WiFi Security


  • Peer to Peer (P2P) Not Allowed Over the Wireless Network – Peer to Peer (P2P) applications (examples include BitTorrent, eMule, Kazaa, and Gnutella) are not allowed on the UCInet Mobile Access Network. The wireless network is a shared network, running at slower speeds than most other UCInet connections. If you are taking up large amounts of bandwidth, you are negatively affecting the performance of all other users. Using excessive bandwidth may cause you to lose wireless networking privileges at UCI.
  • Usage Logs – Using the UCI campus WiFi network generates logs about your device connecting to the WiFi infrastructure. OIT uses such data for operational and security purposes. OIT may further anonymize and share such data with research teams building campus level smart services. If you have concerns, questions, or do not want your anonymous data to be shared, do not register your device and contact the OIT Help Desk (949-824-2222 or oit@uci.edu).


UCInet Mobile Access wireless networks use a wireless technology known as IEEE 802.11. This is a shared network technology. Like all shared networks, these networks should be presumed insecure.

Shared Network
A shared network is like a dinner party – anyone can eavesdrop on your conversation, if they know how. Sophisticated network sniffing tools make it possible for others to look at network traffic, and capture data in-transit.

  • Use secure, encrypted sessions (such as SSH in place of telnet, or https/SSL for online transactions) whenever transmitting sensitive information.
  • For insecure transactions, use the campus VPN (Virtual Private Network, an encrypted tunnel) or use a switched wired network. Note: The campus VPN only works from the UCInet Mobile Access wireless network.

Authentication for UCI Affiliates
UCInet Mobile Access uses an authentication scheme based on MAC addresses (see also, What is a MAC Address).