UNC-PSK Configuration for Chromebook
Description: Configuring Wi-Fi for UNC-PSK STEP 1: Obtain the pre-shared key Go to a device already connected to the internet. Visit What is the UNC-PSK SSID? and obtain the pre-shared key. STEP 2: Connect to UNC-PSK Click on the wireless icon in the bottom right-hand corner of the screen. Select the Network tab (“No Network”). Click on the […]
» Subjects: , , » Tags: ,

UNC-Secure Configuration for iOS
Description: Note:  If you are using another Operating System other than iOS, then visit the document Connecting to the UNC Wireless Network – Getting Started to select your Operating System or device. This document was written for version 7 of iOS operating system. Earlier iOS versions may look slightly different than the screenshots below. If so, […]
» Subjects: , , , , ,

UNC-PSK Configuration for iOS
Description: Note: If you are using another Operating System other than iOS, then visit the document Connecting to the UNC Wireless Network – Getting Started to select your Operating System or device. This document was written for version 7 of iOS operating system. Earlier iOS versions may look slightly different than the screenshots below. If so, […]
» Subjects: , , , , , » Tags: , ,

UNC-PSK Configuration for Android 4.x.x
Description: This document is written to take a person through the UNC-PSK Configuration on Android 4.x.x device.  The instructions are written based on Android 4.2.x and using a Samsung Galaxy S4 phone.  Some devices may look a little different but should follow the same process.  If you run into trouble please call us at 919-962-4357 or […]
» Subjects: , , , , , » Tags: , , , ,

UNC-PSK Configuration for Windows
Description: Note:  If you are using another Operating System other than Windows Vista/7/8, then see the document Connecting to the UNC Network – Getting Started to select your Operating System or device. Getting connected to the UNC-Chapel Hill UNC-PSK network involves three steps: finding your device’s Wi-Fi ID, registering your device’s Wi-Fi ID, and configuring your […]
» Subjects: , , , , , » Tags: , , , , , ,

UNC-Secure Configuration for Mac OS X
Description: Note:  If you are using another Operating System other than Mac OS X, then visit the document Connecting to the UNC Wireless Network – Getting Started to select your Operating System or device. This document was written for version 10.7 (Lion) through 10.9.3 (Mavericks) of the Mac OS X operating system. Earlier 10.x versions may […]
» Subjects: , , , ,

UNC-PSK Configuration for Mac OS X
Description: Note:  If you are using another Operating System other than Mac OS X, then visit the document Connecting to the UNC Wireless Network – Getting Started to select your Operating System or device. This document was written for version 10.7 (Lion) through 10.9 (Mavericks) of the Mac OS X operating system. Earlier 10.x versions may […]
» Subjects: , , , , , » Tags: , , ,

UNC-Secure Configuration for Windows
Description: Note:  If you are using another Operating System other than Windows, then visit the document Connecting to the UNC Wireless Network – Getting Started to select your Operating System or device. This document was written for version Vista through 8.1 of the Windows operating system. Each versions may look slightly different than the screenshots below. […]
» Subjects: , , , , , » Tags: , , ,

Connecting to the UNC Wireless Network
Description: Operating System (All) UNC-Secure UNC-PSK Windows Vista/7/8/8.1 * 8 RT Mac OS X (10.6 – 10.9.x) iOS (7.x) Android (4.x.x) Linux UNC-Secure To connect to the UNC-Secure wireless network, you must first connect to the UNC-Setup wireless network. Once you are connected to the UNC-Setup wireless network, a page with instructions on how to proceed […]
» Subjects: , , , » Tags: , , , , , , , , ,

UNC-Secure Guest Sponsorship Portal
Description: The UNC-Secure Guest Sponsor Portal will allow registered administrators across campus departments an alternative means to allow network access for visitors. This method should be used for small to medium levels of granting guest access. The preferred method for large visitor access (such as conferences) will be the standard UNC-Guest access requests which should be […]
» Subjects: , » Tags: , , ,