Network & Wireless
Wireless
Eduroam grants you access to the Internet without having to log in every time! Following a one-time setup, connect to the "eduroam" wireless network anywhere on campus, or anytime you visit an eduroam-member institution, which includes several CSUs and other universities throughout the U.S. and the world. To learn more about the benefits of using eduroam, visit www.eduroam.org.
Guest Accounts
To request a guest account, university departments should complete the Guest Account Request form. To learn more about guest accounts, visit the Guest Accounts page.
Remote Access (VPN)
A virtual private network (VPN) is a secure method of accessing University computing resources when you are logged in from an off–campus computer or a laptop you are using to access the Wireless Network. The VPN creates a secure connection called a tunnel between your computer and the campus network. The tunnel disguises the information you are sending and receiving, so your electronic communications are secure and protected.
Network Your Device
If you need to connect a new printer, server, networked copier or other device to the network, you will need to request an IP Address. IP address is a number that is assigned to a computer by an Internet Service Provider (ISP) to be its permanent address on the Internet. Computers and other connected devices use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone
Host Your Server
A server is a piece of hardware that stores electronic information such as department records, email messages, website documents and images. Similar in appearance to a computer ‘box,’ a server has a much larger capacity for the storage of files. One important issue to consider is the location of your server.
CSUN Amazon Web Services
CSUN AWS brings the power and capabilities of Amazon’s Web Services combined with an easy mechanism to create, manage, and pay for accounts. It is the only approved method to use AWS in a manner that complies with CSU policies and security standards.