Nanyang Technological University

NTU Wireless Network Frequently Asked Questions

 

Who can use the NTU Wireless Network?
This network is open to all matriculated students, staff, alumni of the University,visitors, including students and staff of NIE (National Institute of Education). Visitors can obtain a free one day account for login to NTU Wireless Network
(Back to top)

Do I have to pay for using the NTU Wireless Network?
The use of NTU Wireless Network is provided free, until further notice, to all matriculated students and staff of the University,visitors, including students and staff of NIE. End-user must however purchase their own computer/laptop and wireless LAN cards to access this network.
(Back to top)

Do I have to authenticate each time I use the NTU Wireless Network?
Yes you need to. Before accessing the Internet, Intranet and other non-web application such as FTP, Telnet, Terminal Services, or your ISP Mails, etc. you will need to use the Wireless web logon page to authenticate with your Username and Password . Please sign in using your Nework Account in the form of DOMAIN\username:

  • NTU staff - use staff\username
  • NTU students - use student\username
  • NTU alumni - use assoc\username
  • NIE staff - use niestaff\username
  • NIE students - use niestudent\username


Or you will also be able to select from the domain drop down list for the approriate domain group that you belongs to.

Please note your session will time-out if your connection remains idle for 60 minutes (after logon). You will then be prompted to re-authenticate again.
(Back to top)

I have signed in to NTU Wireless Network from the web browser. Due to a software problem, I had to reboot my laptop but I was able to access the Internet without signing in again. Why is this so?
When you sign in to NTU Wireless Network, an inactivity timer is started to keep monitor of your connection. If you establishes a new connection i.e. restart your laptop, etc. before the duration of the inactivity timer, you're not required to re-authenticate. However if you establishes a new connection after the inactivity timer had expired, you'll then be prompted to re-sign in again. This inactivity timer has been programmed to automatically expires when your connection becomes idle for 60 minutes.
(Back to top)

How do I get full data privacy on NTU Wireless Network?
While wireless has its convenience, it also come with it's inherent risk as well. For full data privacy after connecting to wireless, you are strongly recommend to use the VPN (Virtual Private Network) service to "dial-out" of NTU Wireless Network (as you normally would using VPN on the Internet to access NTU). To check out VPN and setup, please click here.
(Back to top)

What is VPN (Virtual Private Network)?
VPN is a mode of access which "tunnel" or establish an end-to-end encrypted channel to protect private communications over public network like the Internet or wireless LAN. To use VPN, you'll need to have the VPN client installed on your machine.To check out this setup, please click here.
(Back to top)

I have set my computer to "Obtain an IP address automatically".
How do I verify that my machine has been assigned an IP address?

To verify that your computer has been assigned an IP address:

  • In Windows 95/98/ME: at the command prompt type winipcfg
  • In Windows NT/2000/XP/Vista/Win7: at the command prompt type ipconfig
  • For LINUX, UNIX machine: at the system prompt type ifconfig


You should be able to see the TCP/IP configurations of your computer as shown:

  • IP Address - 172.22.x.x
  • Subnet Mask - 255.255.x.x
  • Default Gateway - 172.22.x.x

(Back to top)

How can I determine whether TCP/IP is installed correctly on my computer?
You can try using the ping command by typing the IP loopback address of 127.0.0.1 at the command prompt i.e. :

ping 127.0.0.1 You should be able to see reply messages as shown:

    Pinging 127.0.0.1 with 32 bytes of data: Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Reply from 127.0.0.1: bytes=32 time<10ms TTL=128 Ping statistics for 127.0.0.1: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms

Successful use of ping indicates that the IP configuration of your system is probably functional.
(Back to top)

How can I verify that I am connected to the NTU Wireless Network?In most OS, there are network icons for the WLAN card installed. By clicking on the icon, normally the details of connection can be displayed and hence verified. For example, windows XP shows the connection details when the network icon is clicked. It shows there is wirelss connection and signal strength is excellent with the green signal indicator indicating the signal level.


In Vista/Win7, a green signal strength bar is also shown besides the Wireless Network Connection that can be used to verified if wireless connection is established and the signal strength of the conection. No Internet access is been reported below because NTUWL requires user to sign-in to the web login page before Internet access is allowed.

(Back to top)

I am not able to get to the Internet even though I have an IP address, what can be done?
Please check your web browser's proxy setting. There should not have any proxy settings configured. You do not need to set proxy manually.
(Back to top)

I encountered the error "Limited or no connectivity", what can be done?
This message can result from several different combinations of errors and configuration problems. The message is received when there is no proper connectivity to the wireless network due to the possible reasons below.

  • Unable to obtain IP addresses on the wireless card. Verify that the card is set to obtain IP address automatically. Verify the IP address obtained are correct from the steps shown earlier in this section.
  • Insufficient wireless coverage at the location. Weak signals could result in intermittent connectivity and trigger this error message. Observe the signal strength indictor reported on wireless card. If possible move to location with greater strength.

(Back to top)

Some of my peers Windows machines do not show up in My Network Places or Network Neighborhood. Why?

  • Please first check your Windows machine has been configured as a member of a Workgroup (peer-to-peer networking) or a Domain i.e. Student or Staff
  • You need also to logon to the Windows Logon prompt during startup to view peer machines in My Network Places or Network Neighborhood
  • Lastly for remote host machines to be viewed by others in My Network Places or Network Neighborhood, they must have the File And Print Sharing for Microsoft Network component enabled too. For post Windows9x machines, this component/option is already installed and enabled by default

(Back to top)

What is a Rogue Access Point?
Rogue Access Point is a wireless base station connected to the campus network without planning or permission from the network administrator.
(Back to top)

Why am I not allowed to extend the network point in my room with a wireless Access Point or Base Station? These unauthorized extensions or setup are perilous to a network's security as it opens up the wired LAN to unauthorized access over the airwaves. We take serious views on the setup of these "rogue" Access Points. Periodically we also perform routine scans of the campus airwaves to sniff out these unauthorized Access Points.
(Back to top)

Does my sharing or distributing of movies, music, software, etc. on the campus network or on the Internet using IRC channels, etc. constituting to an offence?
Sharing of movies, music , software using the NTU network whether wired or wireless is prohibited.It could potentially cause bottleneck to occur in the wired/wireless networks due to multiple sessions created to a single sharing originating source.
(Back to top)

There are many network sniffers, file share scanners and port scanning utilities readily available on the Internet. Why am I not allowed to try out these software on the NTU Wireless Network?
Network sniffing, file share scanning and port scanning are some of the tools/tricks used by attackers to break into computers, prying into users' data privacy or accounts. Your use of these utilities will be construed as acts to learn and explore weakness in a target computer, a group of computers or attempts at retrievals of user accounts and passwords. While your "experimentation" may not be of malicious intent, we take very serious views of such activities that are perilous to IT security.
(Back to top)

Does CITS check my computer for vulnerabilities?
We periodically does automated scans of campus subnets for viruses, intrusion attacks and systems vulnerabilities. However please play your part by ensuring your computers are installed with reputable and up-to-date anti-virus software. Make it a habit to apply the latest security patches and service packs to your computers to prevent network intrusions or attacks exploiting the weaknesses of your computer or operating systems.
(Back to top)

Is it alright if I keep my computer on and connected to the NTU Wireless Network 24-hours a day?
We do not encourage this as leaving your computer always on and active on the network leaves you more vulnerable to attacks by hackers and virus infection/intrusion. It also draws the attention of potential hackers thereby exposing your computer to unnecessary security risks. Our advice is therefore to switch off your computer when it is not being used.
(Back to top)

My built-in wireless LAN adapter does not work on NTU Wireless Network. Why is this so?
Please update the latest drivers for your built-in wireless LAN adapter. These drivers are usually available for download from your laptop manufacturer website.
(Back to top)

What physical impediments can interfere with my wireless network reception?
Here are is a short list on common causes of interference:

  • Steel bar in concrete wall
  • Metal frame, Glass wall into building
  • Office wall
  • Metal door
  • Metal cabinet
  • Microwave oven or other wireless equipment operating in the 2.4GHZ (ISM) radio wave range

We suggest that you keep/position away from large metal objects such as filing cabinets or doors for a better wireless reception.
(Back to top)

Which are the certified Wireless LAN cards?
For the list of wireless LAN cards, please click here.
(Back to top)

Which are the supported OS?
In general Wifi connectivity is not OS dependent. Most OS and devices that come with Wifi certified WLAN card should be able to support the Wifi standards and connect to open, unencrypted wireless network NTUWL. Connection to SSID NTUSECURE will requires the OS to support the security standards WPA2/AES and 802.1x type EAP-PEAP. However, most of the common OS are Windows XP, Wndows Vista, Windows 7, MacOS, Mobile devices (Mobile phones, Blackberry, IPhone etc) running Symbian OS, Windows Mobile OS, IPhone OS etc.
(Back to top)

Share Article