Acer Apire One (1) Instructions


How to connect a Acer Aspire one notebook to the Eduroam service

The wireless service enables members of the University to connect to the University network and the Internet using their own computers and devices at various locations around the University and Halls of residence. This guide contains instructions to connect a computer to the eduroam wireless service.


Step 1 - Update the OS

You may need to update the NetworkManager application that comes with the installtion in order to use Eduroam. If WPA-Enterprise is not in the list of encryption times under the network connection, they you do need to update.

We have explicitly opened up access to updates for the Acer Aspire One on eduraom-setup
1. Click on Settings in the bottom right hand corner.
2. Click on Live Update
3. Make sure that the NetworkManager update is in the list, then click to install updates.
4. Reboot the machine when prompted.

Step 2 - Updating Network Manager


1. Open a terminal by clicking My Documents under files. Then click on File and then select Terminal
2. Now type su - and press enter, then enter your root password.
3. Now you need to run the following commands:
wget http://swis.swan.ac.uk/aspire1-WPA2-Enterprise.tar.gz
tar -xvzf aspire1-WPA2-Enterprise.tar.gz
./wpa2-enterprise.sh
4. When prompted, type y
5. One that finished you will have updated NetworkManager, you now need to reboot the notebook.
reboot

Step 3 - Configuring NetworkManger


1 NetworkManager should now be installed and running, and you will see a icon (dual monitor if no connection present or wireless signal strength indicators if connected to a wireless network) in your task bar as per the screen shots below.

2. Now NetworkManager is installed right click on the icon in the task bar and select About

3.You can see that the instructions have been written around version 0.7.1. If you have a different version, the rest of this guide may not be accurate.
4. Now you can right click on the icon in the task bar and select Edit Connections....

5. Click on the Wireless Tab

6. You now need to fill in the following inforamtion:
SSID=eduroam
Mode=Infrastructure

7. Next click on the Wireless Security tab and fill in the following information:
Security=WPA & WPA2 ENterprise
Authentication=Protected EAP (PEAP)
Anonymous Identity=123456@swansea.ac.uk (replace 123456 with your username)
CA Certificate=None (If you have the GTE Cybertrust Root Certificate you can select it now)
PEAP=Version 0
Inner Authentication=MSCHAPv2
User Name= You Swansea University email address. (123456@swansea.ac.uk)
Password= Your Swansea University email password.

8. Now click Apply
9. Now close the Network Connections windows by clicking close
10. You are now ready to connect. Left click on the NetworkManager icon in the task bar and select eduroam.

11. If you did not select the GTE Cybertrust Root Certificate you will may be prompted to choose one. Tick the Don't warn me again tick box and then click on Ignore

12. You should now be connected. To check that you are connected corrently right click on the NetworkManager icon and select Connection Information.
13. You shoudl see you have a IP Address that begins with 137.44..

14. It is now important that you set your broswer proxy settings, along with any other applications that use port 80 (HTTP).
15. The proxy server settings are host=wwwcache.swan.ac.uk on port=3128 with NO authentication.

Step 4 - Configuring your Browser

If you want to browse the web to reach any web sites outside the University you must configure your browser to use the web proxy.

Firefox



1. Run Firefox.
2. From the Tools drop down menu select Options...
3. In the Options panel click the 'Advanced' icon/tab.
4. Select the 'Network' tab.
5. Click the 'Settings...' button.
6. Tick the Auto-Detect Proxy Settings for this network button.
7. Choose OK and then in the Options panel choose OK again to finish
8. Close and restart the browser.

Install security updates


Any computer connected to the University network and the Internet is a target for unauthorised users who can try to access your system. Intruders could watch all your actions on the computer, cause damage by deleting files or changing your data, or steal valuable information such as passwords or credit adaptor numbers. Alternatively intruders may not be interested in your data and instead want control of your computer so they can use it to launch attacks to disrupt other systems. Some attacks known as worms spread automatically from one vulnerable system to another. Don't think 'an attacker would never be interested in me': an automated worm can infect and disrupt millions of computers.


There are three main ways in which an attack on your computer could be successful:

* New vulnerabilities (holes) are always being discovered in computer software. These holes can be exploited to gain access. Software vendors fix the holes by producing patches or new versions, but it is up to you to obtain and install these fixes.
* You could be enticed to run a trojan or virus. A trojan looks like something else to encourage you to click on it but its real purpose is to open up a back door on your computer. Viruses spread by infecting other legitimate computer programs. Trojans and viruses are often spread through email attachments, file-sharing and messaging, and may appear to come from someone you know who is also infected.
* Some software has settings (sometimes the default settings) that allow other users to access your computer unless you change the settings to be more secure. For example, file-sharing built-in to Windows can allow other users to view, modify or add files on your hard disk, which is an obvious risk unless turned off or configured carefully.

To ensure your computer is not vulnerable to attack you need to:

* Install software patches and new versions to fix known holes.
* Follow advice to change software settings to be more secure, or not run known insecure software at all.
* Don't run unknown files and unsolicited attachments to avoid trojans or viruses.
* Run up-to-date anti-virus software.
* Keep backup copies on disk, CD or a network server of important data.