University of Regina Logo

VPN Required

Restricted Access Notice

Notice: FAST is only available "on campus" or through the Virtual Private Network (VPN)

VPNVirtual Private Network (VPN)

The VPN service for the campus allows off campus access to services that are normally limited to only on campus access. For example, URDocs and the new version of FAST are limited to on campus access. To access these services from off campus you will have to use a VPN client. Additional background information describing what VPN's are and why they are important follows the installation instructions.

INSTRUCTIONS:
Installation and configuration instructions are available at https://www.uregina.ca/is/infrastructure/network/technotes/569.html

SETUP:
If you have any questions or require assistance setting up the VPN please contact the IT Support Centre by email IT.Support@uregina.ca or phone 306-585-4685.

BACKGROUND INFORMATION:
The Internet is by design an open and flexible networking platform. That openness, while valuable, creates considerable risk when computer systems are connected to the Internet. In addition to all the intended uses for a system, the system is exposed to anyone wishing to do harm. To help control this risk many valuable systems have access to them restricted where internal/private networks connect to the public Internet. Local clients on the private network may access the system while clients on the public Internet can not. This enhances security of course but it also restricts legitimate use. Enter the Virtual Private Network or VPN.

A VPN is able to extend the private network using a public network to transit the connection. It does this by running a program on the client computer which establishes a secure and encrypted connection between the client computer and the organizations private network. In essence the private network is extended to include the remote client computer. Once the VPN connection is established the remote computer behaves as if it is connected directly to the private network, for security purposes at least.

Restricting access to sensitive systems and information in this fashion reduces the risk of unauthorized access to private information.