UCC offers its members wireless access to its network and its internet connection. It broadcasts the networks UCC (2.4 GHz) and UCC-5 (5 GHz). It also maintains an IoT WLAN to segregate wireless sensors and other devices from the main network. That network is called UCC-IoT (2.4 GHz) and UCC-IoT-5 (5 GHz).

Windows 10

Microsoft, in its desire to make everyone's lives harder, has removed any easily accessible option to disable certificate validation on wireless networks in a recent-ish update to Windows 10.

As a result, there are 2 options to connect to the UCC wifi from Windows 10.

  • Download and install the UCC CA certificate and try connecting again.

    • Simply save the certificate somewhere on your computer, open it and click the "Install" button.
  • Open "Network and Sharing Center", and find the button option to add a wireless network manually.
    1. Enter UCC or UCC-5 as the SSID.

    2. Select WPA2-Enterprise for the connection security.

    3. Do not exit the wizard yet, on the last screen there is a button for "More settings". Click this to open the old Windows 7 interface for configuring wireless networks.
      • From here you can follow step 3 under the Windows 7 section below.

Windows 7

The following process will allow you to connect from a Windows 7 machine. The same or a very similar process will probably hold for other cases.

  1. From the taskbar or control panel, open the Network and Sharing Centre, then click "Manage wireless networks".
  2. "Add" a new wireless network, manually, with name "UCC", with WPA2-Enterprise security and AES encryption.
  3. From the next screen, click change settings. From the security tab:
    1. Click change settings. Ensure:
      1. "Validate server certificate" is unchecked.
      2. Authentication method is EAP-MSCHAP v2.
      3. From the settings button next to authentication method, "use Windows login information" is not checked.
    2. Click "Advanced settings". Ensure:
      1. "Specify authentication method" is checked.
      2. The authentication method is "user authentication". You can save your credentials here if you like.
  4. You should now be able to connect with your normal UCC login name and password.

Other OSs

Probably just works (tm), choose PEAP-MSCHAPv2 or similar and your username/password.

Technical Setup

There are a number of wireless access points around Cameron Hall run by UCC. These include:

  • smallwing, a very nice new (June 2018) Ubiquiti Unifi nanoHD which is the main source of WiFi in the clubroom.

  • abe, an identical 2.4GHz MikroTik "RouterBoard" device stuck to the wall above the cable housing in UWAnime.

Until some time in May 2018, UCC also had a public wireless network which was broadcast from the top shelf of a rack in the machine room by clearwing a 2.4 GHz 802.11g device. It has since been deprecated and may be found somewhere in the machine room.

The UWA IT department, sometime shortly prior to 2018, decided to install 4 Unifi access points in Cameron Hall. Previously, UCC was the only source of wifi in Cameron Hall. Currently the 2.4 GHz spectrum is thoroughly congested and there are no unused channels.

In December 2019, the UCC IoT network was added to both smallwing and abe, broadcasting as UCC-IoT and UCC-IoT-5. It currently doesn't do anything, but will Very Soon (tm).

All UCC wifi networks in the clubroom are served by smallwing (192.168.2.21), which runs Ubiquiti's custom Linux distribution. There is a management interface installed on the container salmon (currently running on Medico) which can be accessed internally as https://salmon.ucc.asn.au:8443/. smallwing is powered using the PoE injector which it came with, using 802.3af PoE. The fancy new-old switch Kerosene supports 802.3af/at PoE, so it would be quite possible to power the AP directly from the switch if it was set up to do so.

abe serves the authenticated wifi network UCC in the other clubrooms and run MikroTik's RouterOS with an administrative web interface on 192.168.2.34. It also serves the IoT network UCC-IoT to the rest of Cameron Hall.

Spare devices

A few devices are lying around which aren't currently in use. These include:

  • coromandel, a 2.4/5GHz device placed on top of a corner of the machine room.

    • Runs OpenWRT of some sort.
    • Configured to use IP 192.168.2.20 on VLAN 1 or accessible with DNS as coromandel.ucc.gu.uwa.edu.au

  • clearwing, the old 802.11g router used for the public wifi.

  • An unnamed device branded "RouterBoard", likely of the same variety as abe and sharpchin.

Faulty Devices

  • sharpchin, a 2.4GHz MikroTik "RouterBoard" device formerly located on a shelf in UniSFA, with management IP 192.168.2.31.