What is Secure*Air?
Secure*Air is the wireless network at The University of Texas at Tyler. The wireless network uses 802.1b/g/n to allow the members of the UT Tyler community to connect to the UT Tyler network using wireless devices. Secure*Air is available in various buildings around the UT Tyler campus.
Who may connect to Secure*Air?
Secure*Air is for the exclusive use of The University of Texas at Tyler member community. This community is composed of students, faculty, and staff.
How do I connect to Secure*Air?
Click on the wireless icon and select Secure*Air.
How do I log in to Secure*Air?
- UTTyler credentials for faculty and staff. If you are faculty or staff, please use your UTTyler email address to login in the format firstname.lastname@example.org (i.e., email@example.com)
- PATRIOT account credentials for students. If you are a student, please use your Patriot email address to login in the format firstname.lastname@example.org (i.e., email@example.com)
Will Secure*Air work on my computer?
Secure*Air will work on any computer (Mac or PC) equipped with at least an 802.11b "WiFi" Card. To access the secure network you must have a wireless card capable of at least 802.11b/g. Computers equipped with 802.11a/b/g/n cards are supported as well.
Where is Secure*Air available on the UT Tyler campus?
- Business Building (BUS)
- Hudnall-Pirtle-Roosth Building (HPR)
- Biology Education and Psychology Building (BEP)
- Ratliff Building South (RBS)
- Ratliff Building North (RBN)
- Robert R. Muntz Library (LIB)
- Physical and Health Education Building (PHE)
- University Center (UC)
- Braithwaite Building-Nursing (BRB)
- Administration Building (ADM)
- Longview Campus (LUC)
What if I have questions, comments or suggestions?
Please don't hesitate to email us at firstname.lastname@example.org, call us at ext. 5555 (903.565.5555), or come by BUS 101.
Do NOT send your password.
Do NOT send your Social Security Number.
UT Tyler Policy Acknowledgment:
- Unauthorized use is prohibited.
- Usage may be subject to security testing and monitoring.
- Misuse is subject to criminal prosecution.
- No expectation of privacy except as otherwise provided by applicable privacy laws.