SlideShare a Scribd company logo
Introduction


This user guide is meant for users to connect their laptop with Windows XP through
SSID TP-Secure in Temasek Polytechnics.



Microsoft Window XP Wireless Zero Configuration Guide
Operating Systems/Hardware Pre-requisites
   Windows XP, Service Pack 2;
   Window XP Wireless Zero Configuration client
   Ensure that wireless network card’s radio is turn on
   Install Microsoft hotfix; WindowsXP-KB917021-v3-x86-ENU.exe, for WPA2
    support and prevent a Windows wireless client from advertising the wireless
    networks in its preferred networks list
The hotfix can be download from;
http://www.microsoft.com/downloads/details.aspx?familyid=2726F32F-D52B-4F84-
ACE8-F7FC20195769&displaylang=en


Note: Please configure manual proxy script for Internet Explorer and Firefox before
proceeding;

1. In Internet Explorer, on the Tools menu, click Options.
2. On the Connections tab, click LAN Settings.
3. Tick Use automatic configuration script
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK, to save the settings.
6. Click OK to close Internet Options

1. In Mozilla Firefox, on the Tools menu, click Options
2. On the Network tab, click Settings
3. Check Automatic proxy configuration setting URL
4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac
5. Click OK to save the settings.
6. Click OK to close Options

Wireless Zero Configuration allows Windows to configure and manage your wireless
adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless
access.
Many times Zero Configuration will be disabled if a third-party application is managing
your adapters. For many encrypted data network, Windows Zero Configuration must be
enabled to receive data transmissions.
Verify that Windows Zero Configuration service is running;
1.   Click Windows Start, click Run, type services.msc, and then click Ok.




2.    Under Name Column, scroll to Wireless Zero configuration.




In the Startup Type box, make sure that it is show as Automatic/Manual and the Status
is Started.
If the Status is show blank, right click Wireless Zero Configuration, select Properties,
under General tab, make sure that Startup type is Automatic/Manual, click Start and
then OK.
Setting of SSID, TP-Secure (With Auto-config Script)
Pre-requisite: Windows XP User account type must be Administrator to be able to run
               the script. Please proceed to Setting of SSID, TP-Secure (Manual
               configuration) section if your User account type is not Administrator.


1. Download the Auto-config Script from URL:
                 http://cis.tp.edu.sg/download/xp/TP-Secure-WinXP.exe
   and save it into your computer.


2. Go to the folder location where you saved the Auto-config Script and double click to
run the Auto-config Script (TP-Secure-WinXP.exe).


3. After finishing installing the script, a dialog box will be pop up at the bottom right
corner. Click on it to enter the user credential, user name and user password is required.




                                                         User name and Password will
                                                         be your TP admission number
                                                         and Password.

                                                         Type in TP-STUDENT for
                                                         Logon domain

                                                         Click OK to connect.
After authentication is successful, you have connected to TP-Secure.

In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.



Clearing of your TP admission number and Password

After authentication on the TP wireless network, Windows will store your TP admission
number and Password information permanently. However, if you're sharing the
computer with someone else, you should remove this information to prevent others from
accessing TP wireless network with your personal TP admission number and
Password. There is no built-in solution to resolve this problem.

Please download the script from URL:

                http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe

and double click to run it to remove the cached user data.

Note that this script will only work on Windows XP.

You'll have to run this script every time someone else is using the computer. The script
also requires a restart of your computer.
Should you experience any problem configuring with Auto-config Script, please use
the Manual configuration procedure below.


Setting of SSID, TP-Secure (Manual configuration)

1.   Click Windows Start, click Run, type ncpa.cpl, and then click Ok.




2. In the Network Connections window, right-click the Wireless Network
Connection icon, and then click Properties.




3. In the Wireless Network Connection Properties, click the Wireless Networks tab.
If you do not see a Wireless Networks tab, your network adapter may not support the
Wireless Zero Configuration service. Make sure the Wireless Zero Configuration service
is started and set to automatic.

Ensure that Use Windows to configure my wireless network settings is checked.

4.   Under the Preferred networks, click the Add button.
5. In the Network name (SSID) box, type TP-Secure and select WPA under Network
Authentication and TKIP under Data encryption.

Ensure that Connect even if this network is not broadcasting is checked.
(Note: This option will not be available if you did not install Microsoft Hotfix KB917021)
6. In the Authentication tab, make sure that Enable IEEE 802.1x authentication for
this network is checked.

Select Protected EAP (PEAP) under EAP type and ensure that Authenticate as
computer when computer information is available and Authenticate as guest when
user or computer information is unavilable is not checked.




7. Click Properties and ensure that Validate server certificate is checked.
Select Entrust.net Secure Server Certification Authority under Trusted Root
Certification Authorities

Select Secured password (EAP-MSCHAP v2) under Select Authentication Method
and ensure that Enable Fast Reconnect is checked.
8. Click Configure, and ensure Automatically use my Windows logon name and
password (and domain if any) is not checked.




9.   Click OK, four times until you have existed from the wireless network connection.


10. A dialog box from your system tray will appear stating Click here to select a
certificate or other credentials for connection to the network TP-Secure.
     Click on this box.
11. Enter your TP credential when prompted.




                                                        User name and Password will
                                                        be your TP admission number
                                                        and Password.

                                                        Type in TP-STUDENT for
                                                        Logon domain

                                                        Click OK to connect.



After authentication is successful, you have connected to TP-Secure.

In order to test functionality, open up a browser and browse to http://www.yahoo.com.

Yahoo.com home page should be successfully loaded.


Clearing of your TP admission number and Password

After authentication on the TP wireless network, Windows will store your TP admission
number and Password information permanently. However, if you're sharing the
computer with someone else, you should remove this information to prevent others from
accessing TP wireless network with your personal TP admission number and
Password. There is no built-in solution to resolve this problem.

Please download the script from URL:

                http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe

and double click to run it to remove the cached user data..

Note that this script will only work on Windows XP.

You'll have to run this script every time someone else is using the computer. The script
also requires a restart of your computer.

More Related Content

Similar to 1 Student Windows Xp Tp Secure Guide

Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
georg_boemmelburg
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
Cesar Estela Zarate
 
T hin client configuration
T hin client configurationT hin client configuration
T hin client configuration
ALICO HI-TECH INSTITUTES
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
Jeremiah Grossman
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
Miguel Ibarra
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
TSOLUTIONS
 
Operating systems
Operating systemsOperating systems
Operating systems
sandrahezro
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
HerrySyafitri
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
Ali Nezhad
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
Rociocmf
 
Examen
ExamenExamen
Examen
Brandonsito
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.ppt
naghamallella
 
Training Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183xTraining Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183x
Abdelilah CHARBOUB
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig
Akibo Davies
 
push_notification
push_notificationpush_notification
push_notification
Ziku Spartan
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interface
arco zhang
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example
97148881557
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to Authentication
FIDO Alliance
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
KernSafe Technologies
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?
HusseinMuhaisen
 

Similar to 1 Student Windows Xp Tp Secure Guide (20)

Quick installation guide
Quick installation guideQuick installation guide
Quick installation guide
 
7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig7106506104 tl wa701-nd(eu)_2.0_qig
7106506104 tl wa701-nd(eu)_2.0_qig
 
T hin client configuration
T hin client configurationT hin client configuration
T hin client configuration
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
manual vvtk camera_st7501
manual vvtk camera_st7501manual vvtk camera_st7501
manual vvtk camera_st7501
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Wfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_enWfc878r eop hwsg_npd6407-00_en
Wfc878r eop hwsg_npd6407-00_en
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
Examen
ExamenExamen
Examen
 
trusted computing for security confe.ppt
trusted computing for security confe.ppttrusted computing for security confe.ppt
trusted computing for security confe.ppt
 
Training Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183xTraining Alcatel-Lucent WDM PSS 183x
Training Alcatel-Lucent WDM PSS 183x
 
7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig7106503678 td w8961-nd_qig
7106503678 td w8961-nd_qig
 
push_notification
push_notificationpush_notification
push_notification
 
Cpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interfaceCpu224 xp eth-ethernet_interface
Cpu224 xp eth-ethernet_interface
 
D link router_setup_example
D link router_setup_exampleD link router_setup_example
D link router_setup_example
 
Web Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to AuthenticationWeb Authn & Security Keys: Unlocking the Key to Authentication
Web Authn & Security Keys: Unlocking the Key to Authentication
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?
 

Recently uploaded

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

1 Student Windows Xp Tp Secure Guide

  • 1. Introduction This user guide is meant for users to connect their laptop with Windows XP through SSID TP-Secure in Temasek Polytechnics. Microsoft Window XP Wireless Zero Configuration Guide Operating Systems/Hardware Pre-requisites  Windows XP, Service Pack 2;  Window XP Wireless Zero Configuration client  Ensure that wireless network card’s radio is turn on  Install Microsoft hotfix; WindowsXP-KB917021-v3-x86-ENU.exe, for WPA2 support and prevent a Windows wireless client from advertising the wireless networks in its preferred networks list The hotfix can be download from; http://www.microsoft.com/downloads/details.aspx?familyid=2726F32F-D52B-4F84- ACE8-F7FC20195769&displaylang=en Note: Please configure manual proxy script for Internet Explorer and Firefox before proceeding; 1. In Internet Explorer, on the Tools menu, click Options. 2. On the Connections tab, click LAN Settings. 3. Tick Use automatic configuration script 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK, to save the settings. 6. Click OK to close Internet Options 1. In Mozilla Firefox, on the Tools menu, click Options 2. On the Network tab, click Settings 3. Check Automatic proxy configuration setting URL 4. Under Address: Enter http://proxy-config3.tp.edu.sg/proxy.pac 5. Click OK to save the settings. 6. Click OK to close Options Wireless Zero Configuration allows Windows to configure and manage your wireless adapters. Enabling Wireless Zero Configuration is a pivotal step in configuring wireless access. Many times Zero Configuration will be disabled if a third-party application is managing your adapters. For many encrypted data network, Windows Zero Configuration must be enabled to receive data transmissions.
  • 2. Verify that Windows Zero Configuration service is running; 1. Click Windows Start, click Run, type services.msc, and then click Ok. 2. Under Name Column, scroll to Wireless Zero configuration. In the Startup Type box, make sure that it is show as Automatic/Manual and the Status is Started. If the Status is show blank, right click Wireless Zero Configuration, select Properties, under General tab, make sure that Startup type is Automatic/Manual, click Start and then OK.
  • 3. Setting of SSID, TP-Secure (With Auto-config Script) Pre-requisite: Windows XP User account type must be Administrator to be able to run the script. Please proceed to Setting of SSID, TP-Secure (Manual configuration) section if your User account type is not Administrator. 1. Download the Auto-config Script from URL: http://cis.tp.edu.sg/download/xp/TP-Secure-WinXP.exe and save it into your computer. 2. Go to the folder location where you saved the Auto-config Script and double click to run the Auto-config Script (TP-Secure-WinXP.exe). 3. After finishing installing the script, a dialog box will be pop up at the bottom right corner. Click on it to enter the user credential, user name and user password is required. User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect.
  • 4. After authentication is successful, you have connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded. Clearing of your TP admission number and Password After authentication on the TP wireless network, Windows will store your TP admission number and Password information permanently. However, if you're sharing the computer with someone else, you should remove this information to prevent others from accessing TP wireless network with your personal TP admission number and Password. There is no built-in solution to resolve this problem. Please download the script from URL: http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe and double click to run it to remove the cached user data. Note that this script will only work on Windows XP. You'll have to run this script every time someone else is using the computer. The script also requires a restart of your computer.
  • 5. Should you experience any problem configuring with Auto-config Script, please use the Manual configuration procedure below. Setting of SSID, TP-Secure (Manual configuration) 1. Click Windows Start, click Run, type ncpa.cpl, and then click Ok. 2. In the Network Connections window, right-click the Wireless Network Connection icon, and then click Properties. 3. In the Wireless Network Connection Properties, click the Wireless Networks tab. If you do not see a Wireless Networks tab, your network adapter may not support the Wireless Zero Configuration service. Make sure the Wireless Zero Configuration service is started and set to automatic. Ensure that Use Windows to configure my wireless network settings is checked. 4. Under the Preferred networks, click the Add button.
  • 6. 5. In the Network name (SSID) box, type TP-Secure and select WPA under Network Authentication and TKIP under Data encryption. Ensure that Connect even if this network is not broadcasting is checked. (Note: This option will not be available if you did not install Microsoft Hotfix KB917021)
  • 7. 6. In the Authentication tab, make sure that Enable IEEE 802.1x authentication for this network is checked. Select Protected EAP (PEAP) under EAP type and ensure that Authenticate as computer when computer information is available and Authenticate as guest when user or computer information is unavilable is not checked. 7. Click Properties and ensure that Validate server certificate is checked. Select Entrust.net Secure Server Certification Authority under Trusted Root Certification Authorities Select Secured password (EAP-MSCHAP v2) under Select Authentication Method and ensure that Enable Fast Reconnect is checked.
  • 8. 8. Click Configure, and ensure Automatically use my Windows logon name and password (and domain if any) is not checked. 9. Click OK, four times until you have existed from the wireless network connection. 10. A dialog box from your system tray will appear stating Click here to select a certificate or other credentials for connection to the network TP-Secure. Click on this box.
  • 9. 11. Enter your TP credential when prompted. User name and Password will be your TP admission number and Password. Type in TP-STUDENT for Logon domain Click OK to connect. After authentication is successful, you have connected to TP-Secure. In order to test functionality, open up a browser and browse to http://www.yahoo.com. Yahoo.com home page should be successfully loaded. Clearing of your TP admission number and Password After authentication on the TP wireless network, Windows will store your TP admission number and Password information permanently. However, if you're sharing the computer with someone else, you should remove this information to prevent others from accessing TP wireless network with your personal TP admission number and Password. There is no built-in solution to resolve this problem. Please download the script from URL: http://cis.tp.edu.sg/download/xp/ClearCache-WinXP.exe and double click to run it to remove the cached user data.. Note that this script will only work on Windows XP. You'll have to run this script every time someone else is using the computer. The script also requires a restart of your computer.