From Cncz
Revision as of 12:58, 24 February 2016 by Wim (talk | contribs) (VPN (Virtual Private Network) [verbinding][connection])
Jump to: navigation, search

VPN (Virtual Private Network) connection

  • C&CZ manages a VPN server, which makes it possible for all users to gain secure/encrypted access to the network with their Science username/password. The computer at home (or anywhere on the Internet) becomes part of the campus network. In this way users can get access to services that are normally only accessible from computers on campus. The most common of such services are connecting to disk shares or to special servers. For the use of the University library one does not need VPN, because the library has a proxy website, that can be used from anywhere on the Internet after logging in with your RU password.

As of November 2015, there is a new VPN, based on IPsec. We intend to have all users moved over to the new VPN before March 1, 2016 and then terminate the old VPN based on PPTP.

The instructions below to install the VPN will be expanded by C&CZ and probably also by employees/students.

  • General: VPN-server/gateway: vpnsec.science.ru.nl
  • Windows7/8/8.1/10: No special configuration needed.
  • iPhone/iPad: Download vpnsec.mobileconfig to your iPhone/iPad. Tested on iPad with iOS 9, according to documentation iOS 8 should work too, but remains untested.
  • Android: install the app strongSwan with "IKEv2 EAP (Username/Password)"
  • MacOS X: Download vpnsec-macosx.mobileconfig to your Apple computer.
    Adapt the Authentication Setings... in System PreferencesNetworkVpnSec to match your science account and password.
    Tested on Mac OS X Version 10.11.3, according to documentation Mac OS X 10.8 should work too, but remains untested.
    In case of problems, you could try to use the ISC VPN.
  • Linux: VPNsec Linux installation and configuration

Note: users of F-secure need to change the Firewall configuration to lift blocking of GRE.

Note: If the VPN connection drops immediately when you start to use it , it may be that the MTU value for the ethernet card is set too high, see for example optimizing MTU.

SSH SOCKS-Proxy to access journals (linux)

There is a convenient alternative to VPN or the UB proxy website described above to access online journals from anywhere. With SSH one can start a so called SOCKS Proxy-server, which can be used by web-browsers.

  • Login to your Science account with ssh:
 ssh -D 8942 lilo.science.ru.nl       # (or any other login-server)
 (Enter password if required)

If your Science username (e.g. "peter") is different on your local username use:

 ssh -D 8942 -l peter lilo.science.ru.nl

The -D flag starts "dynamic" application-level portforwarding. The port number (here 8942) can be any number above 1024 and below 65536. If a port is already in use by another process try a different number.

  • Tell the web browser to use the server. In Firefox:
 * Edit - Preferences - Advanced - Settings
 * Select "Manual proxy configuration"
 * SOCKS Host: localhost      Port: 8942
 * Select SOCKS v5
 * OK

If you now go to a journal website i.e., J. Chem. Phys., you should see "Your access is provided by: Universiteitsbibliotheek" and you should have the same access as from within the Radboud University domain.

Run ssh in the background

With these flags:

 ssh -f -N -D port 

ssh will run in the background (-f) and only setup the proxy server but not actually logon (-N).


The "netstat" command may be used to troubleshoot problems:

 netstat -at

will show all active and non-active tcp sockets. In the above example you should see something like:

 MYPC:/home/peter $ netstat -at
 Active Internet connections (servers and established)
 Proto Recv-Q Send-Q Local Address           Foreign Address         State      
 tcp        0      0 localhost:smtp          *:*                     LISTEN      
 tcp        0      0 localhost:8942          *:*                     LISTEN      
 tcp        0      0 *:ssh                   *:*                     LISTEN      
 tcp        0      0 localhost:ipp           *:*                     LISTEN      
 tcp        0      0 peter.home:36953        postvak.science.r:imaps ESTABLISHED
 tcp        0      0 peter.home:36808        lilo3.science.ru.nl:ssh ESTABLISHED
 tcp        0      0 localhost:smtp          *:*                     LISTEN      
 tcp        0      0 localhost:8942          *:*                     LISTEN      

Old VPN based on PPTP

Examples of installation and configuration of the old VPN: