Accessing the CS Network

Jump to


Who manages the wireless network?
The wireless network is managed centrally by IST and covers most of the University campus. Please see the UWS website for much more information about the wireless network.

How do I get on the wireless network?
To get access to the wireless network, you must authenticate via the 802.1x authentication on your wireless card using your CCID (Campus Computing ID) and password. All members of the department (faculty, staff, grad and undergrad students) should have a CCID.

I'm having trouble authenticating.
If you are a member of the department but you cannot authenticate, then

  • You can test or change your CCID password, or have a password reminder sent to you
  • If you tested your password successfully and you are still unable to authenticate, please email the IST Service Desk ( and describe the problem

Why can't I access my research machine on UWS?
Note that the wireless network is external to the CS network and that you must create a VPN tunnel in order to access the CS research machines.

Back to top

Wired (Masqueraded)

What is the masqueraded network?
A masqueraded network is a wired network separate from our other wired networks in the Department.

When a machine is connected to the masqueraded network, through an ethernet port wired to the masqueraded network, it acquires an IP address from a DHCP server. This works if a machine's MAC address has been registered through Webapps. Once an IP address has been assigned by the DHCP, internet packets from that machine are allowed out of the masqueraded firewall onto the internet.

Machines on the masqueraded network are treated like machines on an external (NON-CS Research) network. You should also treat machines on the masqueraded network as potentially hostile, since the Computing Science Department has no control over what (e.g. viruses) might be on a machine attached to it.

Who can use the masqueraded network?
Any faculty, staff, graduate students, and guests of the Department of Computing Science with a CSID.

What is it for?
This masqueraded network is ideal if you want an ethernet connection for a laptop, or if you want to set up machines in research labs that are totally untrusted by other machines and which you can administer.

Where is the masqueraded network deployed?
Meeting Rooms
Ethernet ports for the masqueraded network are located in the following rooms: ATH 2-52C, ATH 3-28, ATH 3-32,  CSC 2-15, CSC 2-49, CSC 3-33, CSC 3-49

Offices and Research labs
Ports can be enabled in graduate student offices in Athabasca hall, research labs, and faculty offices, if you send an email to with the port number you would like enabled and the room where the port is located.

How can I connect to the masqueraded network?
If your MAC address is not yet registered on the masqueraded network, your browser will be redirected to a registration web page where you will be prompted to authenticate with your CSID and password. After you register, there may be a 5-10 minute delay before you can connect to the network.

If you are a guest, your sponsor will have to authenticate and register your MAC address under their name before you will be granted access.

What is an ethernet port?

What if I want to connect to another ethernet port on the masqueraded network?
Once you register your MAC address, you can plug your laptop into any masqueraded network port and you will have access to the internet.

Which ethernet ports are on the masqueraded network? How can I add a new port?
The ethernet ports on the masqueraded network should be labelled with the word NAT. If you would like to have a new NAT port added to the masqueraded network, please email helpdesk with the port number you would like added, and the room number where the port is located.

Are there any restrictions to services/ports from the masqueraded network?
The masqueraded network sits behind a firewall and the firewall is set up to restrict traffic into and out of the network. Access from the outside, into the masqueraded network, is very restricted. So, for example, someone will not be able to run a server on a machine on the masqueraded network for access by people outside of the masqueraded network.

Only the following services are enabled out of the masqueraded firewall

  • Ping
  • Traceroute
  • SMTP (25)
  • SMTPS (465)
  • submission (587) for smtp
  • POP3 (110)
  • POP3S (995) secure pop3
  • IMAP (143)
  • IMAPS (993) secure imap
  • DNS
  • Finger
  • FTP
  • iChat audio and video
  • Printer (515)
  • rlogin
  • NetBios
  • NTP
  • Real Video
  • SSH
  • whois
  • Timbuktu Pro

If you require the use of any other services please contact Helpdesk.

What are the Conditions of Use for the masqueraded network?
Please read over the conditions of use for the masqueraded network. When you register your MAC address you will have to accept these conditions before you submit your request.

Where do I get ethernet cables for attaching to the masqueraded network?
Graduate students will have to supply their own ethernet cables for connections in their offices to the masqueraded network.

Back to top