![]() ![]() Use the IU VPN only under one of these conditions:.Connect to IU's SSL VPN using OpenConnect on a 64-bit Linux workstation. ![]() Connect to IU's SSL VPN using Pulse Secure on a 32- or 64-bit Linux workstation.Chromebook: Connect to IU's SSL VPN with Pulse Secure from a Chromebook.Android mobile: Connect to IU's SSL VPN with Pulse Secure from an Android mobile device.iOS: Connect to IU's SSL VPN with Pulse Secure on an iOS device.Windows or macOS: Connect to IU's SSL VPN using Pulse Secure for Windows or macOS.The Pulse Secure client is the official replacement for the Junos Pulse client previously used at IU.įor instructions for connecting to IU's SSL VPN, see: Connect to the VPNįor the greatest reliability across the widest range of platforms and network configurations, UITS recommends using the Pulse Secure SSL VPN client (produced by Pulse Secure, LLC), where available, to connect to IU's SSL VPN. Whenever you are off campus and cannot connect to an IU service, connect to the IU VPN to check whether that fixes the problem.įor more about what traffic is encrypted with IU VPN connections, see VPN split tunneling at IU. Also, you can use an IU VPN connection or IUanyWare to make a remote desktop connection from off campus. VPN at IUĪt Indiana University, UITS delivers a centrally managed, fault-tolerant SSL VPN service for use by all IU campuses.Įstablishing an IU VPN connection creates a secure tunnel between your off-campus computer or mobile device and the IU network, allowing you to access online services and resources that are configured to refuse connections from outside the IU network (such as IU Print queues, certain library databases, and most network storage devices). To prevent data from being intercepted (especially confidential financial data, or data protected by federal laws, such as FERPA and HIPAA data), businesses, government offices, universities, and other institutions use VPN systems to encrypt data transmitted between their secure networks and remote users. Even data originating from a secure network (for example, one provided by your employer or school) may be vulnerable if they are being transmitted to another secure network over the public internet. Many public wireless networks (such as those provided by hotels and restaurants) are not encrypted, leaving transmitted data unprotected and vulnerable to electronic surveillance. The encryption protects the data your computer or mobile device transmits and receives over the internet, enabling secure remote access to restricted online resources. A virtual private network (VPN) allows you to temporarily create or join a private network across an existing public network by creating an encrypted tunnel between two hosts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |