Frequently Asked Questions
Clean Access - General Questions
What is Cisco Clean Access Agent?
Clean Access Agent helps ensure that only authorized users can connect to the University's network and that their computers are safe for the network.
Am I required to install any software on my computer?
All Microsoft Windows XP/Vista/7 and Mac OS X computers are required to install the Clean Access Agent client software to connect to the University network.
How does Clean Access Work?
The first time you connect your computer to a live UTHSC network jack and launch a web browser, you will be redirected to a page for registering your computer on the network. Next, you will be redirected to a page for downloading Cisco Clean Access Agent.
From this point forward, every time Windows or Mac OS X is restarted, the Clean Access Agent will present you with a pop-up login window to gain access to the UTHSC network, utilizing your UTHSC NetID and password for authentication. Upon successful authentication, the Clean Access Agent will check your computer to make sure it passes the following security compliance requirements: critical Windows updates are installed, Windows automatic update feature is enabled, antivirus software is installed & virus definitions current, and that your computer is part of the UTHSC Domain.
If your computer meets the security compliance requirements, you will be able to access all UTHSC network services and the Internet while Clean Access Agent remains in the background.
If your computer does not meet the security compliance requirements, you will be granted temporary network access & instructed how to become compliant. Specific instructions or clickable links to specific Web sites will be provided for becoming compliant.
How do LINUX/UNIX computers use Clean Access?
LINUX & UNIX users are not required to install the Cisco Clean Access Agent to gain access to the UTHSC network. However, LINUX & UNIX users will be prompted each time they connect to the network to login with their UTHSC NetID and password via a webpage, where users are also required to accept the ITS Acceptable Use policy.