SlideShare a Scribd company logo
1 of 14
Download to read offline
Introduction


This user guide is meant for users to connect their laptop with Windows Vista through
SSID TP-Secure in Temasek Polytechnics.


Microsoft Vista Wireless Zero Configuration Guide
Operating Systems/Hardware Pre-requisites
   Window Vista Wireless Zero Configuration client
   Ensure that wireless network card’s radio is turn on

Note: Please configure manual proxy script for Internet Explorer and Firefox before
proceeding;

1. In Internet Explorer, on the Tools menu, click Options.
2. On the Connections tab, click LAN Settings.
3. Tick Use automatic configuration script
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK, to save the settings.
6. Click OK to close Internet Options

1. In Mozilla Firefox, on the Tools menu, click Options
2. On the Network tab, click Settings
3. Check Automatic proxy configuration setting URL
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK to save the settings.
6. Click OK to close Options

Wireless Zero Configuration allows Windows to configure and manage your wireless
adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless
access.
Many times Zero Configuration will be disabled if a third-party application is managing
your adapters. For many encrypted data network, Windows Zero Configuration must be
enabled to receive data transmissions.
Verify that Windows Zero Configuration service is running;
To start Wireless Zero Configuration in Windows Vista you need to log in as an
Administrator.

       Click on Start and Control Panel


       Click on System and Maintenance


       Click on Administrative Tools


       Double click on Services


       In the Services box scroll down the list of Services (Local) until you find the one

       labeled Wired AutoConfig and double click it.

       In the Wired AutoConfig Properties (Local Computer) box change the Startup

       type to Automatic
       Click on Start and once the service has started click on OK


       Now find the service labeled WLAN AutoConfig and double click it.


       In the WLAN AutoConfig Properties (Local Computer) box change

       the Startup type to Automatic

       Click on Start and once the service has started click on OK


       Go to File and Exit to close the Services window

Setting of SSID, TP-Secure (With Auto-config Script)

1. Download the Auto-config Script from URL

              http://cis.tp.edu.sg/download/vista/TP-Secure-WinVista.exe

   and save it into your computer.

2. Go to the folder location where you saved the Auto-config Script and double click to
   run the Auto-config Script (TP-Secure_WinVista.exe).
3. Ensure that the below message screen appear and press any key to close it.




4. If the dialog box as shown below appear, click on it then go to Step 8.
             If the prompt does not appear, go to Step 5.
5. Click Windows Start, click Connect To




6. Select TP-Secure and click Connect
7. Click Enter/select additional log on information




8. Enter your TP credential




                                                      User name and Password will
                                                      be your TP admission number
                                                      and Password.

                                                      Type in TP-STUDENT for
                                                      Logon domain

                                                      Click OK to connect.
9. You have now successfully connected to TP-Secure.




In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.

Should you experience any problem configuring with Auto-config Script, please use
the Manual configuration procedure below.

Setting of SSID, TP-Secure (Manual configuration)

1.   Click Windows Start, click Connect To
2.   Click Set up a connection or network




3.   Select Manually connect to a wireless network
4. Enter the following in the Enter information for the wireless network you want to
add window;
Network name: TP-Secure {network name is Case Sensitive}
Security type: WPA-Enterprise
Encryption: TKIP
Uncheck Start this connection automatically
Check Connect even if the network is not broadcasting
Click on Next.




A dialog box from your system tray will appear stating Additional log on information is
required to connect to this network.

IMPORTANT : DO NOT CLICK THE DIALOG BOX FIRST




5. In the Manually connect to a wireless network window, click on Change
Connection Settings.



6. In the TP-Secure Wireless Network properties window, select the Connection tab
at the top.
   Check Connect even if the network is not broadcasting.

   Check Connect automatically when this network is in range.
7. Click on the Security tab to configure the following:
Security type: WPA-Enterprise
Encryption type: TKIP

IMPORTANT
Make sure the box to the left of Cache user information for subsequent connections to
this network is uncheck so that your personal TP credentials will not be saved in the
laptop.




Under Choose a network authentication method:, select ProtectedEAP (PEAP) and
then click on the Settings... button.


8. Check Validate server certificate.
Select Entrust.net Secure Server Certification Authority under Trusted Root
Certification Authorities
Check Enable Fast Reconnect
Select Secured password (EAP-MSCHAP v2)
Click Configure…
9. Ensure Automatically use my Windows logon name and password (and domain
if any) is not checked.




Click on the OK button at the bottom of this and the previous window to apply the
settings.
10. Click Connect to…




12. Select TP-Secure and click Connect
13. Click Enter/select additional log on information




14. Enter your TP credential




                                                       User name and Password will
                                                       be your TP admission number
                                                       and Password.

                                                       Type in TP-STUDENT for
                                                       Logon domain

                                                       Click OK to connect.
You have now successfully connected to TP-Secure.




In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.

More Related Content

Similar to 2 Student Windows Vista Tp Secure Guide

Pf sense installation and initial setup
Pf sense installation and initial setupPf sense installation and initial setup
Pf sense installation and initial setupHarvey Dime
 
How to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHow to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHost It Smart
 
NHL Troubleshooting Tool
NHL Troubleshooting ToolNHL Troubleshooting Tool
NHL Troubleshooting Toolntufts
 
Troubleshooting Tool
Troubleshooting ToolTroubleshooting Tool
Troubleshooting Toolntufts
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qigCesar Estela Zarate
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qigAkibo Davies
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501TSOLUTIONS
 
Predictive dialer setup guide
Predictive dialer setup guidePredictive dialer setup guide
Predictive dialer setup guideVoicent
 
Paladin Troubleshooting Guide
Paladin Troubleshooting GuidePaladin Troubleshooting Guide
Paladin Troubleshooting Guidehanniw79
 
Team Viewer Basic VideoTutorial
Team Viewer Basic VideoTutorialTeam Viewer Basic VideoTutorial
Team Viewer Basic VideoTutorialRoumayne Landongan
 
paladintroubleshootingguide-1273931003659-phpapp02
paladintroubleshootingguide-1273931003659-phpapp02paladintroubleshootingguide-1273931003659-phpapp02
paladintroubleshootingguide-1273931003659-phpapp02Jamie Southworth
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guiderb pn
 
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docx
Login id  jsnyder47Password  XeGACUkEN8CONNECTING TO THE.docxLogin id  jsnyder47Password  XeGACUkEN8CONNECTING TO THE.docx
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docxSHIVA101531
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniquesShatvikMishra1
 
Sheridan Tech Manual H Quality
Sheridan Tech Manual H QualitySheridan Tech Manual H Quality
Sheridan Tech Manual H Qualityderrick.millard
 
Quick start guide
Quick start guideQuick start guide
Quick start guideVoicent
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 

Similar to 2 Student Windows Vista Tp Secure Guide (20)

Pf sense installation and initial setup
Pf sense installation and initial setupPf sense installation and initial setup
Pf sense installation and initial setup
 
Cisco vpn
Cisco vpnCisco vpn
Cisco vpn
 
How to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHow to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdf
 
T hin client configuration
T hin client configurationT hin client configuration
T hin client configuration
 
NHL Troubleshooting Tool
NHL Troubleshooting ToolNHL Troubleshooting Tool
NHL Troubleshooting Tool
 
Troubleshooting Tool
Troubleshooting ToolTroubleshooting Tool
Troubleshooting Tool
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig
 
Remote Login
Remote LoginRemote Login
Remote Login
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Predictive dialer setup guide
Predictive dialer setup guidePredictive dialer setup guide
Predictive dialer setup guide
 
Paladin Troubleshooting Guide
Paladin Troubleshooting GuidePaladin Troubleshooting Guide
Paladin Troubleshooting Guide
 
Team Viewer Basic VideoTutorial
Team Viewer Basic VideoTutorialTeam Viewer Basic VideoTutorial
Team Viewer Basic VideoTutorial
 
paladintroubleshootingguide-1273931003659-phpapp02
paladintroubleshootingguide-1273931003659-phpapp02paladintroubleshootingguide-1273931003659-phpapp02
paladintroubleshootingguide-1273931003659-phpapp02
 
Paper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guidePaper less-pro-sb-quick-start-guide
Paper less-pro-sb-quick-start-guide
 
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docx
Login id  jsnyder47Password  XeGACUkEN8CONNECTING TO THE.docxLogin id  jsnyder47Password  XeGACUkEN8CONNECTING TO THE.docx
Login id jsnyder47Password XeGACUkEN8CONNECTING TO THE.docx
 
Start Guide for data based optimization techniques
Start Guide for data based  optimization techniquesStart Guide for data based  optimization techniques
Start Guide for data based optimization techniques
 
Sheridan Tech Manual H Quality
Sheridan Tech Manual H QualitySheridan Tech Manual H Quality
Sheridan Tech Manual H Quality
 
Quick start guide
Quick start guideQuick start guide
Quick start guide
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

2 Student Windows Vista Tp Secure Guide

  • 1. Introduction This user guide is meant for users to connect their laptop with Windows Vista through SSID TP-Secure in Temasek Polytechnics. Microsoft Vista Wireless Zero Configuration Guide Operating Systems/Hardware Pre-requisites  Window Vista Wireless Zero Configuration client  Ensure that wireless network card’s radio is turn on Note: Please configure manual proxy script for Internet Explorer and Firefox before proceeding; 1. In Internet Explorer, on the Tools menu, click Options. 2. On the Connections tab, click LAN Settings. 3. Tick Use automatic configuration script 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK, to save the settings. 6. Click OK to close Internet Options 1. In Mozilla Firefox, on the Tools menu, click Options 2. On the Network tab, click Settings 3. Check Automatic proxy configuration setting URL 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK to save the settings. 6. Click OK to close Options Wireless Zero Configuration allows Windows to configure and manage your wireless adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless access. Many times Zero Configuration will be disabled if a third-party application is managing your adapters. For many encrypted data network, Windows Zero Configuration must be enabled to receive data transmissions. Verify that Windows Zero Configuration service is running;
  • 2. To start Wireless Zero Configuration in Windows Vista you need to log in as an Administrator. Click on Start and Control Panel  Click on System and Maintenance  Click on Administrative Tools  Double click on Services  In the Services box scroll down the list of Services (Local) until you find the one  labeled Wired AutoConfig and double click it. In the Wired AutoConfig Properties (Local Computer) box change the Startup  type to Automatic Click on Start and once the service has started click on OK  Now find the service labeled WLAN AutoConfig and double click it.  In the WLAN AutoConfig Properties (Local Computer) box change  the Startup type to Automatic Click on Start and once the service has started click on OK  Go to File and Exit to close the Services window 
  • 3. Setting of SSID, TP-Secure (With Auto-config Script) 1. Download the Auto-config Script from URL http://cis.tp.edu.sg/download/vista/TP-Secure-WinVista.exe and save it into your computer. 2. Go to the folder location where you saved the Auto-config Script and double click to run the Auto-config Script (TP-Secure_WinVista.exe). 3. Ensure that the below message screen appear and press any key to close it. 4. If the dialog box as shown below appear, click on it then go to Step 8.  If the prompt does not appear, go to Step 5.
  • 4. 5. Click Windows Start, click Connect To 6. Select TP-Secure and click Connect
  • 5. 7. Click Enter/select additional log on information 8. Enter your TP credential User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect.
  • 6. 9. You have now successfully connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded. Should you experience any problem configuring with Auto-config Script, please use the Manual configuration procedure below. Setting of SSID, TP-Secure (Manual configuration) 1. Click Windows Start, click Connect To
  • 7. 2. Click Set up a connection or network 3. Select Manually connect to a wireless network
  • 8. 4. Enter the following in the Enter information for the wireless network you want to add window; Network name: TP-Secure {network name is Case Sensitive} Security type: WPA-Enterprise Encryption: TKIP Uncheck Start this connection automatically Check Connect even if the network is not broadcasting Click on Next. A dialog box from your system tray will appear stating Additional log on information is required to connect to this network. IMPORTANT : DO NOT CLICK THE DIALOG BOX FIRST 5. In the Manually connect to a wireless network window, click on Change Connection Settings. 6. In the TP-Secure Wireless Network properties window, select the Connection tab at the top.
  • 9. Check Connect even if the network is not broadcasting.  Check Connect automatically when this network is in range.
  • 10. 7. Click on the Security tab to configure the following: Security type: WPA-Enterprise Encryption type: TKIP IMPORTANT Make sure the box to the left of Cache user information for subsequent connections to this network is uncheck so that your personal TP credentials will not be saved in the laptop. Under Choose a network authentication method:, select ProtectedEAP (PEAP) and then click on the Settings... button. 8. Check Validate server certificate. Select Entrust.net Secure Server Certification Authority under Trusted Root Certification Authorities Check Enable Fast Reconnect Select Secured password (EAP-MSCHAP v2) Click Configure…
  • 11. 9. Ensure Automatically use my Windows logon name and password (and domain if any) is not checked. Click on the OK button at the bottom of this and the previous window to apply the settings.
  • 12. 10. Click Connect to… 12. Select TP-Secure and click Connect
  • 13. 13. Click Enter/select additional log on information 14. Enter your TP credential User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect.
  • 14. You have now successfully connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded.