hero-angle-alpha hero-angle-beta icon-rss-square icon-instagram icon-rss icon-facebook icon-facebook-square icon-facebook-official icon-twitter icon-twitter-square icon-google-plus icon-google-plus-square icon-linkedin icon-linkedin-square icon-pinterest icon-pinterest-square icon-youtube icon-youtube-square icon-youtube-play icon-search icon-gift icon-graduation-cap icon-home icon-bank icon-envelope icon-envelope-square Cabrini Logo Cabrini Logo icon-chevron-right icon-chevron-left category academics category athletics category just for fun category service and mission category living on campus category profiles category advice category activities and events Cabrini University logo with crest
Return Home
A Cabrini student on a laptop outside

Virtual Private Network

For Off-Campus Access

The Global Protect VPN client may be used to create a virtual private network (VPN) connection between your computer or mobile device and the Cabrini network.

This VPN connection provides secure access for faculty and staff to restricted computing resources, such as file servers, restricted web pages, and applications available on the Cabrini network.

ITR only supports Global Protect client software for Windows and Mac OS. 

VPN & Networked Drives Guide (How to connect)

When connecting to the Global Protect website or application please use your Cabrini Domain credentials. 

Detailed instructions for connecting the VPN and shared drives can be found at https://portal.cabrini.edu


Security via VPN

Off-network, we can access resources via Internet Service Providers, which increases the risk that private data might be intercepted by others. Making resources available off-campus also makes them more accessible to viruses, worms, and other internet-borne threats like hacking and denial of service (DoS) attacks. Using a VPN provides a safe way for you to access these resources remotely.

VPNs have one function: to securely communicate data between two places. A VPN does this by inserting itself between your computer and the ones that you want to communicate with.

All of the data leaving your machine gets encrypted and redirected to a VPN server. The VPN server decrypts the data and sends it to the computer that you originally addressed. Responses from that computer go back to the VPN server for encryption and transmission back to you.

  1. Authorization ensures that only trusted hosts can gain network access.
  2. If a computer has not logged in with the VPN gateway, the connection is denied.
  3. If a computer provides authorization credentials such as a password and pre-shared secret, the VPN gateway adds the computer to its list of computers allowed to connect.
  4. Encryption defeats interception of traffic by scrambling data.

Once authorized, a computer can use encryption to prevent digital eavesdropping by any in-between points on the Internet, including unauthorized hosts.

If you have problems installing the VPN software, contact the ITR Help Desk (itrhelp@cabrini.edu, 610.902.8366). 

Some operating systems use Java or require ActiveX components to complete the installation. If necessary, follow the on-screen instructions to add them.

It might be necessary for you to add the VPN page to your list of trusted sites, and it eliminates extra security pop-ups when you connect.