Virtual Private Network
For Off-Campus Access
The Global Protect VPN client may be used to create a virtual private network (VPN) connection between your computer or mobile device and the Cabrini network.
This VPN connection provides secure access for faculty and staff to restricted computing resources, such as file servers, restricted web pages, and applications available on the Cabrini network.
ITR only supports Global Protect client software for Windows and Mac OS.
VPN & Networked Drives Guide (How to connect)
When connecting to the Global Protect website or application please use your Cabrini Domain credentials.
- How to install Global Protect VPN
- Mapping Network Locations (PC/Windows)
- Mapping Network Locations (Apple/macOS)
Portal/IP Address: 188.8.131.52
Security via VPN
Off-network, we can access resources via Internet Service Providers, which increases the risk that private data might be intercepted by others. Making resources available off-campus also makes them more accessible to viruses, worms, and other internet-borne threats like hacking and denial of service (DoS) attacks. Using a VPN provides a safe way for you to access these resources remotely.
VPNs have one function: to securely communicate data between two places. A VPN does this by inserting itself between your computer and the ones that you want to communicate with.
All of the data leaving your machine gets encrypted and redirected to a VPN server. The VPN server decrypts the data and sends it to the computer that you originally addressed. Responses from that computer go back to the VPN server for encryption and transmission back to you.
- Authorization ensures that only trusted hosts can gain network access.
- If a computer has not logged in with the VPN gateway, the connection is denied.
- If a computer provides authorization credentials such as a password and pre-shared secret, the VPN gateway adds the computer to its list of computers allowed to connect.
- Encryption defeats interception of traffic by scrambling data.
Once authorized, a computer can use encryption to prevent digital eavesdropping by any in-between points on the Internet, including unauthorized hosts.
If you have problems installing the VPN software, contact the ITR Help Desk (email@example.com, 610.902.8366).
Some operating systems use Java or require ActiveX components to complete the installation. If necessary, follow the on-screen instructions to add them.
It might be necessary for you to add the VPN page to your list of trusted sites, and it eliminates extra security pop-ups when you connect.