Header left.png

Difference between revisions of "Remote Access & VPN"

From Systems Group
Jump to: navigation, search
m (Change reference to vclab to vcportal)
(Updating information)
Line 1: Line 1:
In efforts to further improve the overall security of the Computer Science Department's computing resources, we will be blocking Remote Desktop(RDP) and SecureShell(SSH) at the edge of our network on the night of January 12th at 11pm. This change is intended to reduce our current attack surface, and limit the effectiveness of brute force attacks levied against our computing resources. In addition to putting these restrictions in place, we will also be migrating our VPN to our newly acquired Palo Alto firewalls. This page is intended to provide information on what can be expected after the remote access restrictions have been put in place as well as details on how to connect to the new VPN.
+
In the interest of security, Remote Desktop Protocol (RDP) and Secure SHell (SSH) connections made to our resources from outside of the campus network are blocked, with a couple exceptions noted below. Such connections can still be established by being on our VPN. This page is intended to provide information on how to connect to the VPN.
  
== Remote Access Policy Changes ==
+
== Remote Access Policy ==
Inbound RDP and SSH access will be restricted to all resources with the following exceptions:
+
Inbound RDP and SSH access are restricted to all resources with the following exceptions:
*These computing resources will still be available without the need for VPN:
+
*Our [[VCPortal | Virtual Computing Lab]] (vcportal.cs.odu.edu)
**Our Virtual Computing Lab (vcportal.cs.odu.edu)
+
*Our [[ Unix and Linux Services | departmental Linux machines]] (linux.cs.odu.edu, atria.cs.odu.edu, sirius.cs.odu.edu)
**Our departmental Linux machines (linux.cs.odu.edu, atria.cs.odu.edu, sirius.cs.odu.edu)
+
 
*RDP/SSH connections will not be blocked if they are originating anywhere on campus.  
+
RDP/ SSH connections will not be blocked if they originate anywhere on campus.  
 
Besides the caveats mentioned above, remote access to all servers/workstations will require that a connection be established to our VPN first.
 
Besides the caveats mentioned above, remote access to all servers/workstations will require that a connection be established to our VPN first.
  
Line 13: Line 13:
  
 
[[https://systems.cs.odu.edu/images/4/47/Palo-Alto_VPN_connection_rev3.pdf Instructions for connecting to the VPN]]
 
[[https://systems.cs.odu.edu/images/4/47/Palo-Alto_VPN_connection_rev3.pdf Instructions for connecting to the VPN]]
 +
 +
Note: Some guest accounts are not initially granted VPN access. If such access is required, send an email to root@cs.odu.edu and CC the head of the research group you are associated with for confirmation.
  
 
==Connecting Printers (MacOS)==
 
==Connecting Printers (MacOS)==
Line 18: Line 20:
  
 
[[https://systems.cs.odu.edu/images/4/47/Mac_Printing.pdf Instructions for connecting a printer while using MacOS and connected to VPN]]
 
[[https://systems.cs.odu.edu/images/4/47/Mac_Printing.pdf Instructions for connecting a printer while using MacOS and connected to VPN]]
 +
 
== FAQ ==
 
== FAQ ==
 
"After establishing a connection to the GlobalProtect VPN on Windows, the new VPN network shows up as unidentified/unknown. Why?"
 
"After establishing a connection to the GlobalProtect VPN on Windows, the new VPN network shows up as unidentified/unknown. Why?"
Line 23: Line 26:
 
*https://blogs.technet.microsoft.com/networking/2009/02/20/why-is-my-network-detected-as-unknown-by-windows-vista-or-windows-server-2008/
 
*https://blogs.technet.microsoft.com/networking/2009/02/20/why-is-my-network-detected-as-unknown-by-windows-vista-or-windows-server-2008/
  
== Known GlobalProtect Issue on MacOS ==
+
<!--
There is a known issue with using GlobalProtect 4.1.x on MacOS 10.13.x (High Sierra).
+
 
 +
Out of date information
 +
 
 +
== Known GlobalProtect Issue on MacOS 10.13.x (High Sierra)==
 +
There is a known issue with using GlobalProtect 4.1.x on MacOS.
  
 
=== The Issue ===
 
=== The Issue ===
Line 45: Line 52:
  
 
5) Re-install GlobalProtect
 
5) Re-install GlobalProtect
 +
-->

Revision as of 03:22, 13 March 2020

In the interest of security, Remote Desktop Protocol (RDP) and Secure SHell (SSH) connections made to our resources from outside of the campus network are blocked, with a couple exceptions noted below. Such connections can still be established by being on our VPN. This page is intended to provide information on how to connect to the VPN.

Remote Access Policy

Inbound RDP and SSH access are restricted to all resources with the following exceptions:

RDP/ SSH connections will not be blocked if they originate anywhere on campus. Besides the caveats mentioned above, remote access to all servers/workstations will require that a connection be established to our VPN first.

VPN

Our VPN is available to Students, Faculty, and Staff. The only requirement for connecting to the VPN is a valid CS account.

[Instructions for connecting to the VPN]

Note: Some guest accounts are not initially granted VPN access. If such access is required, send an email to root@cs.odu.edu and CC the head of the research group you are associated with for confirmation.

Connecting Printers (MacOS)

Below is a guide for setting up connection to printers once connected through a VPN connection.

[Instructions for connecting a printer while using MacOS and connected to VPN]

FAQ

"After establishing a connection to the GlobalProtect VPN on Windows, the new VPN network shows up as unidentified/unknown. Why?"