{"id":7682,"date":"2020-08-24T13:00:20","date_gmt":"2020-08-24T11:00:20","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=7682"},"modified":"2023-06-01T08:55:02","modified_gmt":"2023-06-01T06:55:02","slug":"vpn-an-der-rwth","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2020\/08\/24\/vpn-an-der-rwth\/","title":{"rendered":"A Confidential Connection &#8211; VPN at the RWTH Aachen University"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_7682 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_7682')){$('.twoclick_social_bookmarks_post_7682').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2020\\\/08\\\/24\\\/vpn-an-der-rwth\\\/\",\"post_id\":7682,\"post_title_referrer_track\":\"A+Confidential+Connection+%26%238211%3B+VPN+at+the+RWTH+Aachen+University\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p>Many will already know the three big letters &#8211; V P N. This is the abbreviation for &#8220;Virtual Private Network&#8221;.<br \/>\nUsing various available protocols, an encrypted connection, a so-called &#8220;tunnel&#8221;, is established between your computer and the VPN server. All data traffic into the RWTH network &#8211; or, depending on the operating mode, all traffic &#8211; passes through this encrypted tunnel. Only from the VPN server onwards does the data begin its conventional unencrypted path into the network. Logically, the user&#8217;s computer has moved to a subnet of the RWTH Aachen University: In the &#8220;Full Tunnel&#8221; he now appears to third parties with an IP address of RWTH Aachen University.<\/p>\n<div id=\"attachment_7683\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/hunter-harritt-Ype9sdOPdYc-unsplash.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-7683\" class=\"wp-image-7683 size-large\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/hunter-harritt-Ype9sdOPdYc-unsplash-1024x683.jpg\" alt=\"\" width=\"1024\" height=\"683\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/hunter-harritt-Ype9sdOPdYc-unsplash-1024x683.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/hunter-harritt-Ype9sdOPdYc-unsplash-300x200.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/hunter-harritt-Ype9sdOPdYc-unsplash-768x512.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-7683\" class=\"wp-caption-text\">Secure access to the RWTH network via VPN &#8211; we explain how it works. <br \/>Source: <a href=\"https:\/\/unsplash.com\/photos\/Ype9sdOPdYc\">Unsplash<\/a><\/p><\/div>\n<p><!--more--><\/p>\n<p>All members of the RWTH Aachen University are authorized to use the central VPN of the RWTH Aachen University. In order for this to work, a so-called VPN client &#8211; a software &#8211; is required, which is downloaded according to the operating system used. You can find the link to the download portal on <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/vbf6fx0gom76\">IT Center Help<\/a> under &#8220;Configuration Instructions&#8221;.\u00a0The currently usable VPN Client supported by us is called AnyConnect.\u00a0Very important: If you want to use the VPN for the first time, you have to <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/rhb2fhkpjhb7\/article\/6bb72bcccb2c48e9805238b3131f62b2\">set a password<\/a> in the <a href=\"http:\/\/www.rwth-aachen.de\/selfservice\">self-service<\/a>.<\/p>\n<h3><strong>Application areas &#8211; what do I need it for?<\/strong><\/h3>\n<p>The connection via VPN is necessary if you want to search in the catalogs of the university library or if you need access to the high-performance computer of the RWTH Aachen University. Also, access to the RWTH Aachen University intranet as well as to the instructions for RWTHonline is only possible from the RWTH network and thus from outside only via VPN.\u00a0This also applies to the institute&#8217;s own data. For this purpose, institutes can have their own secure network set up at the IT Center in addition to the central VPN of RWTH Aachen University. If interested, administrators of the institute can contact our <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/IT-Center\/Services\/kompletter-Servicekatalog\/Beschaffungsportale\/~estp\/ServiceDesk\/?lidx=1\">IT-ServiceDesk<\/a>.<\/p>\n<h3><strong>Well-established infrastructure<\/strong><\/h3>\n<p>In general, the VPN service is in great demand and is used just as much. Especially in times like now, when many people do not work in their usual environment and have set up a workplace at home. In addition to the central VPN of the RWTH Aachen University, the IT Center is responsible for approximately 90 additional VPN access points for institutes &#8211; and the number is growing!\u00a0At the beginning of 2020, the central VPN infrastructure was renewed as part of the network renewal. A new, more powerful one replaced the existing infrastructure. Compared to the old infrastructure, almost four times as many people can now use the VPN at the same time. Since the renovation, the VPN is now also fully IPv6-capable.<\/p>\n<div id=\"attachment_7684\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-7684\" class=\"size-large wp-image-7684\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet-1024x576.jpg\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet-1024x576.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet-300x169.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet-768x432.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2020\/08\/VPN_bearbeitet.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><p id=\"caption-attachment-7684\" class=\"wp-caption-text\">In comparison: The old (top) and the new (bottom) hardware as pairs, each in redundant configuration.<\/p><\/div>\n<p>You can find more about VPN on <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/rhb2fhkpjhb7\/article\/6bb72bcccb2c48e9805238b3131f62b2\">IT Center Help<\/a>.<\/p>\n<p>Responsible for the content of this article are <a href=\"https:\/\/www.itc.rwth-aachen.de\/go\/id\/epvp\/gguid\/0x0EC9C01F8EFF104B810E20F8F5820CD8\/allou\/1\/\">Linda J\u00f6rres<\/a> and <a href=\"https:\/\/www.itc.rwth-aachen.de\/go\/id\/epvp\/gguid\/0xD91E01F6C3D51E439F5365E0DA5FB893\/allou\/1\/\">Benedikt Paffen<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":1859,"featured_media":7683,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[315],"tags":[549,548,57,547],"class_list":["post-7682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services-support","tag-cpn-client","tag-infrastruktur","tag-vpn","tag-vpn-server"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/7682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/1859"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=7682"}],"version-history":[{"count":4,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/7682\/revisions"}],"predecessor-version":[{"id":15856,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/7682\/revisions\/15856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/7683"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=7682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=7682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=7682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}