Wireless Network: Frequently Asked Questions
Here is a webpage that has instructions for how to find the wired and wireless IP addresses for both Windows and Mac computers:
Here is a webpage that has instructions for how to find the wired and wireless MAC addresses for both Windows and Mac computers:
Configure Computer/Devices for the University wireless Network. Other operating systems may work on the wireless network if the wireless adapter manufacturer supplies 802.1x authentication with the software.
Wiki Article on 802.11n: http://en.wikipedia.org/wiki/802.11n
In order to protect the campus network and our users, unrestricted access to the wireless network is not allowed. Visitors and guests who require access should work with their sponsoring department or office to obtain a guest login for computer registration and access to the wireless network.
The interiors of the buildings and many outside areas are covered by university owned and managed access points. Any personal access points added to the plan would create interference with the radio frequencies that have been configured to provide the best coverage possible. Any "rogue" access point found on the campus network will result in the network port it is connected to being turned off and the person(s) reported to the appropriate dean or manager.
Computers set up to use ad-hoc networking are still broadcasting on the same radio frequency as the managed wireless network and can cause interference. Communications between two or more computers should be accomplished over the campus network.
Wireless radio and network transmissions on the University's network are encrypted using AES (Advanced Encryption Standard).
The 802.11b/g wireless network and a portion of the 802.11n operate in the 2.4 GHz spectrum. Other devices also operate within this spectrum and may cause radio interference. Possible devices causing contention may include microwave ovens, portable phones, Bluetooth enabled devices, and other wireless LANs (which is why rogue access points are not allowed). Information Services will attempt to determine interference sources and reserves the right to disconnect devices that interfere with the wireless network.
Authorized users can access BannerWeb wirelessly, but BannerForms is only accessible over the wireless network after connecting with the VPN.
SSID - Service Set Identifier (i.e., the name of a wireless network, which could be either "urwin" or "Richmond" at the University of Richmond).
AES- A symmetric-key encryption standard that comprises three block ciphers, AES-128, AES-192 and AES-256.
urwin - SSID for the University of Richmond's Wireless Network (for registered users).
Richmond - Default (broadcast) SSID for unregistered users and guests.
WEP - Wired Equivalent Privacy (the original wireless security standard which is considered weak and insufficient for enterprise networks).
WPA - Wi-Fi Protected Access (wireless security standard that provides improved data encryption (TKIP) as well as user authentication via 802.1x). WPA is derived from and is forward compatible with the IEEE 802.11i security standard and is available as a software (device driver) upgrade.
TKIP - Temporal Key Integrity Protocol (improved 128-bit encryption that addresses WEP's known vulnerabilities and ensures that data can be used only by the intended recipient).
802.1x - A user authentication framework for wireless LANs that uses EAP (Extensible Authentication Protocol) for message exchange to a central authentication server such as RADIUS (Remote Authentication Dial-In User Service) to authenticate each wireless user.
WPA2 - The implementation of the 802.11i standard and the next generation of Wi-Fi security first tested in September 2004. It improves WPA by adding a stronger encryption mechanism - AES (Advanced Encryption Standard) but requires a compatible wireless card/chip.
Rogue Access Points - Any access point installed on the campus network that is not owned and managed by the Information Services department.
Peap - Protected Extensible Authentication Protocol, a protocol for transmitting authentication data, including passwords, over 802.11 wireless networks. PEAP authenticates wireless LAN clients using only server-side digital.