|Category||Information & Communications Technology|
|Approved by||Vice-Chancellor August 2009|
|Date Procedure Took Effect||27 August 2009|
|Last approved revision||30 June 2011|
|Sponsor||Director Information Technology Services|
|Responsible officer||Manager Information Security|
This procedure must be followed to ensure the integrity of the University’s network and to protect all users of University systems.
Systems for connecting remote users to a network often provide the user with many of the same privileges as those connected directly to the network. This requires that the remote computer must adhere to University of Otago Information Technology Policies, Procedures and Guidelines, and be managed in a way that is compatible with standards maintained by other networked computers.
This Procedure applies University-wide.
- Information Technology Services
- Virtual Private Network
1. VPN Service
Remote access to the University network should normally be made through the University VPN service. This service is available to authorised users.
The VPN service is considered an extension of the University Network. As such, systems being used from off-campus locations to connect to the VPN service shall be considered part of the University Network. University of Otago Computer Regulations and Policies shall therefore apply.
2. Use of VPN Service
Use of the VPN service should only occur from trusted computer systems. This excludes Internet cafes and other such public access computers.
- The University VPN service is managed and operated by ITS as part of the overall University network infrastructure.
- Access to the University VPN service shall be via authenticated login utilising the University Authentication System.
- Access shall only be granted for approved users.
- Users of the University VPN service are bound by University Computer Regulation and Policies. These include, but are not limited to the policies listed as related policies in the following section.
- VPN users must not allow other users to access University devices or systems with their account, nor allow other users to route traffic through their VPN connection.
Related policies, procedures and forms
- Information and Communications Technology Regulations 2014
- Email Server Policy
- Internet Usage Policy
- Server Registration Policy
- Software Licence Compliance Policy
- Anti-virus Procedure
- Internet Domain Names Procedure
- Server Administration Procedure
- Software Security Updates (Patching) Procedure
- University Network Interconnection Procedure