformation. 1. ClickontheHOMEmenuandchoosetheNetworkoption. 2. Atthetopofthewindowthatappears,clicktheNetworkandSharing Centerbutton.

2 3. IntheNetworkandSharingCenterwindow,intheleftsidemenu,clickthe Managewirelessnetworkslink. 4. Ifdragonfly3appearsinthelistofNetworksyoucanviewandmodify,click ontheitemtohighlightitandthenclicktheremovebutton.

3 5. ClicktheAddbuttontobeginconfiguringyourlaptoptousetheDragonFly3 wirelessnetwork. 6. IntheManuallyconnecttoawirelessnetworkwindow,clickthe Manuallycreateanetworkprofilebutton. 7. UnderEnterinformationforthewirelessnetwork,filloutthefieldsas follows: a. SettheNetworkname(SSID):fieldtodragonfly3. b. SettheSecuritytype:dropdowntoWPA2 Enterprise.

4 c. SettheEncryptiontype:dropdowntoAES. d. MakesuretheSecurityKey/Passphrase:fieldisempty. e. MakesuretheStartthisconnectionautomaticallyoptionis checked. f. MakesuretheConnectevenifthenetworkisnotbroadcasting optionisnotchecked. 8. ClicktheNextbutton. 9. ClicktheChangeconnectionsettingsbuttontoconfigurethesecurity settingsfordragonfly3.

5 10. Inthedragonfly3WirelessNetworkPropertieswindow,intheSecurity tab,filloutthefieldsasfollows: a. SettheSecuritytype:dropdowntoWPA2 Enterprise. b. SettheEncryptiontype:dropdowntoAES. c. SettheChooseanetworkauthenticationmethod:dropdownto Microsoft:ProtectedEAP(PEAP). d. MakesuretheCacheuserinformationforsubsequentconnections tothisnetworkoptionischecked. 11. ClicktheSettings buttonnexttothechooseanetworkauthentication method:dropdownmenu. 12. IntheProtectedEAPPropertieswindow,filloutthefieldsasfollows: a. MakesuretheValidateservercertificateoptionischecked. b. ChecktheConnecttotheseservers:optionandfilloutthetextbox belowwithradius.irt.drexel.edu. c. IntheTrustedRootCertificationAuthorities:field,findtheThawte ServerCAoptionandplaceachecknexttoit. d. MakesuretheDonotpromptusertoauthorizenewserversor trustedcertificationauthoritiesoptionisnotchecked. e. SettheSelectAuthenticationMethod:dropdowntoSecured password(eap MSCHAPv2). f. MakesuretheEnableFastReconnectoptionisNOTchecked. g. MakesuretheEnableQuarantinechecksoptionisNOTchecked. h. MakesuretheDisconnectifserverdoesnotpresent cryptobindingtlvoptionisnotchecked.

6 13. ClicktheConfigure buttonnexttotheselectauthenticationmethod: dropdownmenu. 14. IntheEAPMSCHAPv2Propertieswindow,makesuretheAutomatically usemywindowslogonnameandpassword(anddomainifany).option isnotchecked. 15. ClicktheOKbuttontoclosetheEAPMSCHAPv2Propertieswindow. 16. ClicktheOKbuttontoclosetheProtectedEAPPropertieswindow. 17. ClicktheOKbuttontoclosetheWirelessnetworkpropertieswindow. 18. ClicktheClosebuttontoclosetheManuallyconnecttoawirelessnetwork window.

7 19. Withinafewseconds,anAdditionalinformationisrequiredtoconnectto dragonfly3dialoguebubblewillappearinthebottomrightcornerofthe desktop.clickonthisbubble. 20. IntheEnterCredentialswindow,filloutthefieldsasfollows: a. SettheUsername:fieldtoyourofficialDrexelusername. b. SetthePassword:fieldtothepasswordthatcorrespondstoyour officialdrexelusername. c. SettheLogondomain:fieldtoDREXEL. 21. ClicktheOKbuttontoclosetheEnterCredentialswindow. 22. YourcomputerisnowconfiguredtousetheDragonFly3wirelessnetworkat Drexel.Itmaytakeupto1hourfortheprocesstosyncwiththeDrexel networkafterwhichtimeyouwillbeabletousethewirelessnetwork.

A few things to remember:

A few things to remember: PolycomPVXSoftware: Firstandforemost,thisisasoftware basedsystemthatisattemptingtodothesame jobthatsomeveryexpensivededicatedhardwaredoes.soifyouchoosetorun othersoftwarethattakeupalotofcpuatthesametime,donotexpectthequality

More information

VU University Amsterdam

VU University Amsterdam VU University Amsterdam University Centre IT November 2010 version 1.0 This document describes how to access and configure Outlook 2007. 1. Contents 1. Contents 2 2. Overview Settings 2 3. Requirements

More information

TECHNOLOGY ROLE MANAGEMENT SOFTWARE TOOLS TRAINING AVAILABLE ASSIGNED TO

TECHNOLOGY ROLE MANAGEMENT SOFTWARE TOOLS TRAINING AVAILABLE ASSIGNED TO EducationTechnologyServices TECHNOLOGYROLES/CONTACTSWORKSHEET CorporateFunctionswillbeenteredintheSAPPA30screen.Thisinfotypeisusedtotrackemployeeswhoareperformingtechnologytasks/functionsatyoursite. TECHNOLOGYROLE

More information

Connec ng to Northwest s WIFI with Windows 7

Connec ng to Northwest s WIFI with Windows 7 Connecting to Northwest s Secure wireless network with your personal computer should be fast and easy if you follow these instructions. To connect your personally-owned computer (with Windows 7 OS) to

More information

Configuring Eduroam in Windows Vista

Configuring Eduroam in Windows Vista Configuring Eduroam in Windows Vista How to configure Windows Vista wireless settings for use with Eduroam Opening the "Network and Sharing Center" Left Click the network connections icon in the taskbar.

More information

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops A wireless network for Faculty and Staff to use with their personal laptops, is available throughout campus with

More information

How to connect to the diamonds wireless network with Vista.

How to connect to the diamonds wireless network with Vista. How to connect to the diamonds wireless network with Vista. This configuration guide requires the use of Windows to configure the wireless settings. 1. Click on the START menu and click the Control Panel.

More information

GPC JagTalk Secure Wireless Network. Connection Instructions

GPC JagTalk Secure Wireless Network. Connection Instructions GPC JagTalk Secure Wireless Network Connection Instructions Contents Windows 10... 2 Windows 7... 4 Windows 8 / Surface... 6 Android... 7 BlackBerry... 9 Mac OS X... 10 Apple ios Devices... 12 1 Connecting

More information

RSC-Secure-Wireless provides...

RSC-Secure-Wireless provides... RSC-Secure-Wireless provides... Security: RSC-Secure-Wireless provides a layer of encryption for added security. Convenience: You don't have to type in your username and password each time you connect.

More information

6. After connecting reopen the wireless connections window. Right click on RamNet and select properties. Page 2 of 7

6. After connecting reopen the wireless connections window. Right click on RamNet and select properties. Page 2 of 7 Networking & Telecommunications 001 Allegheny Hall 610-436-3535 West Chester University fax: 610-436-3110 West Chester, Pennsylvania 1938 http://www.wcupa.edu/infoservices/commservices/ RamNet Wireless

More information

Content&Security RECOMMENDED(BEST(PRACTICES

Content&Security RECOMMENDED(BEST(PRACTICES Content&Security RECOMMENDED(BEST(PRACTICES for(production(&(post(production(/(editorial( Version(16.2 MANAGEMENT(CONTROLS PERSONNEL(AND(RESOURCES(/(PRODUCTION(OFFICE ASSET(MANAGEMENT(/(CAMERA(MEDIA PHYSICAL(SECURITY

More information

Wireless Setup for Windows 8

Wireless Setup for Windows 8 Wireless Setup for Windows 8 Wireless Names KUEMPLOYEE Only Kettering Staff and Faculty can connect to this wireless o Network Access, Internet Access, Printer Access, License Manager KUSTUDENT Active

More information

MS Skype for Business and Lync. Integration Guide

MS Skype for Business and Lync. Integration Guide MS Skype for Business and Lync Integration Guide June 03, 2016 Contents Introduction 4 How to use StarLeaf with Microsoft Skype for Business 2015 Server 5 Pre-requisites 5 Step One: Federate between the

More information

Creating and Installing a Self Signed Certificate for PEAP/EAP-TLS Authentication

Creating and Installing a Self Signed Certificate for PEAP/EAP-TLS Authentication Creating and Installing a Self Signed Certificate for PEAP/EAP-TLS Authentication A server side X.509 digital certificate is required for PEAP/EAP-TLS authentication. This certificate can be purchased

More information

Getting started guide for installing printers and printing at UNIS

Getting started guide for installing printers and printing at UNIS Getting started guide for installing printers and printing at UNIS To be able to Print/Copy or Scan at UNIS you have to have a UNIS computer account. All print and copying is logged on your account. Students

More information

CruzNet Secure Set-Up Instructions for Windows Vista

CruzNet Secure Set-Up Instructions for Windows Vista CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.

More information

GSU JagTalk Secure Wireless Network. Connection Instructions

GSU JagTalk Secure Wireless Network. Connection Instructions GSU JagTalk Secure Wireless Network Connection Instructions Contents Please click on an option below: Windows 10... 2 Windows 7... 4 Windows 8 / Surface... 6 Android... 8 BlackBerry... 9 Mac OS X... 10

More information

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. Note: DIR-130 FW: 1.21 How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130. This setup example uses the following network settings: D-Link Technical Support PPTP VPN Between Windows PPTP

More information

User Guide for eduroam

User Guide for eduroam User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo

More information

How to Access Coast Wi-Fi

How to Access Coast Wi-Fi How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue

More information

How to configure 802.1X authentication with a Windows XP or Vista supplicant

How to configure 802.1X authentication with a Windows XP or Vista supplicant An HP ProCurve Networking Application Note How to configure 802.1X authentication with a Windows XP or Vista supplicant Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring

More information

Peterhouse Computing: Configuring Windows 7 (and Windows Vista) for a wired network connection.

Peterhouse Computing: Configuring Windows 7 (and Windows Vista) for a wired network connection. Peterhouse Computing: Configuring Windows 7 (and Windows Vista) for a wired network connection. Introduction The Peterhouse network uses IEEE802.1x (hereafter.1x ) network authentication to control access

More information

UCO_SECURE Wireless Connection Guide: Windows 8

UCO_SECURE Wireless Connection Guide: Windows 8 1 The UCO_SECURE wireless network uses 802.1x encryption to ensure that your data is secure when it is transmitted wirelessly. This security is not enabled by default on Windows computers. In order to

More information

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7 Configuring your wireless device to use WPA2 takes a few minutes. You will, however, need to meet the following system requirements

More information

The ANKA Archiving System

The ANKA Archiving System The ANKA Archiving System Combining Tango, WinCC OA and the web front-end ADEI David Haas, KIT Universität des Landes Baden-Württemberg und nationales Forschungszentrum in der Helmholtz-Gemeinschaft www.kit.edu

More information

eduroam Overview and Device Configuration

eduroam Overview and Device Configuration eduroam Overview and Device Configuration OTS PUBLICATION: WR3 REVISED 07-5-04 TRAINING@TOWSON.EDU OFFICE OF TECHNOLOGY SERVICES =Shortcut =Advice =Caution Introduction eduroam is a global wireless service

More information

Wi- Fi settings for Windows XP

Wi- Fi settings for Windows XP Wi- Fi settings for Windows XP On the TU/e there are four Wlan network names or SSID's available. TUE-WPA2 2 The TUE-WPA2 network has WPA2 encryption. This network can be used by both TU/e students and

More information

How to Connect to UCO s Wireless Network on an Android Device

How to Connect to UCO s Wireless Network on an Android Device How to Connect to UCO s Wireless Network on an Android Device These instructions will work for most Android devices, including phones and tablet devices. The only issue you may run into is some of the

More information

Wireless Network Configuration Guide

Wireless Network Configuration Guide CIT Table of Contents Introduction... 1 General Wireless Settings... 1 1. Windows XP Wireless Configuration... 2 2. Windows XP Intel Pro Wireless Tool... 7 3. Windows Vista Using the Windows Wireless Tools...

More information

Configuring Windows 7 for eduroam at DkIT

Configuring Windows 7 for eduroam at DkIT Configuring Windows 7 for eduroam at DkIT Author: Paul Scollon, Computer Services Date: 18 th July, 2011 Version: 1.0 Note: see http://www.eduroam.ie/userdocs.php for details of other operating systems.

More information

Instructions for connecting to the LSC-O Secure Wireless Network

Instructions for connecting to the LSC-O Secure Wireless Network Instructions for connecting to the LSC-O Secure Wireless Network Wireless computer hot spots are available at various locations around the LSC-O campus. The Academic Center first floor, AHB first and second

More information

Rev. 3.2. Page 1 of 17

Rev. 3.2. Page 1 of 17 SecureCanes Documentation December 2014 Rev. 3.2 Page 1 of 17 What is SecureCanes? SecureCanes is a wireless network that provides encryption for your wireless communications from your device to the wireless

More information

WiFi Internet Access. Windows XP Setup Instructions. Please Return After Use. Produced Oct 2010

WiFi Internet Access. Windows XP Setup Instructions. Please Return After Use. Produced Oct 2010 WiFi Internet Access Windows XP Setup Instructions Produced Oct 2010 Please Return After Use About the Janet Roaming Service The University of Plymouth provides an infrastructure for guest users to use

More information

WIRELESS SETUP FOR WINDOWS 7

WIRELESS SETUP FOR WINDOWS 7 Computing & Communications WIRELESS SETUP FOR WINDOWS 7 For assistance during the configuration process please call the Computing and Communications Help Desk at 639-2049, avdesk@swgc.mun.ca Who should

More information

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: General Settings To connect to the ResNet-Secure SSID, a device is needed that supports 802.1X authentication and WPA2 Enterprise.

More information

Management Authentication using Windows IAS as a Radius Server

Management Authentication using Windows IAS as a Radius Server Management Authentication using Windows IAS as a Radius Server OVERVIEW: In this we are using Radius server Windows IAS as a backend server for the management authentication for the controller. When the

More information

IT Quick Reference Guides Connecting to SU-Secure using Windows 8

IT Quick Reference Guides Connecting to SU-Secure using Windows 8 IT Quick Reference Guides Connecting to SU-Secure using Windows 8 Windows 8 Guides CONNECTING TO SU-SECURE WI-FI This document will give you instructions on how to connect your Windows 8 Computer to our

More information

Extension Wireless Access (EWA) v2.0

Extension Wireless Access (EWA) v2.0 Extension Wireless Access (EWA) v2.0 The Extension Wireless Network (EWA) is broken into two parts: the public network (vce pub) and the private network (vce wlan). The public network (vce pub) is secured

More information

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014

VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware Horizon View for SMS PASSCODE SMS PASSCODE 2014 VMware View Radius authentication configuration for SMS PASSCODE With the introduction of RADIUS authentication support in VMware View it is possible

More information

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu...

INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide

More information

3. A damage assessment will be conducted by the IT Director, and if applicable vendor/consult, and reported back to Management.

3. A damage assessment will be conducted by the IT Director, and if applicable vendor/consult, and reported back to Management. 3. A damage assessment will be conducted by the IT Director, and if applicable vendor/consult, and reported back to Management. 4. Individuals required to assist in recovery of these services will be identified.

More information

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Instructions for connecting to the FDIBA Wireless Network. (Windows XP) Instructions for connecting to the FDIBA Wireless Network (Windows XP) In order to connect, you need your username and password, as well as the FDIBA Root Certificate which you need to install on your

More information

Internet access system through the Wireless Network of the University of Bologna (last update 6.3.2012)

Internet access system through the Wireless Network of the University of Bologna (last update 6.3.2012) Internet access system through the Wireless Network of the University of Bologna (last update 6.3.2012) Printable service summary document: the updated version is available online at the following address

More information

Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet)

Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet) Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet) What is WPA (Wi-Fi Protected Access)? WPA is a powerful, standards-based, interoperable security technology

More information

WiFi troubleshooting. How s your WiFi signal? Android WiFi settings. ios WiFi settings

WiFi troubleshooting. How s your WiFi signal? Android WiFi settings. ios WiFi settings 1 WiFi troubleshooting How s your WiFi signal? If your connection appears to keep dropping off: check in your WiFi settings that you added @kent.ac.uk to your username, and entered your password correctly.

More information

DHL IMPORT EXPRESS ONLINE USER GUIDE FOR SHIPPERS

DHL IMPORT EXPRESS ONLINE USER GUIDE FOR SHIPPERS Web-Based PC-Based Integrated DHL IMPORT EXPRESS ONLINE USER GUIDE FOR SHIPPERS We coordinate effective communication between your shippers and you for you. www.dhl-usa.com/ieo Contents 2 CONTENTS Shipper

More information

BRING YOUR OWN DEVICE (BYOD)

BRING YOUR OWN DEVICE (BYOD) BRING YOUR OWN DEVICE (BYOD) Richland School District (RSD) is pleased to announce that all secondary students can now bring and use your personal devices in classrooms daily. However, participation of

More information

Operating Instructions 3-349-831-03 1/10.14

Operating Instructions 3-349-831-03 1/10.14 Operating Instructions 3-349-831-03 1/10.14 Contents 1. Applications... 4 2. System Requirements for GMST... 5 3. Installation... 6 4. First start... 9 5. Software registration... 10 5.1. First registration...

More information

Juniper Networks SSL VPN Implementation Guide

Juniper Networks SSL VPN Implementation Guide Juniper Networks SSL VPN Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Cisco VPN Concentrator Implementation Guide

Cisco VPN Concentrator Implementation Guide Cisco VPN Concentrator Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

802.1X Client Software

802.1X Client Software 802.1X Client Software REV1.0.0 1910011339 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and product

More information

Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012

Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012 Vermont College of Fine Arts Information Technology Disaster Recovery Plan for Fiscal Year 2012 Introduction: Vermont College of Fine Arts (VCFA) is a national center for education in the arts, fostering

More information

Zeroshell: VPN Host-to-Lan

Zeroshell: VPN Host-to-Lan Zeroshell: VPN Host-to-Lan The multifunctional OS created by Fulvio.Ricciardi@zeroshell.net www.zeroshell.net Securing the connection between a host and a network ( Author: cristiancolombini@libero.it

More information

FREE FILE FILLABLE FORMS GUIDE

FREE FILE FILLABLE FORMS GUIDE TABLE OF CONTENTS GETTING STARTED...1 CREATE AN ACCOUNT... 2 STEP 1: FILL OUT YOUR TAX FORMS... 3 Navigating Free File Fillable Forms... 3 Types of Input Areas...4 Tabs, Links, Buttons and Icons...8 Adding

More information

NetIQ Advanced Authentication Framework - Network Policy Server (NPS) Plugin. Administrator's Guide. Version 5.1.0

NetIQ Advanced Authentication Framework - Network Policy Server (NPS) Plugin. Administrator's Guide. Version 5.1.0 NetIQ Advanced Authentication Framework - Network Policy Server (NPS) Plugin Administrator's Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Fail Wrong

More information

Eduroam wireless network Windows Vista

Eduroam wireless network Windows Vista Eduroam wireless network Windows Vista university for the creative arts How to configure laptop computers to connect to the eduroam wireless network Contents Contents Introduction Prerequisites Instructions

More information

govroam Web Interface User Guide

govroam Web Interface User Guide govroam Web Interface User Guide Contents Introduction 3 Login Page 3 Main Page 4 Managing your Radius Servers 5 Managing your Realms 7 Managing the Test Users 9 Managing the Access Points 10 Information

More information

SMS PASSCODE CONFIGURATION FOR CISCO ASA / RADIUS AUTHENTICATION SMS PASSCODE 2011

SMS PASSCODE CONFIGURATION FOR CISCO ASA / RADIUS AUTHENTICATION SMS PASSCODE 2011 SMS PASSCODE CONFIGURATION FOR CISCO ASA / RADIUS AUTHENTICATION SMS PASSCODE 2011 Introduction SMS PASSCODE is widely used by Cisco customers extending the Cisco ASA VPN concentrators with both IPsec

More information

Installation of certificate on controller for WebUI, Captive Portal and 802.1X authentication

Installation of certificate on controller for WebUI, Captive Portal and 802.1X authentication Installation of certificate on controller for WebUI, Captive Portal and 802.1X authentication Contents Introduction... 3 Use certificate for WebUI management... 17 Use certificate for Captive Portal...

More information

ResNet Connection for Windows 8

ResNet Connection for Windows 8 ResNet Connection for Windows 8 GENERAL NOTE: ResNet is provided as a resource for UNO students to access University and Internet based services. As such, the network must be secured to prevent unauthorized

More information

1 of 5 9/16/15, 4:09 PM

1 of 5 9/16/15, 4:09 PM Help (http://www.osu.edu/help.php) BuckeyeLink (http://buckeyelink.osu.edu/) Map (http://www.osu.edu/map/) Find People (http://www.osu.edu/findpeople.php) Webmail (https://email.osu.edu/) Search Ohio State

More information

Chapter 3 Authenticating Users

Chapter 3 Authenticating Users Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three

More information

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company

More information

WiFi for mobile devices

WiFi for mobile devices IT user guide WiFi for mobile devices Contents Wireless coverage 2 What you need to connect 2 Conditions of use 2 Connect your mobile device 2 Mobile devices connection settings 2 Kent email on your mobile

More information

Cisco ASA configuration for SMS PASSCODE SMS PASSCODE 2014

Cisco ASA configuration for SMS PASSCODE SMS PASSCODE 2014 Cisco ASA configuration for SMS PASSCODE SMS PASSCODE 2014 Introduction SMS PASSCODE is widely used by Cisco customers extending the Cisco ASA VPN concentrators with both IPsec and SSL VPN extensions.

More information

IHSVPN IHS Secure Network Access

IHSVPN IHS Secure Network Access IHSVPN IHS Secure Network Access Updated 2015-07-31 Unless you are using MS Windows 2000/XP/Vista/7/8 you will have to configure IHSVPN by yourself using the following parameters: Recommended setup: Layer

More information

Fonality Phone System Installation Guide

Fonality Phone System Installation Guide FonalityPhoneSystem InstallationGuide ThankyouforchoosingFonality sphonesystemfromdell!thepartnershipbetween DellandFonalitymeansthatyouraward winningfonalityphonesystemnowruns ondell sindustry leadinghardware.

More information

DOWN HIGH SCHOOL BRING YOUR OWN DEVICE (BYOD) POLICY. Rationale

DOWN HIGH SCHOOL BRING YOUR OWN DEVICE (BYOD) POLICY. Rationale DOWN HIGH SCHOOL BRING YOUR OWN DEVICE (BYOD) POLICY Rationale Sixth Form students have access to a limited number of private study periods during which they have the opportunity to focus on coursework,

More information

Cardiac Tool User s Guide. Cardiac Tool. Version 1.0

Cardiac Tool User s Guide. Cardiac Tool. Version 1.0 Cardiac Tool Version 1.1 by Bernd Jung, Harald Fischer, Michael Markl Section of Medical Physics, University Hospital Freiburg, Germany Contact: Bernd Jung, Hugstetterstr. 55, D 79106 Freiburg, email:

More information

Chapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment.

Chapters. Prerequisites: Eduroam in a Microsoft Windows 2008r2 environment. Eduroam in a Microsoft Windows 2008r2 environment. This guide will help with the deployment of eduroam in a Microsoft Windows 2008r2 only environment. We will briefly note the prerequisites for a successful

More information

WISP 101. The DO s and DON T s of becoming a Wireless ISP

WISP 101. The DO s and DON T s of becoming a Wireless ISP WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your

More information

Configuring an Android device to access Staff Wi-Fi and Email.

Configuring an Android device to access Staff Wi-Fi and Email. Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important

More information

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus.

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. Wireless at KU KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus. The Campus IT map provides building locations where

More information

Windows PEAP-GTC Supplicant Plug-In

Windows PEAP-GTC Supplicant Plug-In Windows PEAP-GTC Supplicant Plug-In Configuration Guide This document describes the installation and configuration of a supplicant plug-in that supports Protected Extensible Authentication Protocol (PEAP)

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

Wireless Network Quality of Service WHITE PAPER

Wireless Network Quality of Service WHITE PAPER Wireless Network Quality of Service WHITE PAPER Executive Summary Most wireless deployments rely on cellular data networks for connectivity, which have bandwidth constraints. The quality of service (QoS)

More information

STUDENT WIFI. Linux. Manual v2.1 27-1-2012 ICT SERVICE IDENTIFICATIEFICHE: STUDENT WIFI. Linux

STUDENT WIFI. Linux. Manual v2.1 27-1-2012 ICT SERVICE IDENTIFICATIEFICHE: STUDENT WIFI. Linux ICT SERVICE Manual v2.1 27-1-2012 IDENTIFICATIEFICHE: Servicedomein ICT-Omgeving voor Studenten Service StudentenWifi Service-eigenaar ICT / SC Type Handleiding Versienummer v2.1 Locatie Website Datum

More information

Cryptographic Primitives for Secure Communication

Cryptographic Primitives for Secure Communication Cryptograpi Primitives for Seure Communiation Dr. Craig A. Ri Computer Siene Department Cal Poly Pomona www.supomona.edu/ ~ ari/biograpy/primitives.pdf Cryptograpi Primitives Random Number Generator (RNG)

More information

Remote Access Technical Guide To Setting up RADIUS

Remote Access Technical Guide To Setting up RADIUS Remote Access Technical Guide To Setting up RADIUS V 2.4 Published: 09 May 2006 1 Index 1 Index...2 1.1 Other Relevant Documents...2 2 Introduction...3 2.1 Authentication realms...3 2.2 Installing IAS...4

More information

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015

San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015 San José State University CS160, Software Engineering, Sections 1, 2, and 4, Fall, 2015 Course and Contact Information Instructor: Office Location: H. Chris Tseng MH213 Telephone: (408) 924-7255 Email:

More information

Wireless computer access at K-State

Wireless computer access at K-State Wireless computer access at K-State Information Technology Services provides wireless access across campus for both the K-State community and for campus visitors. Instructions for connecting to KSU Wireless

More information

Belnet Networking Conference 2013

Belnet Networking Conference 2013 Belnet Networking Conference 2013 Thursday 12 December 2013 @ http://events.belnet.be Workshop roaming services: eduroam / govroam Belnet Aris Adamantiadis, Nicolas Loriau Bruxelles 05 December 2013 Agenda

More information

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted

More information

Identikey Server Performance and Deployment Guide 3.1

Identikey Server Performance and Deployment Guide 3.1 Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'

More information

Chellam a Wi-Fi IDS/Firewall for Windows. SecurityTube.net

Chellam a Wi-Fi IDS/Firewall for Windows. SecurityTube.net Chellam a Wi-Fi IDS/Firewall for Windows Vivek Ramachandran B.Tech, ECE IIT Guwahati 802.1x, Cat65k Cisco Systems WEP Cloaking Defcon 19 Caffe Latte Attack Toorcon 9 Media Coverage CBS5, BBC Microsoft

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

Responsibility Matrix

Responsibility Matrix Akamai Technologies Inc. Responsibility Matrix PCI-DSS 3.0 Requirement 12.8.2 Table of Contents Purpose... 2 Overview... 2 Disclaimer... 2 Responsibility Matrix... 3 Purpose Akamai provides below a detailed

More information

JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者

JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者 JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.japancert.com 1 年 で 無 料 進 級 することに 提 供 する Exam : 70-643 Title : Windows Server 2008 Applications Infrastructure, Configuring Vendors : Microsoft Version :

More information

Application Note User Groups

Application Note User Groups Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...

More information

Version 5 - July 2015 IT Services Page 2

Version 5 - July 2015 IT Services Page 2 Version 5 - July 2015 IT Services Page 2 Contents 1. Introduction 4 2. Initial connection 5 3. Network Registration 6 4. Network registration: Scanning your computer (network remediation) 8 5. System check

More information

Colubris TechNote. Testing and Troubleshooting Active- Directory. Revision 1.3 Mar. 2008 Author: Dave Leger

Colubris TechNote. Testing and Troubleshooting Active- Directory. Revision 1.3 Mar. 2008 Author: Dave Leger Colubris TechNote Testing and Troubleshooting Active- Directory Revision 1.3 Mar. 2008 Author: Dave Leger Colubris Networks 200 West St. Suite 300 Waltham, MA 02451 www.colubris.com Page 1 Contents OBJECTIVE...

More information

How to Connect to UAB s Wireless Networks

How to Connect to UAB s Wireless Networks How to Connect to UAB s Wireless Networks Sections: Page: Checking Windows XP for Service Pack 3 3 Configuring Windows XP SP3 to Connect to uabwifi-nac: Part I 5 Configuring Windows Vista to Connect to

More information

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published: 2015-02-10 Pulse Policy Secure RADIUS Server Management Guide Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved iii Pulse Secure, LLC 2700 Zanker Road,

More information

The BYOD PEAP Show. isec Partners

The BYOD PEAP Show. isec Partners The BYOD PEAP Show Mobile Devices Bare Auth Josh Yavor isec Partners DEF CON XXI August, Josh Yavor (isec Partners) The BYOD PEAP Show DEF CON XXI, August, / Introduction Welcome A Perfect Storm 1 1 noaa.gov

More information

Aradial Enforcer / AAA Features & capabilities

Aradial Enforcer / AAA Features & capabilities Aradial Enforcer / AAA Features & capabilities 2013 Aradial This document contains proprietary and confidential information of Aradial and shall not be reproduced or transferred to other documents, disclosed

More information

Securing Wireless LANs with LDAP

Securing Wireless LANs with LDAP A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security

More information

Architecture Statement

Architecture Statement Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2016 Primex Wireless, Inc. The Primex logo is a registered trademark of Primex

More information

WIRELESS LAN SECURITY FUNDAMENTALS

WIRELESS LAN SECURITY FUNDAMENTALS WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography

More information

Name: Date: UTS Login: ACD Login: Guest EID: Fall 2007 v2007.10.19

Name: Date: UTS Login: ACD Login: Guest EID: Fall 2007 v2007.10.19 CopyrightAlaynaWadleighandBlaineHensley 2008.Thisworkistheintellectualpropertyofthe author.permissionisgrantedforthismaterialto besharedfornon commercial,educational purposes,providedthatthiscopyrightstatement

More information

ST. JOSEPH S GRAMMAR SCHOOL DONAGHMORE. BYOD Policy. Bring Your Own Device Policy (Student)

ST. JOSEPH S GRAMMAR SCHOOL DONAGHMORE. BYOD Policy. Bring Your Own Device Policy (Student) ST. JOSEPH S GRAMMAR SCHOOL DONAGHMORE BYOD Policy Bring Your Own Device Policy (Student) Rationale St. Joseph s Grammar School ICT department has devised this policy for use with Sixth Form pupils (Year

More information