Docstoc

Internet and Wi-Fi Setup 2010

Document Sample
Internet and Wi-Fi Setup 2010 Powered By Docstoc
					Internet/Wi-Fi Setup
      Manual
     Information Technology Services
         Trinity University August 2010
               Welcome to Trinity University!

          There are three steps to set up your computer: configuring wireless
access, downloading and installing Clean Access, and downloading and install-
ing Trinity University’s required anti-virus software.

          In order to connect to the campus network and the Internet, you
must have a username and password. Each new student was sent his or her
username and password via email over the summer. This is the same user-
name and password used when logging into Tiger’s Lair. Returning students
will use the same username and password they had the previous year.

If you have forgotten your password, please visit https://password.trinity.edu
          or contact the Helpdesk at x7409 or helpdesk@trinity.edu.


There will be four Internet/Wi-Fi Assistance sessions in the Witt
  Center lobby. The sessions will be held during the following
                             times:

                 DATE                                   TIMES
            Friday, August 20                      8:00 AM – 5:00 PM

           Saturday, August 21                     8:00 AM – 5:00 PM

           Sunday, August 22                       10:00 AM – 1:00 PM
           Monday, August 23                       12:00 PM – 5:00 PM




                        Student Computer Service Center
Beginning Tuesday, August 24, please visit the Student Computer Service Cen-
  ter (SCSC) for computer related issues such as virus and spy-ware removal,
software installation, and wired/wireless network connectivity resolution. The
  SCSC is staffed with student workers employed by ITS to assist users in the
                  residence halls with computer-related issues.

           LOCATION                                   HOURS
        Winn Residence Hall                       Monday – Friday
            Room 103                             2:00 PM - 7:00 PM
                                      1
                       TABLE SETUP—WINDOWS
                     COMPUTER OF CONTENTS 7


Computer Setup – Windows 7 .............................................. 3
  Wireless Configuration .......................................................... 3
  Installing Clean Access........................................................... 6
  Installing Sophos Anti-Virus .................................................. 9

Computer Setup – Windows Vista ...................................... 13
  Wireless Configuration ........................................................ 13
  Installing Clean Access......................................................... 22
  Installing Sophos Anti-Virus ................................................ 27

Computer Setup – Windows XP ............................................. 30
  Wireless Configuration ........................................................ 30
  Installing Clean Access......................................................... 35
  Installing Sophos Anti-Virus ................................................ 40

Computer Setup – Mac OS (Snow Leopard)......................... 44
  Wireless Configuration ........................................................ 44
  Installing Clean Access......................................................... 47
  Installing Sophos Anti-Virus ................................................ 51

Computer Setup – Mac OS (Leopard) .................................... 59
  Wireless Configuration ........................................................ 59
  Installing Clean Access......................................................... 63
  Installing Sophos Anti-Virus ................................................ 67

Wired Configuration (Network Cable) ................................... 75

Wi-Fi Devices ..................................................................... 76




                                            2
                  COMPUTER SETUP—WINDOWS 7
                         WIRELESS CONFIGURATION
 Trinity University provides wireless network access to all students. There are
 two wireless networks (TUSecure and TUGuest) available across all of upper
              and lower campus, including in the residence halls.
Note: In some computers, there is a Wi-Fi Connection Utility – THIS HAS TO BE
 DISABLED so that your operating system takes over. If you have any ques-
 tions, bring your computer to the “Internet and Wi-Fi Assistance” sessions–
                            see page 1 for times.
 Make sure that your Wi-Fi connection is enabled by turning the Wi-Fi switch
                         on your computer to ON.




To connect to TUSecure in Windows 7, follow these steps:
STEP 1: Move the mouse to the task bar and left click on the icon that resem-
bles wireless signal bars.




                                       3
                 COMPUTER SETUP—WINDOWS 7
STEP 2: Left-click on the TUSecure network to select it. Ensure that
the Connect automatically box is checked, then click the Connect button.




STEP 3: Once the Connect button is pressed, a Windows Security box will
appear. Within the username field, type trinity\ followed by your username
(e.g. trinity\tuser), and then type the password in the appropriate box.
Click OK.




                                    4
                  COMPUTER SETUP—WINDOWS 7
 STEP 4: Should a Windows Security Alert box open, click
 the Connect button to proceed.




 STEP 5: If the machine was able to successfully connect to the network, a
 message bubble should appear with the message, "Additional log on infor-
 mation may be required." This is the point at which Trinity University re-
 quired software, Clean Access, must be installed in order to proceed.




 IMPORTANT: If you are unable to connect to TUSecure Wireless Network or
your desktop computer is not wireless, please turn to page 75 of this manual
  and follow the directions to connect to the network using a network cable.


     Otherwise, proceed to “Installing Clean Access” on the next page.




                                      5
                 COMPUTER SETUP—WINDOWS 7
                     INSTALLING CLEAN ACCESS
 Clean Access is a network security solution that will provide you with a se-
cure and clean network environment by preventing infected and vulnerable
machines from joining the University's network. The following steps will help
       guide you through downloading and setting up Clean Access.



STEP 1: Open Internet Explorer. (Other browsers will not function properly.)
The Clean Access webpage will open automatically.

STEP 2: On the Clean Access Logon webpage, enter your Trinity Username
and Password. This is the same username and password used when log-
ging into Tiger’s Lair. Click Continue.




STEP 3: Once you have logged into Clean Access, you will be redirected to a
page that asks you to download the Clean Access Agent. Click the button
that says Launch Cisco NAC Windows Agent 4.7.2.10.




                                      6
                 COMPUTER SETUP—WINDOWS 7
STEP 4: You may see an error message like the one below. Click on the
Download Cisco NAC Agent 4.7.2.10 button to download and save the file.




STEP 5: When prompted, “Do you want to run or save this file?” choose
Save.




STEP 6: The Save As window will open. Save the Update.exe program to your
computer’s desktop.

STEP 7: Close the Download Complete and browser windows. From your desk-
top double-click on the Update.exe program.

STEP 8: When prompted, “The publisher could not be verified. Are you sure
you want to run this software?” choose Run.




                                    7
                  COMPUTER SETUP—WINDOWS 7
STEP 9: The Cisco NAC Agent Install window will appear followed by a User
Account Control window. Choose the Yes button to authorize software in-
stallation.

STEP 10: In the Cisco NAC Agent window, type in your Trinity username and
password, and click on the Log In button.




STEP 11: From the Temporary Network Access window, click on Repair to
install the mandatory software. This is necessary for Internet use and access
to Trinity resources.




                                       8
                  COMPUTER SETUP—WINDOWS 7
                 INSTALLING SOPHOS ANTI-VIRUS
  Running multiple anti-virus software programs simultaneously can be very
  detrimental to your computer. Trinity University requires that Sophos Anti-
              Virus be installed on all student-owned computers.
 Before installing Sophos, all anti-virus software should be uninstalled from
                                your computer.

 In order to manually uninstall your anti-virus programs, please follow
 these steps:


     1.   From your desktop, select Windows > Control Panel.
     2.   In the Control Panel, click Programs > Uninstall a program.
     3.   Identify any anti-virus program that you are currently running such
          as Symantec, Norton, McAfee or AVG Anti-Virus. Select it and
          click the Uninstall button.
     4.   When the uninstall has finished, click Yes to restart your computer.
     5.   Log into Clean Access again to continue installing Sophos as shown
          below.


STEP 1: A second Temporary Network Access window will appear. Click on the
Go To Link button to install Sophos Anti-Virus software.




                                       9
                  COMPUTER SETUP—WINDOWS 7
STEP 2: From the Security Warning window that asks, “Do you want to run or
save this file?” choose the Save button.




STEP 3: Save the SAVSCFXP-4-10.exe file to your computer’s desktop and
close the Download Complete window.




STEP 4: Navigate to the SAVSCXP-4-10.exe file on your desktop and double-
click on it to begin installing Sophos Anti-Virus software.




                                     10
                  COMPUTER SETUP—WINDOWS 7
STEP 5: After clicking on SAVSCFXP.exe, a Security Warning window asking,
“The publisher could not be verified. Are you sure you want to run this soft-
ware?” appears. Choose Run to continue.




STEP 6: Sophos will install on your computer. If prompted by a User Account
Control window, click Yes to authorize software installation. If a Program
Compatibility Assistant window appears, choose This program installed cor-
rectly.



STEP 7: After the Sophos installation is complete, restart your computer
when prompted. If, after restarting and logging in to the Cisco NAC Agent,
you are prompted to “Repair” your computer again, please proceed with the
additional software installation.




                                      11
                 COMPUTER SETUP—WINDOWS 7

                 Completing the Setup Process
It is very important that you go on to the next steps to ensure the security
of your data and also to enable your access to Trinity’s network resources.

Use the checklist below to help you complete the setup process.

   Apply Network Settings. This will allow you to access the network
       resources that Trinity provides you, including access to the latest
       versions of the Office products and access to some class folders
       that instructors may provide in your courses. This will only take a
       few minutes.

        http://iraa.trinity.edu/iraa/x5522.xml


    Map Network Drives. This will allow you to easily locate the online
       resources available to you, including a personal space for you to
       store your files and folders that is backed up every night. This will
       only take a few minutes.

        http://iraa.trinity.edu/iraa/x5522.xml


    Download Microsoft Office from Trinity’s Server. Download and install
       the newest version of Microsoft Office. Allow roughly 30 minutes.

        http://iraa.trinity.edu/iraa/x520.xml




                       CONGRATULATIONS!
             YOU ARE NOW ON OUR NETWORK.


                                     12
                COMPUTER SETUP—WINDOWS VISTA
                      WIRELESS CONFIGURATION
 Trinity University provides wireless network access to all students. There are
 two wireless networks (TUSecure and TUGuest) available across all of upper
              and lower campus, including in the residence halls.
Note: In some computers, there is a Wi-Fi Connection Utility – THIS HAS TO BE
 DISABLED so that your operating system takes over. If you have any ques-
 tions, bring your computer to the “Internet and Wi-Fi Assistance” sessions–
                            see page 1 for times.


 Make sure that your Wi-Fi connection is enabled by turning the Wi-Fi switch
on your computer to ON. If you DO NOT see any networks listed, click refresh.
If you still do not see a list as shown below, proceed to Page 16 to configure
                             wireless access manually.

To connect to TUSecure in Windows Vista, follow these steps:
STEP 1: Locate the network icon on the bottom left-hand corner of your desk-
top and click on it.




STEP 2: In the Connect to a Network window, you should see TUSecure
listed. Select it and click Connect.




                                       13
               COMPUTER SETUP—WINDOWS VISTA

STEP 3: In the Connect to a network window – click on Enter/select addi-
tional log on information.




STEP 4: Enter your Trinity User name, Password, and in the Logon domain
box, type Trinity. Click OK to continue.




                                     14
                COMPUTER SETUP—WINDOWS VISTA

STEP 5: If prompted for additional login information, select Enter/select addi-
tional log on information.




STEP 6: Validate the server certificate by clicking on OK.




 You should now be connected. If so, please continue on page
                           22.


              If not, please go to page 16 and continue.
                                       15
               COMPUTER SETUP—WINDOWS VISTA

         To connect manually, follow these instructions.

STEP 1: In the Connect to a Network window, click Set up a connection or
network as shown below.




 STEP 2: Select Manually connect to a wireless network. Click Next to con-
 tinue.




                                     16
              COMPUTER SETUP—WINDOWS VISTA

STEP 3: Enter the configuration information as shown below. Click Next to
continue.




STEP 4: Click on Change connection settings.




                                    17
              COMPUTER SETUP—WINDOWS VISTA


STEP 5: Click on the Security tab. The network authentication method
should be Protected EAP (PEAP). Click on Settings... to continue.




                                    18
               COMPUTER SETUP—WINDOWS VISTA


STEP 6: Enter the following configuration information as shown below. Click
Configure… to continue.




                                      19
              COMPUTER SETUP—WINDOWS VISTA


STEP 7: Uncheck the box next to Automatically use my Windows logon name
and password (and domain if any).




STEP 8: Exit the nested dialog boxes.
a. Click OK to close the EAP MSCHAPv2 Properties dialog box. (Step 7)
b. Click OK to close the Protected EAP Properties dialog box. (Step 6)
c. Click OK to close the TUSecure Wireless Network properties dialog
box. (Step 5)




STEP 9: A balloon dialog should popup in the bottom right-hand corner of
your screen. Click on it.




                                    20
              COMPUTER SETUP—WINDOWS VISTA

STEP 10: Enter your network User name, Password and in the Logon do-
main box enter TRINITY. Click OK.




IMPORTANT: If you are unable to connect to TUSecure Wireless Network
or need to connect your computer using a cable, please turn to page 75 of
 this manual and follow the directions to connect to the network using a
                             network cable.


    Otherwise, proceed to “Installing Clean Access” on the next page.

                                   21
              COMPUTER SETUP—WINDOWS VISTA
                     INSTALLING CLEAN ACCESS
 Clean Access is a network security solution that will provide you with a se-
cure and clean network environment by preventing infected and vulnerable
machines from joining the University's network. The following steps will help
       guide you through downloading and setting up Clean Access.



STEP 1: Open Internet Explorer. (Other browsers will not function properly.)
The Clean Access webpage will open automatically.

STEP 2: On the Clean Access Logon webpage, enter your Trinity Username
and Password. This is the same username and password used when log-
ging into Tiger’s Lair. Click Continue.




STEP 3: Once you have logged into Clean Access, you will be redirected to a
page that asks you to download the Clean Access Agent. Click the button
that says Launch Cisco NAC Windows Agent 4.7.2.10.




                                     22
                COMPUTER SETUP—WINDOWS VISTA
STEP 4: You may see an error message like the one below. If so, click on the
Download Cisco NAC Agent 4.7.2.10 button to download and save the file.




 STEP 5: When the download completes, click Run. This will launch the Clean
 Access Installer.




 (If prompted with an Internet Explorer Security Warning, click Run or Allow
                        to continue with installation.)




                                      23
               COMPUTER SETUP—WINDOWS VISTA
STEP 6: If the Cisco Clean Access Agent—InstallShield Wizard screen ap-
pears, please follow these steps:




Note: A User Account Control window will appear. To install Clean Access
(SAV7.exe), click Allow to trust this program to install.


STEP 7: Once Clean Access has finished installing, enter your Trinity User-
name and Password. Click Log In.




                                      24
               COMPUTER SETUP—WINDOWS VISTA
STEP 8: From the Temporary Network Access window, choose Repair and
then select the Go To Link button to install any security patches and hot-
fixes to your operating system.




STEP 9A: If you have downloaded all required updates and patches for Win-
dows including Windows Vista Service Pack 2 (SP2) prior to arriving on cam-
pus, proceed to Installing Sophos Anti-Virus on page 27.

STEP 9B: If you have NOT downloaded all of the required updates for Win-
dows, you will need to do so now. Please follow these instructions to install
the required updates and to install SP2 for Windows Vista.


         INSTALL SP2 FOR WINDOWS VISTA:
          When prompted by a dialog box, click Go to Link to begin in-
            stalling SP2.

            The Windows Update dialog box will open. Follow prompts to
             install updates.

         PLEASE NOTE, these updates can take 60 minutes or more to
         download and install depending on your computer.




                                      25
                COMPUTER SETUP—WINDOWS VISTA
STEP 10: Once SP2 and all updates have been successfully installed, click Fin-
ish. Your computer will now restart automatically.

STEP 11: When your computer restarts, WAIT for the User Control Access
dialogue box to appear and click Continue.

STEP 12: Log in to Clean Access again using your Trinity User Name and Pass-
word as shown in Step 7. Proceed to Installing Sophos Anti-Virus.




                                       26
               COMPUTER SETUP—WINDOWS VISTA
                 INSTALLING SOPHOS ANTI-VIRUS
  Running multiple anti-virus software programs simultaneously can be very
  detrimental to your computer. Trinity University requires that Sophos Anti-
              Virus be installed on all student-owned computers.
 Before installing Sophos, all anti-virus software should be uninstalled from
                                your computer.


 In order to manually uninstall your anti-virus programs, please follow
 these steps:


     1.   From your desktop, select Windows > Control Panel.
     2.   In the Control Panel, click Programs > Uninstall a program.
     3.   Identify any anti-virus program that you are currently running such
          as Symantec, Norton, McAfee or AVG Anti-Virus. Select it and
          click the Uninstall button.
     4.   When the uninstall has finished, click Yes to restart your computer.
     5.   Log into Clean Access again to continue installing Sophos as shown
          below.




STEP 1: When the screen below appears, click on Go To Link and follow the
directions to install the program.




                                      27
              COMPUTER SETUP—WINDOWS VISTA

STEP 2: Click Run if you see these dialogue boxes:




STEP 3: The Temporary Network Access window will remain visible with the
Go To Link button grayed out. DO NOT CLOSE this window until Sophos has
finished applying software updates.

STEP 4: When installation is complete, you will be prompted to restart your
computer.

STEP 5: Once your computer has restarted, WAIT for User Account Control
window to appear – click Continue.

STEP 6: A Clean Access dialogue box will appear. Log into Clean Access us-
ing your Trinity username and password.




                                     28
              COMPUTER SETUP—WINDOWS VISTA

                 Completing the Setup Process
It is very important that you go on to the next steps to ensure the security
of your data and also to enable your access to Trinity’s network resources.

Use the checklist below to help you complete the setup process.

   Apply Network Settings. This will allow you to access the network
       resources that Trinity provides you, including access to the latest
       versions of the Office products and access to some class folders
       that instructors may provide in your courses. This will only take a
       few minutes.

        http://iraa.trinity.edu/iraa/x275.xml


    Map Network Drives. This will allow you to easily locate the online
       resources available to you, including a personal space for you to
       store your files and folders that is backed up every night. This will
       only take a few minutes.

        http://iraa.trinity.edu/iraa/x275.xml


    Download Microsoft Office from Trinity’s Server. Download and install
       the newest version of Microsoft Office. Allow roughly 30 minutes.

        http://iraa.trinity.edu/iraa/x520.xml




                       CONGRATULATIONS!
             YOU ARE NOW ON OUR NETWORK.


                                     29
                  COMPUTER SETUP—WINDOWS XP
                     WIRELESS CONFIGURATION
 Trinity University provides wireless network access to all students. There are
 two wireless networks (TUSecure and TUGuest) available across all of upper
              and lower campus, including in the residence halls.
  Note: In some computers, there is a Wi-Fi Connection Utility – THIS HAS TO
   BE DISABLED so that your operating system takes over. If you have any
  questions, bring your computer to the “Internet and Wi-Fi Assistance” ses-
                         sions– see page 1 for times.
 Make sure that your Wi-Fi connection is enabled by turning the Wi-Fi switch
                         on your computer to ON.
  Returning Students: Right click on your wireless icon in the taskbar, select
                       TUSecure, then click Connect.

                  New Students: Follow instructions below.

 To connect to TUSecure in Windows XP, follow these steps:
 STEP 1: Click on the Windows wireless icon on your taskbar.




STEP 2: This dialogue box appears: Choose a wireless network




STEP 3: Click on Change advanced settings on the left.
                                       30
                 COMPUTER SETUP—WINDOWS XP
STEP 4: Click on the Wireless Networks tab. Click on Add.




STEP 5: Enter the configuration settings as shown below.




                                      31
                 COMPUTER SETUP—WINDOWS XP
 STEP 6: Click on the Authentication tab. In EAP type, select Protected EAP
 (PEAP) from drop down box. Uncheck “Authenticate as computer…” Then
 click on Properties.




STEP 7: Select the configuration settings as shown below. Then click Config-
ure.




                                      32
                COMPUTER SETUP—WINDOWS XP

STEP 8: Uncheck the box next to Automatically use my Windows logon name
and password (and domain if any).




STEP 9: Exit the nested dialog boxes.
a. Click OK to close the EAP MSCHAPv2 Properties dialog box. (Step 8)
b. Click OK to close the Protected EAP Properties dialog box. (Step 7)
c. Click OK to close the TUSecure properties dialog box. (Step 6)
d. Click OK to close the Wireless Network Connection 2 Properties dialog
    box. (Step 4)


STEP 10: A balloon dialog should popup in the bottom right-hand corner of
your screen. Click on it.




                                    33
                 COMPUTER SETUP—WINDOWS XP

STEP 11: Enter your Trinity credentials: User name, Password and enter
TRINITY as Login domain. Click OK.




STEP 12: If all settings are correct, a balloon dialog will popup that says,
“You are connected!”




IMPORTANT: If you are unable to connect to TUSecure Wireless Network
 or your desktop computer is not wireless, please turn to page 75 of this
 manual and follow the directions to connect to the network using a net-
                               work cable.


    Otherwise, proceed to “Installing Clean Access” on the next page.

                                       34
                COMPUTER SETUP—WINDOWS XP
                     INSTALLING CLEAN ACCESS
 Clean Access is a network security solution that will provide you with a se-
cure and clean network environment by preventing infected and vulnerable
machines from joining the University's network. The following steps will help
       guide you through downloading and setting up Clean Access.



STEP 1: Open Internet Explorer. (Other browsers will not function properly.)
The Clean Access webpage will open automatically.

STEP 2: On the Clean Access Logon webpage, enter your Trinity Username
and Password. This is the same username and password used when log-
ging into Tiger’s Lair. Click Continue.




STEP 3: Once you have logged into Clean Access, you will be redirected to a
page that asks you to download the Clean Access Agent. Click the button
that says Download Cisco NAC Agent 4.7.2.10.




                                     35
                  COMPUTER SETUP—WINDOWS XP
STEP 4: You may see an error message like the one below. If so, click on the
Download Cisco NAC Agent 4.7.2.10 button to download and save the file.




 STEP 5: If prompted with a Security Alert dialog box, click Yes to continue.




 STEP 6: At the Security Warning dialog box that states, “Do you want to
 run or save this file?” choose Run.




                                      36
                 COMPUTER SETUP—WINDOWS XP
 STEP 7: An Internet Explorer – Security Warning dialog box asking, “The
 publisher could not be verified. Are you sure you want to run this soft-
 ware?” will appear. Click on Run to install the Cisco NAC Agent.




STEP 8: Once the NAC Agent has finished installing, enter your Trinity User-
name and Password. Click the Log In button.




                                      37
                 COMPUTER SETUP—WINDOWS XP
STEP 9: A Temporary Network Access window should appear explaining you
have optional requirements that are failing. Choose Repair and then choose
Go To Link to install necessary patches and hotfixes.




                                     38
                 COMPUTER SETUP—WINDOWS XP
STEP 10A: If you have downloaded all required updates and patches for
Windows including Windows XP Service Pack 3 (SP3) prior to arriving on
campus, proceed to Installing Sophos Anti-Virus on page 40.

STEP 10B: If you have NOT downloaded all of the required updates for Win-
dows, you will need to do so now. Please follow the instructions and install
the required updates including SP3 for Windows XP.


        INSTALLING SP3 FOR WINDOWS XP
            When prompted by a dialog box, click Go to Link to begin in-
             stalling SP3.

            If prompted by an Internet Explorer Security Warning, click
             Run.

            At the Windows Update site, follow all directions until com-
             pleted.

        PLEASE NOTE: these updates can take 60 minutes or more to
        download and install depending on your computer.

STEP 11: Once SP3 has been successfully installed, click Finish. Your com-
puter will now restart automatically.


STEP 12: When your computer restarts, the Clean Access Agent will auto-
matically pop back up. Log in again using your Trinity username and pass-
word. Proceed to Installing Sophos Anti-Virus on page 40.




                                     39
                  COMPUTER SETUP—WINDOWS XP
                   INSTALLING SOPHOS ANTI-VIRUS
 Running multiple anti-virus software programs simultaneously can be very
 detrimental to your computer. Trinity University requires that Sophos Anti-
            Virus be installed on all student-owned computers.
 Before installing Sophos, all other anti-virus programs currently running
               on your computer will need to be uninstalled.

 In order to manually uninstall your anti-virus programs, please follow
 these steps:


     1.   From your desktop, select Windows > Control Panel.
     2.   In the Control Panel, click Programs > Uninstall a program.
     3.   Identify any anti-virus program that you are currently running such
          as Symantec, Norton, McAfee or AVG Anti-Virus. Select it and
          click the Uninstall button.
     4.   When the uninstall has finished, click Yes to restart your computer.
     5.   Log into Clean Access again to continue installing Sophos as shown
          below.




STEP 1: After logging into the Cisco NAC Agent, click on Repair.




                                      40
                COMPUTER SETUP—WINDOWS XP
STEP 2: At the second Temporary Network Access window, ensure Sophos
Anti-Virus is mentioned and click on Go To Link.




STEP 3: When prompted Do you want to run or save this file? choose to
Run the SAVSCFXP-4.10.exe file.




                                   41
                 COMPUTER SETUP—WINDOWS XP
 STEP 4: Sophos Anti-Virus will begin downloading on your computer. Once
 the download is complete, a Security Warning dialog box will appear that
 says, “The publisher could not be verified. Are you sure you want to run
 this software?” Choose Run to install Sophos.




STEP 5: After verifying Sophos has completed its installation, you will be
prompted to restart your computer. Once complete, proceed to Completing
the Setup Process on page 43.




                                     42
                COMPUTER SETUP—WINDOWS XP

                 Completing the Setup Process
It is very important that you go on to the next steps to ensure the security
of your data and also to enable your access to Trinity’s network resources.

Use the checklist below to help you complete the setup process.

   Apply Network Settings. This will allow you to access the network
       resources that Trinity provides you, including access to the latest
       versions of the Office products and access to some class folders
       that instructors may provide in your courses. This will only take a
       few minutes.

        http://iraa.trinity.edu/iraa/x307.xml


    Map Network Drives. This will allow you to easily locate the online
       resources available to you, including a personal space for you to
       store your files and folders that is backed up every night. This will
       only take a few minutes.

        http://iraa.trinity.edu/iraa/x307.xml


    Download Microsoft Office from Trinity’s Server. Download and install
       the newest version of Microsoft Office. Allow roughly 30 minutes.

        http://iraa.trinity.edu/iraa/x314.xml




                       CONGRATULATIONS!
             YOU ARE NOW ON OUR NETWORK.


                                     43
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)
                        WIRELESS CONFIGURATION
Trinity University provides wireless network access to all students. There are
two wireless networks (TUSecure and TUGuest) available across all of upper
             and lower campus, including in the residence halls.

To connect to TUSecure in Mac OS, follow these steps:

STEP 1: On the top toolbar, locate the Airport icon:


STEP 2: Select Open Network Preferences…




STEP 3: The Network window should now be open. Click on Advanced to
continue.




                                      44
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 4: In this network window select the 802.1x tab. Click on the “+” sign
located in the bottom left-hand corner of the network window and select
Add User Profile.




STEP 5: Fill in your Trinity User Name and Password fields. In the Wireless
Network field type TUSecure, and under Authentication check PEAP. Clear
all other check marks.




                                     45
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 6: Click Apply and close the Network window.




STEP 7: Click on the Airport icon again and select TUSecure.




STEP 8: When prompted, input your Trinity username and password and
select OK.




                                     46
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)
                    INSTALLING CLEAN ACCESS

 Clean Access is a network security solution that will provide you with a se-
cure and clean network environment by preventing infected and vulnerable
machines from joining the University's network. The following steps will help
       guide you through downloading and setting up Clean Access.


STEP 1: Open Safari. (Other browsers will not function properly.) The Clean
Access webpage will open automatically.


STEP 2: On the Clean Access Logon webpage, enter your Trinity Username
and Password. This is the same username and password used when log-
ging into Tiger’s Lair. Click Continue.




STEP 3: Once you have logged into Trinity’s Clean Access System, you will be
redirected to a page that asks you to Download Cisco NAC Agent. Click on
the button to download the Clean Access Agent.




                                     47
        COMPUTER SETUP—MAC OS (SNOW LEOPARD)
STEP 4: When visible, double-click on the CCAAgent_MacOSX-3.tar file to
decompress it.




STEP 5: Double click on the icon to select it. A new file should appear
named CCAAgent.pkg. Double-click on the icon to begin the installation
process.




                                    48
        COMPUTER SETUP—MAC OS (SNOW LEOPARD)
STEP 6: A Welcome to Cisco Clean Access Agent Installer window will open.
Click the Continue button to move forward through the windows.




                                   49
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 7: When you reach the final installer window, press the Install button.




STEP 8: When installation is complete, click the Close button.




STEP 9: Enter your User Name and Password, and then click on Login.




                                     50
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)
              SOPHOS ANTIVIRUS INSTALLATION
 You must uninstall any existing anti-virus software before installing Trin-
ity’s Sophos Anti-Virus. Failure to do so will result in computer connection
          problems that may require reinstallation of MAC OS X.



STEP 1: From the taskbar, select Go and Connect to Server…




STEP 2: In the Server Address box, type afp://tucc-tiger and click on Con-
nect.




                                     51
        COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 3: Enter your Trinity Username and Password and click Connect.




STEP 4: From the Select volumes to mount window, select macpublic and
click OK.




STEP 5: Double click on TigerNet.




                                    52
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 6: Navigate to the Sophos Anti-Virus folder and double click to open.




STEP 7: Double click on the Sophos.dmg file.




STEP 8: Double click on the Sophos Anti-Virus.mpkg file to begin the instal-
lation process.




                                     53
        COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 9: The Install Sophos Anti-Virus window appears. Click Continue to
begin the installation process.




STEP 10: The Welcome to the Sophos Anti-Virus Installer page appears.
Click the Continue button.




                                    54
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 11: The Important Information window will appear. Click on Continue
to proceed.




STEP 12: The Select a Destination window will appear. Click on the name of
the location Sophos is to be installed. In the example below the name of the
hard drive is Leopard (yours may be named differently). A green arrow will
display indicating your selection. Click the Continue button to proceed to
the next step.


The example also shows two additional hard drives. Most computers will
only show one hard drive.




                                     55
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 13: The next step identifies space requirements for installing Sophos.
Click on the Install button to continue.




STEP 14: You will now be prompted to input your Name and Password to
proceed.


Enter YOUR Name and Password for your local machine, NOT your Trinity
University username and password, then click OK.




                                     56
        COMPUTER SETUP—MAC OS (SNOW LEOPARD)

STEP 15: The Installing Sophos Anti-Virus window will appear. Click Con-
tinue when prompted.




STEP 16: Once the Installation Completed Successfully window appears,
click on the Close button.




STEP 17: Restart your computer.




                                    57
         COMPUTER SETUP—MAC OS (SNOW LEOPARD)

                 Completing the Setup Process
It is very important that you go on to the next steps to ensure the security
of your data and also to enable your access to Trinity’s network resources.

Use the checklist below to help you complete the setup process.

   Apply Network Settings. This will allow you to access the network
       resources that Trinity provides you, including access to the latest
       versions of the Office products and access to some class folders
       that instructors may provide in your courses. This will only take a
       few minutes.

        http://iraa.trinity.edu/iraa/x308.xml


    Map Network Drives. This will allow you to easily locate the online
       resources available to you, including a personal space for you to
       store your files and folders that is backed up every night. This will
       only take a few minutes.

        http://iraa.trinity.edu/iraa/x308.xml


    Download Microsoft Office from Trinity’s Server. Download and install
       the newest version of Microsoft Office for Mac. Allow roughly 30
       minutes.

        http://iraa.trinity.edu/iraa/x364.xml




                       CONGRATULATIONS!
             YOU ARE NOW ON OUR NETWORK.


                                     58
             COMPUTER SETUP—MAC OS (LEOPARD)
                        WIRELESS CONFIGURATION
Trinity University provides wireless network access to all students. There are
two wireless networks (TUSecure and TUGuest) available across all of upper
             and lower campus, including in the residence halls.

To connect to TUSecure in Mac OS, follow these steps:

STEP 1: On the top toolbar, locate the Airport icon:


STEP 2: Select Open Network Preferences…




STEP 3: The Network window should now be open. Click on Advanced to
continue.




                                      59
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 4: In this network window select the 802.1x tab. Click on the “+” sign
located in the bottom left-hand corner of the network window, and select
Add User Profile.




STEP 5: Fill in your Trinity User Name and Password fields. In the Wireless
Network field type TUSecure, and under Authentication check PEAP. Clear
all other check marks.




                                     60
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 6: Select the AirPort tab. Click on the “+” sign to add TUSecure to the
preferred network list. In “Network Name,” enter TUSecure. In “Security,”
select from the drop-down arrow WPA2 Enterprise. Your User Name and
Password will fill in automatically. If not, type it in, and click on Add.




STEP 7: From the Preferred Networks window, click on and drag TUSecure
to the top of the list. Click on OK and Apply.




                                     61
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 8: Click on the AirPort icon in the task bar and choose Turn AirPort
Off. Wait 10 seconds, then turn AirPort back on. If prompted with a Verify
Certificate window, click Continue to proceed.




                                    62
             COMPUTER SETUP—MAC OS (LEOPARD)
                    INSTALLING CLEAN ACCESS

 Clean Access is a network security solution that will provide you with a se-
cure and clean network environment by preventing infected and vulnerable
machines from joining the University's network. The following steps will help
       guide you through downloading and setting up Clean Access.

STEP 1: Open Safari. (Other browsers will not function properly.) The Clean
Access webpage will open automatically.
STEP 2: On the Clean Access logon webpage, enter your Trinity Username
and Password. This is the same username and password used when log-
ging into Tiger’s Lair. Click Continue.




STEP 3: Once you have logged into Trinity’s Clean Access System, you will be
redirected to a page that asks you to Download Cisco NAC Agent. Click on
the button to download the Clean Access Agent.

                          Download Cisco NAC Agent

STEP 4: If you are running Mac OS 10.3 or later, the file will download as a
compressed .tar file. Double-click on the .tar file to decompress it.




                                     63
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 5: Double click on the icon to select it. A new file named
CCAAgent.pkg should appear. Double-click on the icon to begin the installa-
tion process.




STEP 6: A Welcome to Cisco Clean Access Agent Installer window will open.
Click the Continue button to move forward through the windows.




                                    64
             COMPUTER SETUP—MAC OS (LEOPARD)




STEP 7: When you reach the final installer window, press the Install button.




STEP 8: When installation is complete, click the Close button.




                                     65
            COMPUTER SETUP—MAC OS (LEOPARD)

STEP 9: Enter your User Name and Password, and then click on Login.




                                   66
             COMPUTER SETUP—MAC OS (LEOPARD)
              SOPHOS ANTIVIRUS INSTALLATION
 You must uninstall any existing anti-virus software before installing Trin-
ity’s Sophos Anti-Virus. Failure to do so will result in computer connection
          problems that may require reinstallation of MAC OS X.



STEP 1: From the taskbar, select Go and Connect to Server…




STEP 2: In the Server Address box, type afp://tucc-tiger and click on Con-
nect.




                                     67
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 3: Enter your Trinity Username and Password and click Connect.




STEP 4: From the Select volumes to mount window, select macpublic and
click OK.




STEP 5: Double click on TigerNet.




                                    68
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 6: Navigate to the Sophos Anti-Virus folder and double click to open.




STEP 7: Double click on the Sophos.dmg file.




STEP 8: Double click on the Sophos Anti-Virus.mpkg file to begin the install
process.




                                     69
            COMPUTER SETUP—MAC OS (LEOPARD)

STEP 9: The Install Sophos Anti-Virus window appears; click Continue to
begin the install process.




STEP 10: When the Welcome to the Sophos Anti-Virus Installer page ap-
pears, click the Continue button.




                                    70
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 11: The Important Information window will appear. Click on Continue
to proceed.




STEP 12: The Select a Destination window will appear. Click on the name of
the location Sophos is to be installed. In the example below the name of the
hard drive is Leopard (yours may be named differently). A green arrow will
display indicating your selection. Click the Continue button to proceed to
the next step.


The example also shows two additional hard drives. Most computers will
only show one hard drive.




                                     71
             COMPUTER SETUP—MAC OS (LEOPARD)

STEP 13: The next step identifies space requirements for installing Sophos.
Click on the Install button to continue.




STEP 14: You will now be prompted to input your Name and Password to
proceed.


Enter YOUR Name and Password for your local machine, NOT your Trinity
University username and password, then click OK.




                                     72
            COMPUTER SETUP—MAC OS (LEOPARD)

STEP 15: The Installing Sophos Anti-Virus window will appear. When
prompted, click Continue.




STEP 16: Once the Installation Completed Successfully window appears,
click on the Close button.




STEP 17: Restart your computer.




                                   73
             COMPUTER SETUP—MAC OS (LEOPARD)

                 Completing the Setup Process
It is very important that you go on to the next steps to ensure the security
of your data and also to enable your access to Trinity’s network resources.

Use the checklist below to help you complete the setup process.

   Apply Network Settings. This will allow you to access the network
       resources that Trinity provides you, including access to the latest
       versions of the Office products and access to some class folders
       that instructors may provide in your courses. This will only take a
       few minutes.

        http://iraa.trinity.edu/iraa/x308.xml


    Map Network Drives. This will allow you to easily locate the online
       resources available to you, including a personal space for you to
       store your files and folders that is backed up every night. This will
       only take a few minutes.

        http://iraa.trinity.edu/iraa/x308.xml


    Download Microsoft Office from Trinity’s Server. Download and install
       the newest version of Microsoft Office for Mac. Allow roughly 30
       minutes.

        http://iraa.trinity.edu/iraa/x364.xml




                       CONGRATULATIONS!
             YOU ARE NOW ON OUR NETWORK.


                                     74
                       WIRED CONFIGURATION
 Please follow the steps below to connect to Trinity’s network using a net-
 work cable. Network cables will be available for pickup at the Internet and
         Wi-Fi Assistance Sessions. See Page 1 for times and dates.

STEP 1: Plug one end of the network cable into your computer as shown
below. (Need a cable? Call ResLife at x7219 or go to Witt Reception Center.)




STEP 2A: Plug the other end of your network cable into one of the jacks on
the wall labeled D2 or D3. The jack labeled PD1 is for your phone and
should not be used for your computer.


STEP 2B: If both the D2 and D3 jacks are already in use, plug the other end
of your network cable into the jack on the bottom of your telephone. This
jack is labeled 10/100 PC.




STEP 3: Turn ON your computer.


STEP 4: Proceed to the Installing Clean Access section that corresponds to
your operating system. (See page 2)

                                     75
                         WI-FI REGISTRATION

Before connecting your Apple iPhone, iPod Touch, Blackberry or any other
Wi-Fi device to Trinity University's network, you must register the Wi-Fi
address of your device with Information Technology Services.

To register the Wi-Fi address of your device with ITS, you must take the
following three items to one of the four Internet/Wi-Fi Assistance Sessions
(August 20th – August 23rd) in the Witt Center Lobby or to the ITS Helpdesk
in the Information Commons (Coates Library, Third Floor):

1. Completed Wi-Fi Device Registration Form.

(Forms will be available at the Internet/Wi-Fi Assistance Sessions
or http://iraa.trinity.edu/iraa/x518.xml)

2. Your Wi-Fi device

3. Your Trinity ID

All three items must be presented to ITS Helpdesk in order for your
Wi-Fi device to be registered on Trinity's Wi -Fi network.

For instructions on enabling Wi-Fi access on your device, please visit the
Wi-Fi web page on the ITS web site: http://iraa.trinity.edu/iraa/wi-fi.xml.




                                     76
STUDENT COMPUTER SERVICE CENTER
   Winn Residence Hall—Room 103
 Open weekly Monday through Friday
        2:00 PM—7:00 PM

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:6
posted:8/25/2011
language:English
pages:78