SSID: eduroamThis wireless network allows secure access to services for students, staff and guests. The authentication with a valid username and password is needed, before access to the network ist granted. This technique is based on the standard IEEE 802.1x.
There are different implementations of the protocol EAP used for authentication and exchange of cryptographic key information. To support the specific protocol which is used by the access point a specific software (called supplicant) is required.
For technical reasons, the protocol used for members of the TUHH is EAP-TTLS. Many operating systems support this protocol without the need of additional software.
Guests may access this network as it is part of the eduroam Project by using the supplicant of their home institution. After connecting, they will have access to the Guest Network.
ConnectFor all operating systems, there are some configuration steps to be performed, before a connection with this wireless network can be established.
After the supplicant is configured properly, choose the wireless network eduroam from the list of available networks.
Once your login information has been verified, your device automatically receives an IP address and you will be able to use the network.
Note: Public network eduroam
SHA1 fingerprint: 59:Here you can find further information about the root certificate.
0D: 2D: 7D: 88: 4F: 40: 2E: 61: 7E: A5: 62: 32: 17: 65: CF: 17: D8: 94: E9
SHA256 fingerprint: 91:
E2: F5: 78: 8D: 58: 10: EB: A7: BA: 58: 73: 7D: E1: 54: 8A: 8E: CA: CD: 01: 45: 98: BC: 0B: 14: 3E: 04: 1B: 17: 05: 25: 52
When you are asked to check the fingerprint of the server to which you give your username and password, check whether it matches one of the listed TUHH server!
MD5 Fingerprint=D4:SHA1 Fingerprint=8D:
73: A7: C9: F6: 0D: EC: B2: CD: A6: 3D: AD: 05: 51: 65: D5
13: 76: 76: 89: 47: 0D: 54: FC: E3: C0: 4E: 0F: 76: A8: A4: 86: 14: 01: F7
SHA224 Fingerprint=A1:SHA256 Fingerprint=E3:
D7: F2: F0: 4C: FF: 25: 2E: E5: 65: 29: 81: ED: C6: FE: 40: 68: 10: F2: 8A: A4: 65: 82: F1: C2: F5: F2: 9F
86: 93: 8B: 15: FE: C1: FA: AE: A8: 5C: 36: CB: 68: CD: FC: 1C: 72: 05: B1: A0: CE: 7C: 65: 88: 3F: 4F: 81: D0: D5: 18: B0
4F: 1C: BB: E7: A4: 71: D2: B4: 61: 25: 23: 62: 28: 62: 84: 37: 36: A6: B7: 30: D8: EA: E9: 0D: BE: B0: 12: 79: 06: BA: 12: 1B: 28: B1: 71: D8: 51: CF: F4: 85: 72: 24: 98: 4C: D2: 8F: CD
0D: F7: 4A: B7: BF: D0: 76: 8F: C0: 0E: 10: 21: E8: 18: E4: 98: 80: F8: 55: C5: C3: 35: 26: F1: F0: A4: 85: 77: 72: 82: BF: 96: C4: D8: BC: 7F: C8: 75: F6: D6: C8: BC: 25: BC: 0E: 51: 3D: 41: 9A: 34: 8F: 3E: DF: 4E: 3C: 9A: 8E: 88: D9: 80: B8: 65: EE
The RZ recommends to not trust the eduoram network and to use a local firewall. This is due to several hundred different wireless devices, which connect to this network. If you use a Windows operating system, please select "public network" for the eduroam SSID. We recommend using the Windwos Firewall because there are no known issues with for example the VPN client.
LimitationsMembers of the university are in the TUHH intranet after logging in. For security reasons, the following restrictions still apply when accessing the Internet:
- Unencrypted access to exteral e-mail server (TCP Port 25) is not allowed.
- TCP ports 135, 139 and 445 are blocked.
- UDP ports 137, 138 and 445 are blocked.
Guests who log in to eduroam as part of the DFNRoaming get access to the Guest Network (Veranstaltungsnetz). During the first access a Webpage with hints regarding these restrictions and data protection will be shown (Captive Portal). Logfiles regarding the authentication at the home institution will be kept for 7 days for troubleshooting purposes.
Configuration details of the supplicantUnfortunately, we do not provide instructions for all operation systems, particularly of smartphones, so you need to help yourself. If you have succeeded to connect your device to the network feel free to provide a guide and contribute to the help pages.
- Network Name: eduroam
- Network Authentication: WPA2
- Data Encryption: AES
- Network Type: Infrastructure
- User Authentication: EAP-TTLS (EAP with tunneled TLS)
- CA Certificate: Root Certificate T-TeleSec GlobalRoot Class 2
- Server certificate issued to radius-wlan.rz.tuhh.de
that means the radius server of the RZ presents you a certificate of the TUHH CA
- Outer Identity: firstname.lastname@example.org
- Inner Identity: transmit username and password via PAP, ie as username and password enter your RZ account name and Kerberos password
- Assignment of IP addresses: automatic/dynamic/DHCP
General troubleshooting information
- After connecting, you will receive a dynamically assigned IP address (via DHCP) from one of the network ranges:
- Network block 18.104.22.168/20 means that the address starts with 134.28.176.X ... 134.28.191.X. The network mask is 255.255.240.0 and the default gateway is 22.214.171.124.
- Network block 126.96.36.199/21 means that the address starts with 134.28.160.X ... 134.28.167.X. The network mask is 255.255.248.0 and the default gateway is 188.8.131.52.
- The default gateway should be reachable via ping 184.108.40.206 or ping 220.127.116.11.
- The name resolution (DNS) should work. It always should be possible to open
https://www.tuhh.de in your web browser.
The TUHH automatically assign you the servers 18.104.22.168 and 22.214.171.124.
Please make sure that your device has the latest patches installed, that you are not using more than one anti-virus program and that no "unblocker" is active.
(Unblocker are programs which can unlock content, that is blocked in one country, but not another.)
If you have questions or problems, please have a look at our help pages first. (Klick here for VPN Help)
With questions, suggestions, reports or further problems please contact our User Service Center (Helpdesk). We respond quickly to e-mails to email@example.com.
During the semester, the WLAN consultation will take place with Jelisa Bonsen and Phillip Vogel in E2.048. You can find the dates here, as well as in the corridors in the E building.
- wednesdays: 14:00 - 17:00
- thursday: 12:00 - 15:00