Wireless Network
The UIC community wireless network identifies itself as UIC-WiFi. The UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise includes AES encryption and 802.1x authentication. The specific authentication method that we use is PEAP-MSCHAPv2.
Only current students, faculty, and staff can use the UIC-WiFi. Visitors to UIC may be eligible to use UIC-Guest or eduroam.
hide
AVAILABLE TO: Faculty | Students | Staff
FUNDED BY: Basic Bundle | University (Student Areas)
Features
UIC-WiFi uses WPA2 Enterprise Security. WPA2 Enterprise implements the 802.11i security standard, which includes AES encryption and 802.1x authentication. The specific authentication method that we use is PEAP–MSCHAPv2.
More Info
Requirements
- Your valid UIC NetID and password for user authentication
- The wireless network’s certificate, which ensures that your device is actually connecting to UIC-WiFi
- To be close enough to an UIC-WiFi ACCC public wireless access point
Applicability
Everyone using the UIC wireless networks must abide by the ACCC Acceptable Use Policy. There are additional bandwidth and file-sharing limitations on the networks, described in the Acceptable Use Policy for Res-Net and the UIC Public Wireless Networks.
Cost
The UIC-WiFi public network may be used by members of the UIC community at no charge. Students who reside in UIC residence halls must pay the Res-Net charge; this part of the UIC-WiFi network is not public.
Vistors to UIC may be eligible to use either UIC-Guest or eduroam.
C-Stop, BSB
Service Level Agreement
Service Request Fulfillment Time | Standard connections are automatic with valid UIC credentials. Requesting a new access point is determined after an initial site survey with an Technology Solutions Network Technician. |
---|---|
Incident Resolution Time | 3-5 business days unless blueprints are required from Facilities Management |
Service Availability | 24x7 |
Maintenance Window(s) | Approved Technology Solutions maintenance window(s) |
Service Notification Channel(s) | Technology Solutions Service Notices |
Reviewed to Ensure SLA Meets Business Requirements | Provisional SLA - Currently under IT Governance review |
Date Reviewed | Provisional SLA - Currently under IT Governance review |
Service Owner: Jelene Crehan (Interim) |