As part of the ongoing Network Renewal Project, ICTS will introduce new Network Access Control (NAC) mechanisms to campus. The new feature will ensure that every device connecting to our network can authenticate and that the user or device owner can be identified by their UCT network account. This will enhance network security on campus and help us to comply with  a range of local and international standards and legislation.

When will this happen?

The change will roll out to different areas at different times. We will communicate to specific groups as required.

What do I need to do?

You will need to configure your device(s) appropriately before the cutover date communicated to you.

Note that these steps apply to devices that connect via a network cable, where you – as an individual – use the device. You do not need to configure shared or special-purpose devices – such as TVs, printers, projectors, video conferencing equipment, etc. We will deal with these separately.

Instructions for Linux

These instructions were tested using Ubuntu 18. Other versions of Linux may differ.

Please carry out the procedure below BEFORE plugging in the network cable.

  1. Ensure that the machine is up to date with patches.
  2. Navigate to Settings > Network.
  3. In the network connections dialog box, click + (Add) next to Wired configuration.
  4. In the New Profile window:
    1. Name the profile - e.g. UCT Network.
    2. Click the Security tab.
  5. In the Security tab.
    • Enable 802.1x Security.
    • In the Authentication section, select Protected EAP (PEAP).
    • Under CA certificate, select No CA certificate is required.
    • In the Username field, enter your UCT staff / student number
    • In the Password field, enter your UCT network password.
    • Click Apply.
  6. Close the settings dialogue box.
  7. Plug in the Ethernet cable.

You will now have two wired profiles. When at UCT, use the new profile created in step 4. When you're not on campus and you're using a LAN connection, use your previous profile.

Instructions for other operating systems

If you have a computing device that isn't covered above, let us know.