Remote Access & VPN
In efforts to further improve the overall security of the Computer Science Department's computing resources, we will be blocking Remote Desktop(RDP) and SecureShell(SSH) at the edge of our network on the night of January 12th at 11pm. This change is intended to reduce our current attack surface, and limit the effectiveness of brute force attacks levied against our computing resources. In addition to putting these restrictions in place, we will also be migrating our VPN to our newly acquired Palo Alto firewalls. This page is intended to provide information on what can be expected after the remote access restrictions have been put in place as well as details on how to connect to the new VPN.
Remote Access Policy Changes
Inbound RDP and SSH access will be restricted to all resources with the following exceptions:
- These computing resources will still be available without the need for VPN:
- Our Virtual Computing Lab (vclab.cs.odu.edu)
- Our departmental Linux machines (linux.cs.odu.edu, atria.cs.odu.edu, sirius.cs.odu.edu)
- RDP/SSH connections will not be blocked if they are originating anywhere on campus.
Besides the caveats mentioned above, remote access to all servers/workstations will require that a connection be established to our VPN first.
Our VPN is available to Students, Faculty, and Staff. The only requirement for connecting to the VPN is a valid CS account.
Connecting Printers (MacOS)
Below is a guide for setting up connection to printers once connected through a VPN connection.
"After establishing a connection to the GlobalProtect VPN on Windows, the new VPN network shows up as unidentified/unknown. Why?"
- The GlobalProtect VPN doesn't assign a default gateway as it isn't needed. Windows determines networks with no default gateway set to be unidentified/unknown by default. This is expected behavior.