Description
The DCVPN provides a secure, encrypted connection that protects your network traffic from unauthorized access while working remotely. By creating a private tunnel to the university’s data center, it ensures that only approved data center resources are accessible, keeping your work both safe and efficient.
Access
Accessing the VPN varies across each operating system. Step-by-step instructions are below.
Installment instructions for DCVPN:
-
Windows 10 and 11
-
Mac OS
-
Android & ChromeOS
-
iOS
Please note: A valid OHIO log-in is required to access VPN instructions.
Who can access
How to request access
-
Access is enabled by submitting a service request to network engineering. Access requirements will be evaluated against the current capabilities of the VDI environment.
-
If VPN is required, Network Engineering will arrange a call to discuss specific access needs that will be used to develop an access policy for your use case.
-
People who need DCVPN access should Request Assistance via the VPN Services Catalog page.
DCVPN Features
-
Uses Cisco AnyConnect VPN client for Windows, Mac OS, Linux OS, iOS, Android, and Chrome OS
-
Supports many basic, secure services
-
When enabled, all network traffic from that device is tunneled through the VPN
-
Maximum session length: 12 hours
Additional resources
Service support
Get help
- Visit the Technology Help Center (help.ohio.edu) to get live support, view outages, and browse trainings.
Accessibility
Ohio University strives to make its digital resources and services accessible to all visitors, including those with disabilities who may also be using assistive technology. If special steps are necessary in order to improve the accessibility of experiences for end users, those steps must be taken.
If you experience a barrier that affects your ability to access OHIO websites, videos, online forums, documents, or other information technology, please let us know.
For further information about OHIO's digital accessibility resources, see:
Security
The Ohio University Information Security Office strives to educate and empower the University community to appropriately manage risks and protect OHIO’s information and systems. This effort is facilitated through policies, standards, information security risk management, as well as other tools and guidance provided to the University community. This modern approach creates a safe computing environment, enabling the university community to teach, learn, and conduct research.
For additional information about OHIO’s security resources, see: