- Housing options
- Moving in
- Contact us
- COVID-19 Information
SFU Residence and Housing provides residents and guests with secure and reliable high speed wireless internet throughout all residence buildings. No matter where you are in residence, you will always be connected. Each room is equipped with WiFi making your connectivity simple and easy.
Connection made easy: 3 steps to connecting your devices to the network
Before connecting to the WiFi please read the Internet Network Acceptable Use Guidelines and the Internet and Technology Use Guidelines. These documentes can be found on our Forms Page.
Not adhering to the guidelines could end up costing you money.
|Open up WiFi Settings on your device||Look for the "SFURes" Network||Log in with the password|
Things to know
Wireless printers can no longer be used on the new network
Wireless printers are no longer supported on the new WiFi network as it is an internet only service. All devices will only have access out to the internet with all Device to Device traffic being blocked. This is an important security measure to prevent attacks and virus proliferation within the network. You are more than welcome to use a USB/Printer cable or Bluetooth to connect any printers to your computer.
For Hamilton Hall
- If you have both an access point and a personal microwave in your apartment, please ensure the microwave is not located directly under the access point as it could potentially interfere with the signal.
Smart Home Assistants are not compatible with the new network
Due to the streaming abilities of these devices over a network, for security reasons we have disabled the use of smart home assistants (Amazon Echo, Google Home, etc.) over the WiFi network. However, you are more than welcome to still use these devices as Bluetooth speakers.
The new WiFi solution has increased the bandwidth by 30Mbps downstream and 30Mbps upstream compared to the temporary solution which was asymmetrical at 30Mbps downstream and 3Mbps upstream. The SFUResNet runs over a fiber backbone compared to the temporary solution which runs over a coaxial backbone.
Using a hardwired connection
If you would like to use a hardwired connection in your room for internet, please use an Ethernet cord to connect to one of the following options:
- Wall jack port in your room labelled 'A' if you live in Hamilton Hall, Shell House, or the Charles Chang Innovation Centre.
- Wall jack port in your room labelled 'B' if you live in Townhouses, McTaggart Cowan House, Shadbolt House, Barbara Rae House, or Pauline Jewett House.
- Access point labelled 'internet' (4th port) if your room had an access point installed on the wall or ceiling in any of the residence buildings.
The SFUResNet uses both 2.4GHz and 5GHz bands on the single SSID. Devices that are capable of operating on the 5GHz band will connect to those channels via band steering.
Shaw WiFi: security, privacy, and regulation
WiFi Protected Access 2 (WPA2)
WPA2 is an encryption methodology to ensure all traffic between the end wireless device and the access point is encrypted or "scrambled". This WiFi protection is a simple methodology to ensure wireless SSID has a level of security. To protect against device to device access within the WiFi SSID or wireless network, firewall rules have been put in place to block all device to device traffic. This is the reason wireless printers are not supported on the network. The blocking of device to device practice is common in most hotels and major university housings.
Address Resolution Protocol (ARP) Spoofing
Any access point has the ability to spoof any SSID. As per the Acceptable Use Guidelines, spoofing the SFUResNet is in direction violation of this guideline. The SFUResNet has over the air monitoring that will detect and log devices that attempt to spoof the SFURes SSID. The SFUResNet blocks all device to device traffic. The network has security tools and logging to track traffic abnormalities.
Protection against outside systems
The SFUResNet has redundant firewalls to protect against outside systems attacking internal computing devices. In addition, all device to device traffic is blocked to prevent internal computing devices from attacking and/or packet flooding other internal computing devices. This type of activity would be in violation of the Acceptable Use Policy (AUP). It is highly recommended that all end computing devices have some level of protection in the form of a system firewall, malware, and virus protection to protect against malware gaining access to personal information stored on the end devices. The network cannot prevent a user from installing unknown software on his or her own device. Also, the network cannot prevent a user from connecting to an un-secure website and entering credit card information.