Virtual Private Network Connection

From ITwiki

(Difference between revisions)
Jump to: navigation, search
Line 41: Line 41:
* If you are trying to access the Library Databases, [[HD: Split Tunneling]] will not allow you to connect.
* If you are trying to access the Library Databases, [[HD: Split Tunneling]] will not allow you to connect.
* If you are using the VPN in an unsecure place (ie a Hotel Wireless Connection).  Only the traffic that is sent through the VPN connection would be secure, all other traffic would be unsecure.
* If you are using the VPN in an unsecure place (ie a Hotel Wireless Connection).  Only the traffic that is sent through the VPN connection would be secure, all other traffic would be unsecure.
 +
===Configure your computer to connect without Split Tunneling===
===Configure your computer to connect without Split Tunneling===

Revision as of 12:07, 7 January 2009

This article is Deprecated and may no longer apply to currently supported systems.

If you are experiencing issues related to software/resources mentioned on this page please search for a more current article.

Off-campus users needing to connect their computers to Stevens' campus network can make Virtual Private Network (VPN) connections. VPN is a way to virtually become part of the Stevens network while using your Internet Service Provider (ISP) to access the Internet. VPN uses functions such as "tunnelling" through a firewall to maintain security and encryption of data. Note: Effective as of September 8, 2003, you must use your Stevens Pipeline user name and password to authenticate a VPN connection to Stevens.

Using a VPN connection from off campus gives you remote access to the campus network as though you were physically on campus. Benefits include being remotely assigned a Stevens IP address; ability to map network drives such as \\storage01\public, your \\storage01 area, (for those who have an account on that server); ability to send email to off-campus users through Stevens' mail server (called "relaying"); accessing Library databases more easily; and use of existing network printing services.

Contents

VPN connections should primarily be used in two situations

  • When you need to do something securely on a campus server and you are on the Internet.
  • When something you can do on-campus is not available remotely via your ISP.

If you are not doing the above tasks, VPN is not required.

Requirements

  • Windows 2000, Windows XP, Windows Vista, MAC OSX, or Linux installed on your computer.
  • A valid Campus Domain Account user name and password on Stevens' Pipeline.
  • Internet Service Provider (ISP) access via dial-up, cable modem, DSL, or ISDN.

General Information

Outgoing VPN connections (from within Stevens to somewhere outside) are not allowed. Also keep in mind that most corporate LANs do not allow outgoing VPN connections.

Note that accessing the Library databases from off-campus using VPN connections will be slow, as the security negotiations that take place while using VPN greatly decrease your connection speed.

HD: Split Tunneling

Stevens VPN is now able to be used with HD: Split Tunneling. This concept allows all traffic that is associated with Stevens to be sent through the VPN connection while all other traffic is sent through your normal internet connection.

HD: Split Tunneling should not be used in these situations

  • If you are trying to access the Library Databases, HD: Split Tunneling will not allow you to connect.
  • If you are using the VPN in an unsecure place (ie a Hotel Wireless Connection). Only the traffic that is sent through the VPN connection would be secure, all other traffic would be unsecure.


Configure your computer to connect without Split Tunneling

In order to connect to the Stevens VPN, please follow the directions for your operating system below.


Configure your computer to connect using Split Tunneling

If you are trying to access the Library Databases, do NOT use Split Tunneling

In order to connect to the Stevens VPN using split tunneling, please follow the directions for your operating system below.

Personal tools