Wireless Networking

Wireless Networking

Wireless logo

Wireless networks are generally considered to be less secure than wired networks; however, with proper configuration and encryption enabled, they can provide more than adequate security for most users. Read our Accessing Wireless Networks Safely Brochure to learn more and better protect your privacy.

Wireless at RIT

RIT offers four different wireless networks across campus:

  • RIT - An encrypted WPA2 network and the preferred network for all devices. Devices using this network must be registered using RIT account credentials.
  • RIT-Guest - An open public network for campus visitors, authorized with a 10-digit phone number. Those not associated with RIT should use this network.
  • RIT-Legacy - An open WPA network for older devices that do not support WPA2. Individuals should only use this network if their device cannot connect to the RIT network. Devices on this network must be registered with RIT account credentials.
  • eduroam - A secure network for individuals not affiliated with RIT that are visiting from another participating Eduroam institution.

 

We strongly recommend using the RIT network at all times, as it provides much better quality and security for users. WPA2 is the preferred protocol, as it offers the best security.

More information on wireless networking at RIT can be found on the ITS Wireless Computing at RIT page.

Residential Networking

Please note that the use of wireless network routers is not permitted in residential areas on campus. Use of wired routers is acceptable; however, you should read and comply with Resnet’s guide to Using a Router on the RIT Network prior to setup.

Wireless at Home 

Without a secure configuration, your wireless network is open to anyone within range of the access point (typically anywhere from 100-1000 feet). Anyone in your area can "piggyback" on your connection and use your Internet, which can lead to a number of problems such as service violations, bandwidth shortages, abuse, activity monitoring, or direct attacks to your computer.

Best practices for home wireless networks
  • Change your Default SSID and Administrator Password (See About.com for overview, but process varies by manufacturer)
  • Disable SSID Broadcasting 
  • Enable WPA2 Encryption
  • Enable MAC Address Filtering (See About.com for overview, but process varies by manufacturer)
  • Keep your Access Point software up-to-date with patches
  • Use your Router's built-in firewall
  • Use File Sharing with caution

Public Wireless Networks

Many public access points are not secured, and the traffic they carry is not encrypted. This puts your sensitive communications and transactions at risk. Because your connection is being transmitted "in the clear," malicious users can use sniffing tools, "shoulder surfing," or other methods to obtain information including passwords, bank account numbers, unauthorized computer access, and credit card numbers quite easily.

Best practices for public wireless networks
  • Avoiding sending sensitive information (such as online banking, shopping, etc.) over an open Wireless Network
  • Stay on Secure Websites (look for HTTPS and lock icon)
  • Encrypt your traffic
  • Connect using VPN (Virtual Private Networking)
  • Disable file sharing
  • Be aware of your Surroundings