How to use eduroam
To use eduroam you must first set up your computer/device. The best way is to install the eduroam CAT tool, just visit http://cat.eduroam.org and follow the guides.
If your device isn’t online, download the cat tool and put it on a flash drive, visit IT or an LRC to use the CAT installer flash drive, or follow the manual instructions below.
eduroam (education roaming) is the secure, wireless internet roaming access service developed for the research and education community.
eduroam allows students and staff to obtain Internet connectivity across participating colleges, schools, universities and hospitals with no additional configuration. (http://www.eduroam.org) https://www.ja.net/products-services/janet-connect/eduroam
eduroam is a wireless network service which makes use of more secure and efficient technologies to allow us to connect safely to the internet. Based on 802.1x authentication technology this service supports most devices; however, there are some devices such as game consoles, which are not supported by the eduroam service. The following devices are not supported on eduroam as they do not support the underlying WPA2 Enterprise/AES technology:
- Microsoft X-Box 360
- Sony Playstation 3
- Nintendo DSi
- Google Chromecast
- Apple Airplay
- Nintendo Wii
- Sony PSP
- Most Wireless Printers
- These next options will vary slightly per device.
- Go to your wifi settings
- Add, and type or choose the eduroam network for the ssid - Note the lowercase ‘e’ in eduroam
- EAP Method: PEAP
- Phase-2 authentication: MSCHAPv2
- Enter your College login details email@example.com & the password
- If there is an ‘anonymous identity’ box, put firstname.lastname@example.org to protect your privacy.
- Next, although you are connected, your connection is insecure, please download the eduroam cat tool from http://cat.eduroam.org and follow the guides.
It is also very important that your operating system is up to date and protected by antivirus software.
Install security updates
Any computer connected to the College network and the Internet is a target for unauthorised users who can try to access your system. Intruders could watch all your actions on the computer, cause damage by deleting files or changing your data, or steal valuable information such as passwords or credit adaptor numbers. Alternatively intruders may not be interested in your data and instead want control of your computer so they can use it to launch attacks to disrupt other systems. Some attacks known as worms spread automatically from one vulnerable system to another. Don't think "an attacker would never be interested in me": an automated worm can infect and disrupt millions of computers.
There are three main ways in which an attack on your computer could be successful:
- New vulnerabilities (holes) are always being discovered in computer software. These holes can be exploited to gain access. Software vendors fix the holes by producing patches or new versions, but it is up to you to obtain and install these fixes.
- You could be enticed to run a trojan or virus. A trojan looks like something else to encourage you to click on it but its real purpose is to open up a back door on your computer. Viruses spread by infecting other legitimate computer programs. Trojans and viruses are often spread through email attachments, file-sharing and messaging, and may appear to come from someone you know who is also infected.
- Some software has settings (sometimes the default settings) that allow other users to access your computer unless you change the settings to be more secure. For example, file-sharing built-in to Windows can allow other users to view, modify or add files on your hard disk, which is an obvious risk unless turned off or configured carefully.
To ensure your computer is not vulnerable to attack you need to:
- Install software patches and new versions to fix known holes.
- Follow advice to change software settings to be more secure, or not run known insecure software at all.
- Don't run unknown files and unsolicited attachments to avoid trojans or viruses.
- Run up-to-date anti-virus software.
- Keep backup copies on disk, CD or a network server of important data.
eduroam (education roaming) is the secure, wireless internet roaming access service developed for the research and education community. eduroam allows students, researchers and staff to obtain Internet connectivity across campus and when visiting other participating institutions by simply opening their laptop or connecting their mobile device.
Visiting Users from other organisations participating in eduroam will receive full access to the Internet (as per JRS2 specification) whilst connected via eduroam at Coleg Ceredigion. Visiting Users should contact their home organisation for any technical support and should ensure that their device is configured to work on their local 'eduroam' service prior to trying to connect at Coleg Ceredigion.
Whilst at Coleg Ceredigion Home Users are filtered in line with the college Internet and IT Systems Policy and must use the college Web Filtering Appliance (or Proxy Server). Whilst roaming at another organisation there may be no filtering in place (inline with JRS2 specification). However, users must still uphold the Internet and IT Systems Policy, as any unsuitable activity whilst roaming can and will be traced back to the user.
Before roaming to another organisation. Home users should ensure that their device is connected and configured to use the eduroam service.