MENU

VPN for Windows

Students may access UMKC network resources from off-campus through the Global Protect Virtual Private Network (VPN) client.  The Global Protect VPN client provides a secure connection to your personal and web page storage via the N: and Q: drives for Windows 10/8.1/7 computers.

VPN Client Software

The Global Protect VPN client is available below. Sign in with your UM System username and password and download the appropriate client for your operating system.


https://weblogon.umkc.edu/global-protect/login.esp

VPN Client Software

  1. Click to download and run the GlobalProtect VPN client from the link above.  Depending on security settings, you may receive a second prompt.  If so, click the Run button in this second prompt, too.

 

  1. You will be asked if you want to install the VPN Client. Click "Next" to continue.

     

  1. Confirm the installation of the GlobalProtect VPN Client. Please click "Next".                                                 .

  2.  

  3. Once the client installation has finished, you will see the following dialog box.  Please click the "Close" button to complete the VPN client installation. 
  4.  

Windows VPN Client Usage

  1. The VPN Client requires that you have established a connection to the Internet before using it. 


  2. You should see the following dialog appear above your task bar, if not plase click on the grey globe icon in your utility tray. When asked to enter "your portal address" please type the following without quotes "weblogon.umkc.edu".                     
  3.  



  4. Enter your username in the format UMKCusername@umsystem.edu and password into the "Username" and "Password" boxes respectively.  Click the "Sign In" button.

     
  5.  

     

  6. Check the globe icon in your utility tray to confirm the VPN connection status. When connected this icon will be blue.




 


 





Terms of Use

A VPN connects your device to the UMKC network. This means it is visible to the world as part of the UMKC network which exposes it to the same threats as any device on the campus. These may include attempts to gain unauthorized access to your machine. Your device's vulnerability is determined by the security settings, policies and behaviors you employ in the use and management of the device. It is your responsibility to protect your device from unauthorized access.