Students may access UMKC network resources from off-campus through a Virtual Private Network (VPN) client. The UMKC VPN client provides a secure connection to your personal and web page storage via the N: and Q: drives for Windows 8/7/Vista computers. Additionally, Macintosh computers can connect with VPN software built into the operating system.
VPN Client Software
The UMKC VPN clients are available in multiple packages depending on operating system and drive mapping functionality. Click the file name to download and install the most appropriate version for your system and usage.
Windows 8/7/Vista VPN client without drive mappings (v432v.exe)
Windows 8/7/Vista VPN client with N: and Q: drive mappings (v432vd.exe)
Windows 8/7/Vista (64-bit) VPN client without drive mappings (v464v.exe)
Windows 8/7/Vista (64-bit) VPN client with N: and Q: drive mappings (v464vd.exe)
Macintosh OS X has VPN software built into the operating
system. Click the link below to access this instruction set.
Windows VPN Client Installation Instructions
- Click to download and run the appropriate VPN client from one of the links above. Depending on security settings, you may receive a second prompt. If so, click the Run button in this second prompt, too.
- You will be asked if you want to install the VPN Client. Click "Yes" to continue.
- The next screen will ask you to choose to install the VPN Client for use by all users or only yourself. It is recommended that you choose "My use only". If you would like a VPN shortcut on your desktop check the box next to where it says "Add a shortcut on the desktop".
- Once the client installation has finished, you will see the following dialog box. You may click the "Cancel" button if you do not wish to logon at this time.
Windows VPN Client Usage
- The VPN Client requires that you have established a connection to the Internet before using it.
- You should see the following shortcut (or a very similar one) on your desktop. Double-click this shortcut to start the VPN client
- If you are using Windows 8, the Networks dialog will display. Click on the "UMKC G4 VPN Vista 64 Drives", or similar, entry and click Connect.
- Enter your username and password into the "user name" and "password"
boxes respectively. Click the Connect button.
NOTE: It is not recommended that you check the box next to "Save password". This will save your password to the computer's hard drive, which could be a security risk. Instead, leave the box unchecked and type your password each time you logon.
- To confirm the VPN Client is connected, clicking on the network icon in the system tray (located in the lower right-hand corner of the taskbar). The network icon is circled in red in the picture below for convenience.
- Clicking on the network icon in the system tray will display the Networks dialog. The "UMKC G4 VPN Vista 64 Drives", or similar, entry will display Connected when it is active.
If you chose a client with drive mapping functionality, you will see a command prompt window will display and prompt you to enter your password again. This command is designed to easily map N: and Q: drives the same way it is done for on-campus machines logging into the domain. The command prompt will look something like:
- After successful completion of the drive mappings, the Command Prompt window will close. You can access the new drives from the Windows Explorer icon on your taskbar or the Computer item under your Start Menu.
- When you are finished utilizing the VPN connection, you can close the connection by clicking on the Network icon in the system tray to display the Network dialog. Click on the "UMKC G4 VPN Vista 64 Drives", or similar, entry and click Disconnect.
NOTE: Once your are connected to the UMKC network via VPN, your Internet connectivity outside of UMKC will be disabled. This is done to protect campus network resources form Internet-based attacks. Students are advised to disconnect the VPN connection when it is not in use. Once disconnected, normal Internet connectivity will be restored to your computer.
A VPN connects your device to the UMKC network. This means it is visible to the world as part of the UMKC network which exposes it to the same threats as any device on the campus. These may include attempts to gain unauthorized access to your machine. Your device's vulnerability is determined by the security settings, policies and behaviors you employ in the use and management of the device. It is your responsibility to protect your device from unauthorized access.