Virtual Private Network (VPN)

To start using ÂÜÀòÉäÇø's VPN service, please install the Palo Alto GlobalProtect client software prior to connecting. Installation instructions by operating system are also listed below. The download site can be accessed using your ÂÜÀòÉäÇø credentials.

Installation instructions

Palo Alto GlobalProtect VPN Client install instructions for Windows

Palo Alto GlobalProtect VPN Client install instructions for Macintosh

How to connect after install is completed

Open the GlobalProtect client and connect. ÂÜÀòÉäÇø Login information requires only username and password. 

GlobalProtect VPN Connection Information

Palo Alto GlobalProtect VPN Client install instructions for Windows

Palo Alto GlobalProtect VPN Client install instructions for Macintosh

How to connect after install is completed

Open the GlobalProtect client and connect. ÂÜÀòÉäÇø Login information requires only username and password. 

What is a VPN and why you would want to use it?

A virtual private network (VPN) extends the ÂÜÀòÉäÇø network through the Internet enabling users to access ÂÜÀòÉäÇø resources as if they are connected locally to the campus network.  Furthermore, VPN traffic is encrypted between remote computers and the campus network in order to keep the data travelling through it private and secure. 

Computers using the ÂÜÀòÉäÇø VPN system have all of the benefits of locally connected computers, including access to resources such as shared drives (H: and G: drive) which are normally unavailable for access from off campus.

Another benefit to using the VPN system is that it can be used to secure a local network connection keeping those around you from being able to access your network traffic. This is especially useful in places where one must use a non-encrypted wireless network such as in a cafe or airport. On a non-encrypted wireless network, it is easy for people to intercept your network traffic.  The ÂÜÀòÉäÇø VPN service provides protection in such circumstances as well.

Using the ÂÜÀòÉäÇø VPN system from such locations encrypts your data all the way to the ÂÜÀòÉäÇø network.