Utility NavTop NavContentLeft NavSite SearchSite SearchSite Search
Close.

Linux

Overview

Welcome to Eagle Wi-Fi, Texas A&M University-Texarkana’s brand new wireless network! Eagle Wi-Fi allows Students, Faculty, and Staff to connect to a secure, encrypted network, while allowing guests to connect to an open network throughout campus.

Eagle Wi-Fi supports all operating systems including Windows, Mac OS X, iOS, Android, Linux, Chromebooks, and more.

This document provides an example of the end-user process for using Eagle Wi-Fi to migrate a device running a Linux operating system to the secure network.

Supported Versions

Eagle Wi-Fi supports the following Linux versions:

  • Ubuntu version 9.04, and later
  • Fedora version 18, and later

How to Connect to Eagle Wi-Fi

Follow the step below to connect to Eagle Wi-Fi. During this process, you will enter information as requested, and make selections about user type, device type, etc.

User Prompts

This section displays the user prompts for connecting to Eagle Wi-Fi. The sequence of steps for the enrollment differs, depending on access type selected. 

Note >> The screens in this example use the default look and feel of the application.

 

FIGURE 1. Welcome Screen

welcome screen

An acceptable use policy (AUP) prompt displays a message and requires that the user signal acceptance to continue.

Click Start to continue.

User Type

If required by the network, the user might see a User Type prompt. For example, an Employee might be required to enter domain credentials, and a Guest or Partner might be required to enroll using their social media credentials.

FIGURE 2. User Type Prompt

User prompt

Select the user type to continue. This example follows the Employee workflow branch.

User Credentials

If required by the network, a prompt similar to the one below requires the user to enter network credentials.

FIGURE 3. User Credential Prompt

User credentials prompts

Enter the user credentials and click Continue.

 

Device Type

If required by the network, the user might see a Device Type prompt. For example, a Personal Device selection might add a prompt for a MAC address, and a IT-Issued Device would be allowed to bypass the MAC address prompt.

FIGURE 4. Device Type Prompt

device type prompt

Select a device type to continue. This example follows the IT-Issued Device enrollment workflow.

 

Voucher Code

Your network might require that you enter a voucher (one-time password) as an additional verification step. Vouchers are typically sent email or SMS from a network sponsor or administrator.

FIGURE 5. Voucher Code Prompt

voucher code prompt

Enter the voucher code and click Continue.

 

BYOD Policy

Typically, you must agree to the terms and policies of the network before you can continue.

FIGURE 6. BYOD Policy

BYOD policy

Click Start to continue.

After the enrollment prompts, the user will download and run the configuration Wizard to migrate the device to the secure network.

 

Linux Download Page

The application detects the user agent for a Fedora or Ubuntu operating system and provides the correct configuration instructions. This screen includes the steps to install the application and to configure the device.

FIGURE 7. Linux Download Page

Linux download page

Click the down arrow to download the tar file, which contains the application files.

 

Open Downloaded Files

You can either Open with Archive Manager or Save to the Downloads folder. The Archive Manager automatically opens the files to extract. You must double-click the tar file in the Downloads folder to open and extract them.

FIGURE 8. Open Download File

Open download file

Click OK to continue.

 

Extract Downloaded Files

Extract the application files that were downloaded.

FIGURE 9. Select Files to be Extracted

Select Files to be Extracted

Select all files and click Extract. Choose a location for the extracted files and click OK.

 

Open Application File

Double-click the Cloudpath-x64 file to start the application.

Note >>

If you are running a 32-bit OS, run the Cloudpath-x86 file.

FIGURE 10. Open Application File

The Wizard runs through the configuration and migration process.

 

Wizard Application User Experience

After the user has gone through the enrollment prompts, the Wizard runs to configure the wireless network settings on the device.

Loading System Configuration

The Wizard opens and begins the configuration process.

FIGURE 11. Please Wait

Please Wait

The configuration process takes less than a minute.

 

Inspecting Configuration

The application verifies that your computer’s configuration is correct for the secure network.

FIGURE 12. Inspecting Configuration

Inspecting Configuration

The application continues with the authentication process.

 

Connecting to Secure Network

The application attempts to associate to the wireless network.

FIGURE 13. Connection to Secure Network

Connection to Secure Network

The application continues with the validation process.

 

Validating Connectivity

When the association with the secure network is successful, the application attempts to acquire a network address.

FIGURE 14. Validating Connectivity

Validating Connectivity

The application continues with the connection process.

Connected to Secure Network

When the application displays a message that you have received an IP address, you are connected to the secure network.

FIGURE 15. Connected to Secure Network

Connected to Secure Network

Click Done.

 

View Network Connection

View the wireless network to verify the Wi-Fi network name.

FIGURE 16. View Wireless Network

View Wireless Network

The Wi-Fi setting displays the secure network.

  • 7101 University Ave
  • Texarkana, TX 75503
  • p: 903.223.3000
  • f: 903.223.3104
.Back to Top