MENU

VPN for Windows

Students may access UMKC network resources from off-campus through a Virtual Private Network (VPN) client.  The UMKC VPN client provides a secure connection to your personal and web page storage via the N: and Q: drives for Windows 7/Vista computers.  Additionally, Macintosh computers can connect with VPN software built into the operating system.

VPN Client Software

The UMKC VPN clients are available in multiple packages depending on operating system and drive mapping functionality.  Click the file name to download and install the most appropriate version for your system and usage.

Windows 8/7/Vista VPN client without drive mappings (v432v.exe)
Windows 8/7/Vista VPN client with N: and Q: drive mappings (v432vd.exe)
Windows 8/7/Vista (64-bit) VPN client without drive mappings (v464v.exe)
Windows 8/7/Vista (64-bit) VPN client with N: and Q: drive mappings (v464vd.exe)

Macintosh OS X has VPN software built into the operating system. Click the link below to access this instruction set.

MacOS X VPN instructions

Windows VPN Client Installation Instructions

  1. Click to download and run the appropriate VPN client from one of the links above.  Depending on security settings, you may receive a second prompt.  If so, click the Run button in this second prompt, too.

Download dialog box

  1. You will be asked if you want to install the VPN Client. Click "Yes" to continue.

    Install question
     
  1. The next screen will ask you to choose to install the VPN Client for use by all users or only yourself. It is recommended that you choose "My use only". Select the checkbox to place a shortcut on the desktop for the VPN Client. To do this, check the box next to where it says "Add a shortcut on the desktop".
  2. My Use Only

  3. Once the client installation has finished, you will see the following dialog box.  You may click the "Cancel" button if you do not wish to logon at this time.
  4. VPN Logon Prompt  

Windows VPN Client Usage

  1. The VPN Client requires that you have established a connection to the Internet before using it. 


  2. You should see the following shortcut (or a very similar one) on your desktop. Double-click this shortcut to start the VPN client

    VPN shortcut

  3. Enter your username and password into the "user name" and "password" boxes respectively.  Click the Connect button.

    NOTE: It is not recommended that you check the box next to "Save password". This will save your password to the computer's hard drive, which could be a security risk. Instead, leave the box unchecked and type your password each time you logon.
  4. VPN Client Logon

     

  5. Now you should see an icon in the tray (located in the lower right-hand corner of the taskbar), indicating that the VPN Client is connected. The icon for the VPN Client is circled in red in the picture below for convenience.

    NOTE:  Once your are connected to the UMKC network via VPN, your Internet connectivity outside of UMKC will be disabled.  This is done to protect campus network resources form Internet-based attacks.  Students are advised to disconnect the VPN connection when it is not in use.  Once disconnected, normal Internet connectivity will be restored to your computer.



     
  6. If you chose a client with drive mapping functionality, you will see a command prompt window will display and prompt you to enter your password again.  This command is designed to easily map N: and Q: drives the same way it is done for on-campus machines logging into the domain.  The command prompt will look something like:/p>


     

  7. After successful completion of the drive mappings, the Command Prompt window will close.  You can access the new drives from the My Computer icon on your Desktop or the Computer item under your Start Menu.

  1. When you are finished utilizing the VPN connection, you can close the connection by right clicking on the VPN icon in the tray and clicking Disconnect.

Terms of Use

A VPN connects your device to the UMKC network. This means it is visible to the world as part of the UMKC network which exposes it to the same threats as any device on the campus. These may include attempts to gain unauthorized access to your machine. Your device's vulnerability is determined by the security settings, policies and behaviors you employ in the use and management of the device. It is your responsibility to protect your device from unauthorized access.

  



Was this page helpful to you? or
Do you like the new website? or