Differences between revisions 8 and 9
Revision 8 as of 2018-09-15 16:41:04
Size: 4424
Editor: frekk
Comment:
Revision 9 as of 2018-09-15 23:12:08
Size: 4525
Editor: frekk
Comment:
Deletions are marked like this. Additions are marked like this.
Line 13: Line 13:
  * Simply save the certificate somewhere on your computer, open it and click the "Install" button.

UCC offers its members wireless access to its network and its internet connection. It broadcasts the networks UCC (2.4GHz) and UCC-5 (5GHz).

Windows 10

Microsoft, in its desire to make everyone's lives harder, has removed any easily accessible option to disable certificate validation on wireless networks in a recent-ish update to Windows 10.

As a result, there are 2 options to connect to the UCC wifi from Windows 10.

  • Download and install the UCC CA certificate and try connecting again.

    • Simply save the certificate somewhere on your computer, open it and click the "Install" button.
  • Open "Network and Sharing Center", and find the button option to add a wireless network manually.
    1. Enter UCC or UCC-5 as the SSID.

    2. Select WPA2-Enterprise for the connection security.

    3. Do not exit the wizard yet, on the last screen there is a button for "More settings". Click this to open the old Windows 7 interface for configuring wireless networks.
      • From here you can follow step 3 under the Windows 7 section below.

Windows 7

The following process will allow you to connect from a Windows 7 machine. The same or a very similar process will probably hold for other cases.

  1. From the taskbar or control panel, open the Network and Sharing Centre, then click "Manage wireless networks".
  2. "Add" a new wireless network, manually, with name "UCC", with WPA2-Enterprise security and AES encryption.
  3. From the next screen, click change settings. From the security tab:
    1. Click change settings. Ensure:
      1. "Validate server certificate" is unchecked.
      2. Authentication method is EAP-MSCHAP v2.
      3. From the settings button next to authentication method, "use Windows login information" is not checked.
    2. Click "Advanced settings". Ensure:
      1. "Specify authentication method" is checked.
      2. The authentication method is "user authentication". You can save your credentials here if you like.
  4. You should now be able to connect with your normal UCC login name and password.

Other OSs

Probably just works (tm), choose PEAP-MSCHAPv2 or similar and your username/password.

Technical Setup

There are a number of wireless access points around Cameron Hall run by UCC. These include:

  • smallwing, a very nice new (June 2018) Ubiquiti Unifi nanoHD which provides the main clubroom wifi.

  • sharpchin, a 2.4GHz device branded as "RouterBoard" located on a shelf in UniSFA

  • abe, an identical 2.4GHz "RouterBoard" device stuck to the wall above the cable housing in UWAnime.

Until some time in May 2018, UCC also had a public wireless network which was broadcast from the top shelf of a rack in the machine room by clearwing a 2.4GHz 802.11g device. It has since been deprecated and may be found somewhere in the machine room.

The UWA IT department, sometime shortly prior to 2018, decided to install 4 Unifi access points in Cameron Hall. Previously, UCC was the only source of WiFi in Cameron Hall. Currently the 2.4GHz spectrum is thoroughly congested and there are no unused channels.

The authenticated wifi networks in the clubroom, UCC and UCC-5, are served by smallwing (192.168.2.21), which runs Ubiquiti's custom Linux distribution. There is a management interface installed on the container salmon (currently running on Medico) which can be accessed internally as https://salmon.ucc.asn.au:8443/.

smallwing is powered using the PoE injector which it came with, using 802.3af PoE. It is possible that the club has or could obtain compatible PoE modules for use in Bitumen in case we wanted to.

The devices abe and sharpchin serve the authenticated wifi network "UCC" in the other clubrooms and run some proprietary operating system with administrative web interfaces on 192.168.2.34 and 192.168.2.31 respectively.

Spare devices

A few devices are lying around which aren't currently in use. These include:

  • coromandel, a 2.4/5GHz device placed on top of a corner of the machine room.

    • Runs OpenWRT of some sort.
    • Configured to use IP 192.168.2.20 on VLAN 1 or accessible with DNS as coromandel.ucc.gu.uwa.edu.au

  • clearwing, the old 802.11g router used for the public wifi.

  • An unnamed device branded "RouterBoard", likely of the same variety as abe and sharpchin.