Connect to ResNet

Usage Guidelines

Students who have decided to connect their microcomputer to the SVSU Computer Network through ResNet, acknowledge, understand and have reviewed SVSU's Internet and Electronic Communications Acceptable Use Policy (AUP).  Furthermore, students acknowledge and understand the additional guidelines listed below.

The following actions are not allowed:

  • Reconfiguring the dynamic network addressing.
  • Operating servers or other services that place high demands on network resources.
    • Operating servers and other services are only permitted if they utilize a sufficiently small portion of network resources and do not violate SVSU's Internet and Electronic Communications Acceptable Use Policy.
  • Connecting any device to the student's activated network port other than the microcomputer specifically registered for that port.


  • All computers must log in through a web browser on a daily basis (using your SVSU username and password), before using any other internet application.
  • All computers must install the SafeConnect security and policy key.  The key is obtained the first time you connect and authenticate [log on] to the network.

Hardware Requirements

  • All wired devices must have an ethernet port on their device, connecting to the data port in rooms with a Cat5e (or better) straight-thru ethernet cable (purchased at local computer stores). Data ports are usually orange, and may be labelled with a number preceded with the letter D. (Freshman rooms may have a black data port).
  • All wireless devices (laptops, smartphones with wi-fi support, handhelds, game consoles) must support WPA-2 Enterprise Encryption. If you do not see an option for WPA-2 Enterprise security encryption in your device settings (or when purchasing a laptop) - your device will not meet our ResNet requirements and will not be able to use the wireless network on campus. Some devices may need simple updates from their vendors, others may be too old to update and support this critical security function. Click on the Wireless configuration link in the left menu for configuration information.
  • Gaming devices (XBOX/PlayStation/Wii) are allowed access on ResNet.
  • Routers are prohibited from being used on ResNet.

Software Requirements

  • Minimum Operating System Requirements
    • Windows 2000 or greater (95, 98, Me will not be compatible)
    • Apple Mac OS X  10.4 or greater
    • Linux - not supported
  • All computers must have their operating system patched and updated, obtaining critical updates as they’re released. Run Windows Update: Start-Programs-Windows Update
  • All computers must have an anti-virus installed and current virus definitions. Often, student systems have been purchased with trial subscriptions of anti-virus solutions, and allow them to expire.  Free alternatives are available (click Software Downloads in left menu).


  • P2P music/file-sharing programs are prohibited!
    (Limewire/QQ/Ares/Bittorrent/etc...). If the network monitors detect such activity coming from your system, your connection will be disabled until you have fully removed the software. 
  • Anti-Virus software must be fully functional and updated. 
    Virus/trojan/worm infections detected coming from your system will result in your connection being disabled until infections are eliminated and a fully operational anti-virus solution is running.

Registration Instructions (On-Campus)

  1. Refer to the Hardware and Software requirements above, ensuring your system can connect to the network via wire or wireless - prior to proceeding to the next step.
  2. Launch your web browser, i.e. Firefox. Your browser should automatically take you to the SVSU Network SafeConnect authentication screen.
  3. The first time you connect, you will be required to download and install the SafeConnect security key.
  4. Enter your SVSU username and password, then click I AGREE to download the security policy key (which is required, as noted above).
  5. All students must abide by the SVSU Acceptable Use Policy. Authenticating your computer and downloading the key is an acknowledgement that you agree to its terms.
  6. As long as the key is installed on your system, all that will be required on a daily basis is to log in via the web browser.
  7. The system will authenticate your logon information and then proceed with a required scan of your computer. The scanning process will check for operating system patch vulnerabilities AND a current/updated installation of an approved anti-virus solution. Also, P2P applications may be detected through a scan and, if found, will warn you and deactivate your connection.
  8. Once the agent is successfully downloaded and successfully scanned your system, your device will be granted access to the network resources.

Other Security Items for Windows Users

  1. It is recommended that you disable File and Print Sharing on your computer for additional security. 
  2. Rename your default Workgroup (most computers use the same default and thereby makes your system appear as a shareable device on the network). Right-click on My Computer, select Properties, then under Computer Name click Change.