MNU WiFi Information
WiFi connectivity is currently available in the following locations:
Cook Center (limited coverage)
Lanpher (basement only)
- Wireless enabled laptop
- An active MNU email account (this does not include alumni email accounts).
The RealTek RTL8185L wireless network adapter is currently incompatible with MNU’s
wireless network. We’re sorry for any inconvenience this may cause.
- Open the Wireless Network Connection box and make sure “mnu.edu” is listed as an
available wireless network and then choose “Change advanced settings” from the
“Related Tasks” menu on the left.
- When the Wireless Network Connection Properties box appears, choose the “Wireless
Networks” tab. If mnu.edu appears in the “Preferred networks” box, highlight it and
click the Properties button. If mnu.edu does not appear, click the Add button.
- Under the association tab, make sure that “Network name (SSID)” is set to mnu.edu. If
not, enter “mnu.edu” manually. Next, choose either WPA or WPA2 from the “Network
Authentication” drop-down menu, and choose “TKIP” from the “Data encryption” drop-
- Under the authentication tab, choose “Protected EAP (PEAP)” in the “EAP type” drop-
down menu and uncheck the selection “Authenticate as computer when computer
information is available”. Then click the properties button under the EAP type selection.
- Uncheck “Validate server certificate” and place a check in the box next to “Enable fast
reconnect”. Next, click “Configure” and uncheck “Automatically use my Windows
logon name and password (and domain if any).”
- Choose “Ok” on all dialog boxes that remain.
- In the task bar (bottom right) a message will appear that says “Click here to select a
certificate or other credentials for connection to the network mnu.edu”
- Click anywhere on this message and a box will appear asking for your credentials. Enter
the username and password for your MNU email account in the appropriate boxes and
leave the “logon domain” field empty. Press “OK” and your computer should connect in
a few moments.
Open the Connect to a Network box. Make sure mnu.edu is in the list of available networks.
Click on “Set up a connection or network” toward the bottom of the window.
In the next window, choose the “Manually connect to a wireless network option,
and click next.
In the network information window, enter the following:
- Network name: mnu.edu
- Security type: WPA2-Enterprise or WPA-Enterprise (WPA2 is the preferred option)
- Encryption type: AES (if you selected WPA2) or TKIP (if you selected WPA)
- Leave the Security Key/Passphrase blank, and leave the checkboxes the same, then click next.
- Click the Change connection settings option. This will pop up a new window.
- In the new window, click the Security tab.
- Next, make sure that Security type and Encryption type match what you put in
earlier. In the Choose a network authentication method box, make sure Protected
EAP (PEAP) option is selected. Then click the Settings… box. This will open
another new window.
- In the Protected EAP Properties window, uncheck the Validate server certificate
option. Make sure the Enable Fast Reconnect option is checked. Then click the
Configure… button. This will open another window.
- In the EAP MSCHAPv2 window, uncheck the option Automatically use my
Windows logon name and password (and domain if any). Click OK on all the
open windows (the ones from steps 5/6 and 7), and close on the window from step
- You should now see a bubble pop up from the taskbar asking for additional
information to connect to mnu.edu. Click on that bubble.
- Enter you username and password (same as the one you log into Moodle or
your email with) and leave the Logon domain blank. Click OK and you should be
connected in a few moments.
Open the Airport Menu
You can either click the mnu.edu, use your MNU User Name and password, and skip to step 4, or if that doesn’t work, you can click Join Other Network…
In the network information window, enter the following:
Network name: mnu.edu
Security type: WPA2
EnterpriseUser Name: This is your MNU User Name
Password: Your MNU Password
In the Verify Certificate window that pops up, click Show Certificate.
Click the arrow next to the Trust to expand the menu. Next, set When using this certificate: to Always Trust. You will need to do this for both the radius.mnu.edu certificate and MidAmerica Nazarene University Certificate Authority.
Click Continue. It should connect in a few moments.
Frequently Asked Questions
- How can I check my email from off campus?
- I can't log in or check my email. How do I change my password?
- Can I use Microsoft Outlook with my MNU email account?
- Why is my email bouncing back?
How can I check my email from off campus?
Enter your username and password at http://mail.mnu.edu and click the login button. This way, you can check your MNU email account from anywhere in the world.
I can't log in or check my email. How do I change my password?
If you've forgotten your Internet password or are having trouble accessing your account, stop by the Mabee Library computer lab and speak to a lab technician.
- Microsoft Outlook 2003/2007
- Mozilla Thunderbird
- Apple Mail
Why is my email bouncing back?
You may have exceeded the allotted disk space on your account. Each account is allocated an amount of disk space to store email and other files. If you exceed this allotment, your email will bounce back to the sender with an error.
Web Browsing Acceptable Use
The Internet connection you are using was established for educational use. Use of this connection for non-educational purposes is deemed an unacceptable use under this policy.
Logs are maintained
Policy requires that logs of browser access to the Internet be kept. These logs record when and where, and from what networked computer, Internet access has been allowed (or denied). Supervisors and authorized network management personnel have access to these logs.
Use of the Internet connection indicates your consent to usage monitoring and logging.
Non-educational sites restricted
In addition to keeping logs, access may be restricted to certain sites that have been determined to have no valid educational purpose, or that have been determined to contain objectionable material. Attempts to access these sites will result in the display of an error message including the reason(s) a site has been restricted.
Exceptions made based on educational need
If you discover that a site or URL for which you have an educational need has been restricted, record the URL and request an exemption for that URL from the error page.
Web Page Guidelines
- You must include your email address on your web page so that the Information Technology (IT) office can contact you if necessary. This also allows viewers to respond to your page or send you suggestions and corrections. If you do not provide an email address or other contact information on your page, IT may remove links to your material, or the material itself, without notice.
- You may not infringe on copyright laws. This applies to photographs, album covers, other images, sound bites, videos, and printed materials. The material you provide on your web page must be original or in the public domain. Otherwise, you must obtain written permission from the copyright holder to use the material. MidAmerica Nazarene University may be liable for any copyright infringement, and may chose to pass that liability to the responsible parties. IT may, without notice, disconnect links to material which appears to be copyrighted. In general, however, IT will notify the owner of the account and will expect a response from the account owner within seven (7) days. If there is no response, IT may disconnect links seven (7) days after initial notification. IT may request that you provide written proof of permission to use copyrighted material.
Responsiveness is how quickly a web page loads or performs an action for the client (the user viewing your page). Regular text is typically very responsive, whereas video or large graphics may take several seconds to several minutes to appear for the viewer. A key to responsiveness is giving users information about the materials they are attempting to access. For example, if you have a link to a large graphic or animation, notify the viewer of its size before they view it. This will allow the user to decide how to view your page, and may reduce unnecessary frustration.
Another way to enhance your web page is to include thumbnails (smaller versions of images) on your page and include a link to the full-size image. Increase your page's usability by ensuring that links are clear and well-organized. Specifically describe links, and indicate external links so that if users encounter errors, they can contact the responsible party. Keep links current by removing extinct links and monitoring sites for changes. By placing the last modified date on your web page, viewers to your page will be able to tell if you have added information. You can also place codes in your page to have the modification date displayed automatically.
For questions about these policies and suggestions, please email Amy Curtis at email@example.com.
Email Account Acceptable Use
INDIVIDUAL USERS ARE HELD RESPONSIBLE FOR THEIR ACTIONS. Users are responsible for understanding and respecting the security policies of the systems (computers and networks). Users are individually accountable for their own behavior. (RFC 1281)
Users are responsible for their account, including, but not limited to, the files contained within their allocated storage.
Users may not consume system resources beyond a reasonable margin. This includes: processing time, disk storage, network activity, etc. User accounts are limited to a predetermined amount of disk storage space. Users may request an increase in disk space. This request may or may not be granted, depending upon resources available.
User access restrictions may be placed on any or all accounts if it is determined that an unnecessary load is being placed on the system that prevents normal operations from proceeding. This may include, but is not restricted to, a restriction in login access during normal business hours.
Users may not forge email. This includes creating, modifying, executing, or retransmitting any computer program or instructions intended to obscure the true identity of the sender of electronic mail or electronic messages.
Users may not participate in chain email messages -- this annoys other users and wastes network resources. Do not forward email messages to people you don't know.
Accounts may not be shared for any reason. Passwords should remain secret.
Users may not use the computing services offered at MNU for profit or personal financial gain. You may not use MNU Internet resources to conduct business transactions.
MNUnet (dorm Ethernet connection) users may not attempt to manually change the IP address assigned to their computers. All student computers connected to MNUnet are intentionally on a private internal network and cannot be directly accessed from outside campus. Only authorized (official MNU server) computers may provide any type of services to users outside of MNUnet.
Breaking into another user's account is strictly prohibited. This includes any methods for determining user passwords.
Any attempt to disrupt normal computer service is prohibited.
Users should respect the rights and privacy of other users. Weaknesses in the security of a system do not give license to penetrate or abuse a system. (RFC 1281)
Copyrighted and licensed software may not be duplicated or transported electronically unless it is explicitly stated that you may do so. When in doubt, DON'T COPY.
The following activities are strictly prohibited: releasing worms, viruses, or any other programs with malicious intent.
Users may not take part in obscene, harassing, or otherwise unethical email transmissions, newsgroup postings, or any other method of communicating on the network.
If a user violates any of the Acceptable Use Policy issues 10-15 above, the user's account will immediately be locked. Further access to all computing resources will be denied. An appeal may be made in writing to the Director of Information Technology.
For other violations, a warning will be sent and kept on file. After the second offense, the user's account will be locked for thirty days. After the third offense, the user will lose all access to computing resources. An appeal may be made in writing to the Director of Information Technology.
Criminal activities shall be reported to the proper authorities. Criminal activities include, but are not limited to, fraud, unauthorized access and copyright violations.
Data Protection -- Users may expect system backups to occur on a regular basis. You may request a restoration of the files in your account if you lose data. Requests for data restoration will be filled as soon as possible, but may take up to a week to be completed.
Electronic Mail Privacy -- Internet email is inherently insecure. Therefore, do not communicate any nformation that you would not reveal publicly. If you need private correspondence via email, use an encryption program such as Pretty Good Privacy (PGP).
User Privacy - Your privacy will be maintained to the greatest extent possible without compromising the integrity of the network or other computer resources. All personnel, and particularly users, are cautioned that in general, these technologies are not "private." Users should not automatically expect privacy when using systems or networks. Take protective measures where needed to protect sensitive information and applications. (LLNL)