skip to content
 

Maths network access from home

What?

A VPN (Virtual Private Network) allows access to "internal" computing resources from "outside" across the internet, in a more transparent and general way than current methods of remote access (ssh, remote desktop, database etc.). Effectively the home/remote machine will acquire the same access as if it were on the internal Departmental network. 

Please note: when you connect to the Faculty's OpenVPN service, all network traffic from your computer will be routed via the Faculty network.

Why?

User benefits include:

  • easy to configure and use, giving a Maths Faculty network address which allows access to otherwise restricted resources (journals, file-servers etc.)
  • secure access (once connected, all traffic is encrypted)
  • supported for Windows, Mac and Linux/Unix as well as portable devices.

How?

See the page specific to your device (Windows, Mac, Linux, Android, iOS) or our generic instructions.

Once connected, you can access your home directory, store space and Windows role drives when connected to the VPN: The procedure is the same as for accessing them from a laptop on campus.

Caveat - ejournals

It should not be necessary to use the VPN to access ejournals, and if you are a visitor and have not been granted off-campus access, doing so is in violation of the JISC Model Licence. If you are a current staff member or student and there is a journal you can only access on site or with the VPN, please report the problem using the "ejournals and eresources problem report form" below.

Logging

We log your connections and disconnections from the VPN. While you are connected we also log your network traffic (this includes the IP addresses of the machines you connect to and the network port you connect on, but not details of the specific web pages you visit, nor anything about your email except that your computer connected to such-and-such a mail server at such-and-such a time). This is required by the UIS because otherwise, if there were an issue with a rogue VPN client, we would only know that a machine using the VPN server's IP address was causing trouble on the network, and we would have to shut the VPN down until the issue was resolved.

The logs are kept for 4 weeks, they are only accessible by Computer Officers, and we only look at them when there is a problem, we are trying to trace a bug or we suspect misuse.