Virtual Private Networking (VPN)
VPN software allows a computer on another network to look like it has an SCS name and IP address when it talks to hosts on the SCS network. Using VPN, a remote host can access restricted network services that can only be used by SCS hosts.VPN & security
The VPN software uses certificates to authenticate your computer, and your Kerberos /remote instance to authenticate you. It encrypts network traffic between your host and the SCS network; traffic is not encrypted after it reaches our network. VPN is not a substitute for using software such as SSH or Kerberized telnet to protect passwords and other sensitive data sent over the network.Troubleshooting & FAQs
See the VPN FAQs for troubleshooting information and answers to Frequently Asked Questions.How to install and use VPN
Note: You must be CMU School of Computer Science faculty, staff, or a graduate student in order to download, install, and use this software.Platform-specific instructions for:
How to update VPN certificate
Related documentation
- Security in SCS
- Secure computing and how to protect your computer against intrusions
- Manage your Kerberos /remote instance
- Use the SCS Web-based tool to create or manage your Kerberos instances for use with VPN and other remote-access systems.
Additional information
This offsite link will open in a new browser window:- Cisco VPN client documentation
- Cisco documentation for all versions and platforms of their VPN client.

