SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Introduction


This user guide is meant for users to connect their laptop with Windows XP through
SSID TP-Secure in Temasek Polytechnics.



Microsoft Window XP Wireless Zero Configuration Guide
Operating Systems/Hardware Pre-requisites
   Windows XP, Service Pack 2;
   Window XP Wireless Zero Configuration client
   Ensure that wireless network card’s radio is turn on
   Install Microsoft hotfix; WindowsXP-KB917021-v3-x86-ENU.exe, for WPA2
    support and prevent a Windows wireless client from advertising the wireless
    networks in its preferred networks list
The hotfix can be download from;
http://www.microsoft.com/downloads/details.aspx?familyid=2726F32F-D52B-4F84-
ACE8-F7FC20195769&displaylang=en


Note: Please configure manual proxy script for Internet Explorer and Firefox before
proceeding;

1. In Internet Explorer, on the Tools menu, click Options.
2. On the Connections tab, click LAN Settings.
3. Tick Use automatic configuration script
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK, to save the settings.
6. Click OK to close Internet Options

1. In Mozilla Firefox, on the Tools menu, click Options
2. On the Network tab, click Settings
3. Check Automatic proxy configuration setting URL
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK to save the settings.
6. Click OK to close Options

Wireless Zero Configuration allows Windows to configure and manage your wireless
adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless
access.
Many times Zero Configuration will be disabled if a third-party application is managing
your adapters. For many encrypted data network, Windows Zero Configuration must be
enabled to receive data transmissions.
Verify that Windows Zero Configuration service is running;
1.   Click Windows Start, click Run, type services.msc, and then click Ok.




2.    Under Name Column, scroll to Wireless Zero configuration.




In the Startup Type box, make sure that it is show as Automatic/Manual and the Status
is Started.
If the Status is show blank, right click Wireless Zero Configuration, select Properties,
under General tab, make sure that Startup type is Automatic/Manual, click Start and
then OK.
Setting of SSID, TP-Secure (With Auto-config Script)
Pre-requisite: Windows XP User account type must be Administrator to be able to run
               the script. Please proceed to Setting of SSID, TP-Secure (Manual
               configuration) section if your User account type is not Administrator.


1. Download the Auto-config Script from URL:
                 http://cis.tp.edu.sg/download/xp/TP-Secure-WinXP.exe
   and save it into your computer.


2. Go to the folder location where you saved the Auto-config Script and double click to
run the Auto-config Script (TP-Secure-WinXP.exe).


3. After finishing installing the script, a dialog box will be pop up at the bottom right
corner. Click on it to enter the user credential, user name and user password is required.




                                                         User name and Password will
                                                         be your TP admission number
                                                         and Password.

                                                         Type in TP-STUDENT for
                                                         Logon domain

                                                         Click OK to connect.
After authentication is successful, you have connected to TP-Secure.

In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.



Clearing of your TP admission number and Password

After authentication on the TP wireless network, Windows will store your TP admission
number and Password information permanently. However, if you're sharing the
computer with someone else, you should remove this information to prevent others from
accessing TP wireless network with your personal TP admission number and
Password. There is no built-in solution to resolve this problem.

Please download the script from URL:

                http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe

and double click to run it to remove the cached user data.

Note that this script will only work on Windows XP.

You'll have to run this script every time someone else is using the computer. The script
also requires a restart of your computer.
Should you experience any problem configuring with Auto-config Script, please use
the Manual configuration procedure below.


Setting of SSID, TP-Secure (Manual configuration)

1.   Click Windows Start, click Run, type ncpa.cpl, and then click Ok.




2. In the Network Connections window, right-click the Wireless Network
Connection icon, and then click Properties.




3. In the Wireless Network Connection Properties, click the Wireless Networks tab.
If you do not see a Wireless Networks tab, your network adapter may not support the
Wireless Zero Configuration service. Make sure the Wireless Zero Configuration service
is started and set to automatic.

Ensure that Use Windows to configure my wireless network settings is checked.

4.   Under the Preferred networks, click the Add button.
5. In the Network name (SSID) box, type TP-Secure and select WPA under Network
Authentication and TKIP under Data encryption.

Ensure that Connect even if this network is not broadcasting is checked.
(Note: This option will not be available if you did not install Microsoft Hotfix KB917021)
6. In the Authentication tab, make sure that Enable IEEE 802.1x authentication for
this network is checked.

Select Protected EAP (PEAP) under EAP type and ensure that Authenticate as
computer when computer information is available and Authenticate as guest when
user or computer information is unavilable is not checked.




7. Click Properties and ensure that Validate server certificate is checked.
Select Entrust.net Secure Server Certification Authority under Trusted Root
Certification Authorities

Select Secured password (EAP-MSCHAP v2) under Select Authentication Method
and ensure that Enable Fast Reconnect is checked.
8. Click Configure, and ensure Automatically use my Windows logon name and
password (and domain if any) is not checked.




9.   Click OK, four times until you have existed from the wireless network connection.


10. A dialog box from your system tray will appear stating Click here to select a
certificate or other credentials for connection to the network TP-Secure.
     Click on this box.
11. Enter your TP credential when prompted.




                                                        User name and Password will
                                                        be your TP admission number
                                                        and Password.

                                                        Type in TP-STUDENT for
                                                        Logon domain

                                                        Click OK to connect.



After authentication is successful, you have connected to TP-Secure.

In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.


Clearing of your TP admission number and Password

After authentication on the TP wireless network, Windows will store your TP admission
number and Password information permanently. However, if you're sharing the
computer with someone else, you should remove this information to prevent others from
accessing TP wireless network with your personal TP admission number and
Password. There is no built-in solution to resolve this problem.

Please download the script from URL:

                http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe

and double click to run it to remove the cached user data..

Note that this script will only work on Windows XP.

You'll have to run this script every time someone else is using the computer. The script
also requires a restart of your computer.

Contenu connexe

Similaire à 1 Student Windows Xp Tp Secure Guide

7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qigCesar Estela Zarate
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501TSOLUTIONS
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enHerrySyafitri
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networksRociocmf
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.pptnaghamallella
 
Training Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183xTraining Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183xAbdelilah CHARBOUB
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qigAkibo Davies
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfacearco zhang
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example97148881557
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationFIDO Alliance
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?HusseinMuhaisen
 

Similaire à 1 Student Windows Xp Tp Secure Guide (20)

Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
 
T hin client configuration
T hin client configurationT hin client configuration
T hin client configuration
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
Examen
ExamenExamen
Examen
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.ppt
 
Training Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183xTraining Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183x
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig
 
push_notification
push_notificationpush_notification
push_notification
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interface
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to Authentication
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

1 Student Windows Xp Tp Secure Guide

  • 1. Introduction This user guide is meant for users to connect their laptop with Windows XP through SSID TP-Secure in Temasek Polytechnics. Microsoft Window XP Wireless Zero Configuration Guide Operating Systems/Hardware Pre-requisites  Windows XP, Service Pack 2;  Window XP Wireless Zero Configuration client  Ensure that wireless network card’s radio is turn on  Install Microsoft hotfix; WindowsXP-KB917021-v3-x86-ENU.exe, for WPA2 support and prevent a Windows wireless client from advertising the wireless networks in its preferred networks list The hotfix can be download from; http://www.microsoft.com/downloads/details.aspx?familyid=2726F32F-D52B-4F84- ACE8-F7FC20195769&displaylang=en Note: Please configure manual proxy script for Internet Explorer and Firefox before proceeding; 1. In Internet Explorer, on the Tools menu, click Options. 2. On the Connections tab, click LAN Settings. 3. Tick Use automatic configuration script 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK, to save the settings. 6. Click OK to close Internet Options 1. In Mozilla Firefox, on the Tools menu, click Options 2. On the Network tab, click Settings 3. Check Automatic proxy configuration setting URL 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK to save the settings. 6. Click OK to close Options Wireless Zero Configuration allows Windows to configure and manage your wireless adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless access. Many times Zero Configuration will be disabled if a third-party application is managing your adapters. For many encrypted data network, Windows Zero Configuration must be enabled to receive data transmissions.
  • 2. Verify that Windows Zero Configuration service is running; 1. Click Windows Start, click Run, type services.msc, and then click Ok. 2. Under Name Column, scroll to Wireless Zero configuration. In the Startup Type box, make sure that it is show as Automatic/Manual and the Status is Started. If the Status is show blank, right click Wireless Zero Configuration, select Properties, under General tab, make sure that Startup type is Automatic/Manual, click Start and then OK.
  • 3. Setting of SSID, TP-Secure (With Auto-config Script) Pre-requisite: Windows XP User account type must be Administrator to be able to run the script. Please proceed to Setting of SSID, TP-Secure (Manual configuration) section if your User account type is not Administrator. 1. Download the Auto-config Script from URL: http://cis.tp.edu.sg/download/xp/TP-Secure-WinXP.exe and save it into your computer. 2. Go to the folder location where you saved the Auto-config Script and double click to run the Auto-config Script (TP-Secure-WinXP.exe). 3. After finishing installing the script, a dialog box will be pop up at the bottom right corner. Click on it to enter the user credential, user name and user password is required. User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect.
  • 4. After authentication is successful, you have connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded. Clearing of your TP admission number and Password After authentication on the TP wireless network, Windows will store your TP admission number and Password information permanently. However, if you're sharing the computer with someone else, you should remove this information to prevent others from accessing TP wireless network with your personal TP admission number and Password. There is no built-in solution to resolve this problem. Please download the script from URL: http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe and double click to run it to remove the cached user data. Note that this script will only work on Windows XP. You'll have to run this script every time someone else is using the computer. The script also requires a restart of your computer.
  • 5. Should you experience any problem configuring with Auto-config Script, please use the Manual configuration procedure below. Setting of SSID, TP-Secure (Manual configuration) 1. Click Windows Start, click Run, type ncpa.cpl, and then click Ok. 2. In the Network Connections window, right-click the Wireless Network Connection icon, and then click Properties. 3. In the Wireless Network Connection Properties, click the Wireless Networks tab. If you do not see a Wireless Networks tab, your network adapter may not support the Wireless Zero Configuration service. Make sure the Wireless Zero Configuration service is started and set to automatic. Ensure that Use Windows to configure my wireless network settings is checked. 4. Under the Preferred networks, click the Add button.
  • 6. 5. In the Network name (SSID) box, type TP-Secure and select WPA under Network Authentication and TKIP under Data encryption. Ensure that Connect even if this network is not broadcasting is checked. (Note: This option will not be available if you did not install Microsoft Hotfix KB917021)
  • 7. 6. In the Authentication tab, make sure that Enable IEEE 802.1x authentication for this network is checked. Select Protected EAP (PEAP) under EAP type and ensure that Authenticate as computer when computer information is available and Authenticate as guest when user or computer information is unavilable is not checked. 7. Click Properties and ensure that Validate server certificate is checked. Select Entrust.net Secure Server Certification Authority under Trusted Root Certification Authorities Select Secured password (EAP-MSCHAP v2) under Select Authentication Method and ensure that Enable Fast Reconnect is checked.
  • 8. 8. Click Configure, and ensure Automatically use my Windows logon name and password (and domain if any) is not checked. 9. Click OK, four times until you have existed from the wireless network connection. 10. A dialog box from your system tray will appear stating Click here to select a certificate or other credentials for connection to the network TP-Secure. Click on this box.
  • 9. 11. Enter your TP credential when prompted. User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect. After authentication is successful, you have connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded. Clearing of your TP admission number and Password After authentication on the TP wireless network, Windows will store your TP admission number and Password information permanently. However, if you're sharing the computer with someone else, you should remove this information to prevent others from accessing TP wireless network with your personal TP admission number and Password. There is no built-in solution to resolve this problem. Please download the script from URL: http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe and double click to run it to remove the cached user data.. Note that this script will only work on Windows XP. You'll have to run this script every time someone else is using the computer. The script also requires a restart of your computer.