Linux
Overview
Welcome to Eagle Wi-Fi, Texas A&M University-Texarkana’s brand new wireless network! Eagle Wi-Fi allows Students, Faculty, and Staff to connect to a secure, encrypted network, while allowing guests to connect to an open network throughout campus.
Eagle Wi-Fi supports all operating systems including Windows, Mac OS X, iOS, Android, Linux, Chromebooks, and more.
This document provides an example of the end-user process for using Eagle Wi-Fi to migrate a device running a Linux operating system to the secure network.
Supported Versions
Eagle Wi-Fi supports the following Linux versions:
- Ubuntu version 9.04, and later
- Fedora version 18, and later
How to Connect to Eagle Wi-Fi
Follow the step below to connect to Eagle Wi-Fi. During this process, you will enter information as requested, and make selections about user type, device type, etc.
User Prompts
This section displays the user prompts for connecting to Eagle Wi-Fi. The sequence of steps for the enrollment differs, depending on access type selected.
Note >> The screens in this example use the default look and feel of the application.
FIGURE 1. Welcome Screen
An acceptable use policy (AUP) prompt displays a message and requires that the user signal acceptance to continue.
Click Start to continue.
User Type
If required by the network, the user might see a User Type prompt. For example, an Employee might be required to enter domain credentials, and a Guest or Partner might be required to enroll using their social media credentials.
FIGURE 2. User Type Prompt
Select the user type to continue. This example follows the Employee workflow branch.
User Credentials
If required by the network, a prompt similar to the one below requires the user to enter network credentials.
FIGURE 3. User Credential Prompt
Enter the user credentials and click Continue.
Device Type
If required by the network, the user might see a Device Type prompt. For example, a Personal Device selection might add a prompt for a MAC address, and a IT-Issued Device would be allowed to bypass the MAC address prompt.
FIGURE 4. Device Type Prompt
Select a device type to continue. This example follows the IT-Issued Device enrollment workflow.
Voucher Code
Your network might require that you enter a voucher (one-time password) as an additional verification step. Vouchers are typically sent email or SMS from a network sponsor or administrator.
FIGURE 5. Voucher Code Prompt
Enter the voucher code and click Continue.
BYOD Policy
Typically, you must agree to the terms and policies of the network before you can continue.
FIGURE 6. BYOD Policy
Click Start to continue.
After the enrollment prompts, the user will download and run the configuration Wizard to migrate the device to the secure network.
Linux Download Page
The application detects the user agent for a Fedora or Ubuntu operating system and provides the correct configuration instructions. This screen includes the steps to install the application and to configure the device.
FIGURE 7. Linux Download Page
Click the down arrow to download the tar file, which contains the application files.
Open Downloaded Files
You can either Open with Archive Manager or Save to the Downloads folder. The Archive Manager automatically opens the files to extract. You must double-click the tar file in the Downloads folder to open and extract them.
FIGURE 8. Open Download File
Click OK to continue.
Extract Downloaded Files
Extract the application files that were downloaded.
FIGURE 9. Select Files to be Extracted
Select all files and click Extract. Choose a location for the extracted files and click OK.
Open Application File
Double-click the Cloudpath-x64 file to start the application.
Note >>
If you are running a 32-bit OS, run the Cloudpath-x86 file.
FIGURE 10.
The Wizard runs through the configuration and migration process.
Wizard Application User Experience
After the user has gone through the enrollment prompts, the Wizard runs to configure the wireless network settings on the device.
Loading System Configuration
The Wizard opens and begins the configuration process.
FIGURE 11. Please Wait
The configuration process takes less than a minute.
Inspecting Configuration
The application verifies that your computer’s configuration is correct for the secure network.
FIGURE 12. Inspecting Configuration
The application continues with the authentication process.
Connecting to Secure Network
The application attempts to associate to the wireless network.
FIGURE 13. Connection to Secure Network
The application continues with the validation process.
Validating Connectivity
When the association with the secure network is successful, the application attempts to acquire a network address.
FIGURE 14. Validating Connectivity
The application continues with the connection process.
Connected to Secure Network
When the application displays a message that you have received an IP address, you are connected to the secure network.
FIGURE 15. Connected to Secure Network
Click Done.
View Network Connection
View the wireless network to verify the Wi-Fi network name.
FIGURE 16. View Wireless Network
The Wi-Fi setting displays the secure network.