Virtual Private Networking (VPN)VPN software allows a computer on another network to look like it has an SCS name and IP address when it talks to hosts on the SCS network. Using VPN, a remote host can access restricted network services that can only be used by SCS hosts.
VPN & securityThe VPN software uses certificates to authenticate your computer, and your Kerberos /remote instance to authenticate you. It encrypts network traffic between your host and the SCS network; traffic is not encrypted after it reaches our network. VPN is not a substitute for using software such as SSH or SFTP to protect passwords and other sensitive data sent over the network.
Troubleshooting & FAQsSee the VPN FAQs for troubleshooting information and answers to Frequently Asked Questions.
How to install and use VPNNote: You must be CMU School of Computer Science faculty, staff, or a graduate student in order to download, install, and use this software.
Platform-specific instructions for:
- Security in SCS
- Secure computing and how to protect your computer against intrusions
- Manage your Kerberos /remote instance
- Use the SCS Web-based tool to create or manage your Kerberos instances for use with VPN and other remote-access systems.
Additional informationThis offsite link will open in a new browser window:
- Cisco VPN client documentation
- Cisco documentation for all versions and platforms of their VPN client.