OS X has a built-in Virtual Private Network (VPN) client that allows you to establish a secure connection to UMKC's local area netowrk.
Apple OS X 10.7 to 10.11
- Open System Preferences. It can be accessed by clicking the Apple menu in the top left corner and selecting System Preferences.
- Open the Network tab.
- Unlock the Network pane by clicking the lock in the lower left and entering an administrator name and password.
- Once unlocked, click the "+" button in the lower left to bring up the Add Service screen. Select VPN from the drop-down menu.
- For the VPN type select 'PPTP'.
- For the Service Name type 'UMKC VPN'.
- Click 'Create'.
- In the space next to 'Server address', type: vpn.umkc.edu
- In the space next to 'Account name', type your Exchange username.
- In the space next to 'Encryption', leave it set to Automatic (128 bit or 40 bit).
- Click "Advanced"
- Check the box for 'Send all traffic over VPN connection'
- Click OK to save the Advanced Settings.
- Check the box next to 'Show VPN status in menu bar'. This will create a VPN icon at the top of the screen you can use later to start and stop the VPN connection.
- Click the Apply button at the bottom of the Network window.
- Click 'Connect'. The VPN Connection window will prompt you for your password. After you enter your password, the VPN icon at the top of the screen will show the authentication process and then present a timer to indicate how long the connection has been active.
- You may now use software that requires a secure connection to the campus network.
- When you no longer need the VPN connection, close it by clicking the VPN icon at the top of the screen and selecting Disconnect UMKC VPN from the dropdown menu.
- To restart the VPN connection to the UMKC network later, just click the VPN icon at the top of the screen and select 'Connect UMKC VPN'.
A VPN connects your device to the UMKC network. This means it is visible to the world as part of the UMKC network which exposes it to the same threats as any device on the campus. These may include attempts to gain unauthorized access to your machine. Your device's vulnerability is determined by the security settings, policies and behaviors you employ in the use and management of the device. It is your responsibility to protect your device from unauthorized access.