Jump to main content
University Computer Center
VPN
University Computer Center 

VPN Service of the University Computer Centre

VPN stands for Virtual Private Network and enables secure connections to be established via insecure networks.

The VPN Service

In principle, insecure networks enable unauthorized interception and falsification of communication relationships. To prevent this, VPNs use special protocols that encrypt the data. In principle, a tunnel is set up between your computer at home (or on the move) and a VPN server at Chemnitz University of Technology, through which all IP data is sent in encrypted form.

Illustration of a VPN tunnel

Whom is this service intended vor?

  • Users who want to securely access the Chemnitz University of Technology campus network with their computer via external Internet providers.
  • Users who want to access the campus network securely from a connection at another university or from any other Internet access (e.g. on business trips, congresses, etc.) .
  • Users who want to securely access the campus network with their computer via data sockets in public rooms of the Chemnitz University of Technology.

When the connection is established, authentication is carried out with your URZ user ID and your password. If necessary a second authentication factor is requested (see Multi Factor Authentication).

If a VPN tunnel is successfully established, the computer receives an IP address from the Chemnitz University of Technology address range. This also allows access to services that require a sender address from the university's address space.

Preconditions

  • a valid username
  • computers with functioning internet/network connection or functioning wifi connection in the wifi network

A so-called VPN client must be installed on your computer. The URZ recommends the freely available VPN client EduVPN. Alternatively, Cisco Secure Client (Anyconnect) is provided.

VPN Service „eduVPN“

eduVPN logo

eduVPN is the worldwide VPN service for students, researchers and lecturers. Basically, eduVPN realizes two central application scenarios:

  • Secure access to the TU Chemnitz campus network (Institute Access)
  • Secure access to the worldwide academic networks (Secure Internet)

Further information on eduVPN can be found on the website of the eduVPN project.

At Chemnitz University of Technology, eduVPN is currently offered as an alternative to the VPN access “Cisco AnyConnect” and is particularly recommended for the provision of VPN connections on smartphones and tablets with Android or iOS.

After a successful registration via the Chemnitz University of Technology Web-Trust-Center, access to the campus network is valid for 90 days. During this time no further password entry is necessary. Usability and convenience are therefore very high. Depending on the user authorization, different VPN profiles for different use cases are offered.

VPN Profiles

Different VPN profiles can be selected for different application scenarios.

VPN Profile Use Case Recommended for
Standard VPN Access
  • All data traffic is routed via the VPN tunnel.
  • Laptops for business use
  • Library Searches
Groupware only
  • Only the data traffic to the Web Trust Center and to Microsoft Exchange (e.g. Outlook Web Access) is routed via the VPN tunnel
  • remaining data traffic (surfing the Internet) is not transported via the VPN tunnel
  • Smartphones and tablets that only need to synchronize contacts, calendars or appointments with Microsoft Exchange

Installation

The setup and installation is very simple and is identical on all platforms and operating systems.

Step 1: Download and Installation

You must install the EduVPN app. To do this, use the corresponding download/installation links for your operating system:

If the installation does not start automatically, open the folder “Downloads” folder and execute the installation file.

Alternatively, you can access the respective installation instructions via the eduVPN download page.

Step 2: Institute Access: Chemnitz University of Technology

The second step is to select Chemnitz University of Technology as an institution.

To do this, enter the word “Chemnitz” under “Find your institute”. You will then be offered two operating modes for Chemnitz University of Technology (1. access to the institute/Institute Access and 2. secure internet/Secure Internet). Please always select the 1st mode: access to the institute/Institute Access.

Screenshot: Find your institute

Step 3: Registration at the Web-Trust-Center of Chemnitz University of Technology

A browser window will automatically open with the Chemnitz University of Technology Web Trust Center. To log in here, use your URZ account, i.e. your user ID and password.

If you have activated multi-factor authentication and are logging in from outside the campus network, a second factor (one-time password app or Yubikey) will be requested.

Screenshot: Web-Trust-Center registrtation

Step 4: Approve VPN access

After successfully logging in, you will be redirected to the “Approve application” page. You must now approve VPN access. To do this on the blue “Approve” button. You will then see the message “You can now close this browser window”.

Close the browser window and return to the app eduVPN if it does not automatically come to the foreground

Screenshot: Approve Application

Step 5: Select Profile

You can now choose between different profiles, such as “Standard VPN access” or “Groupware only”. The application recommendations for the various profiles can be found in the section VPN Profiles. By selecting the profile, you establish a VPN connection.

Screenshot: Select Profile

Step 6: Access successful!

You are now authorized to establish the VPN connection for 90 days without having to log in again. You can activate or deactivate this at any time using a simple on/off switch. You will only need to enter your user ID and URZ password again after 90 days have passed (see step 3).

Screenshot: Standard VPN Access deactivated
Screenshot: Standard VPN Access connected

VPN via Cisco Secure Client (AnyConnect)

Here you will find instructions for setting up the VPN client Cisco Secure Client (Anyconnect) on the various platforms.


Windows

The installation requires adminstration rights.

  1. Load the installation package on your computer: cisco-secure-client-win-5_1_2_42-core-vpn-predeploy-k9.msi
  2. Start the downloaded MSI file.
  3. Confirm the welcome window with „Next“. welcome message
  4. Accept the licence terms. Click „Next“. license agreement
  5. Start the installation with „Install“. installation request
  6. The installation is carried out.
  7. After the successfull installation, complete with „Finish“. request for completion
  8. As a normal user, start the client from the start menue. mobile client
  9. You'll find notes for configuration and use under: Instructions for use of Cisco Secure Client

Linux

The installation requires root rights.

Script controlled installation archive: cisco-secure-client-linux64-5.1.2.42-predeploy-k9.tar.gz

The installation is descripted using the script controlled installation archive:

  1. Load the installation package on your computer: cisco-secure-client-linux64-5.1.2.42-predeploy-k9.tar.gz
  2. Unpack the archive.
    tar xvfz cisco-secure-client-linux64-[release]-predeploy-k9.tar.gz
  3. Change to the directory vpn. Start the script vpn_install.sh.
    cd cisco-secure-client-[release]/vpn 
    ./vpn_install.sh
  4. Copy the „Root Certificate ISRG Root X1“ to the ca-directory.
    cp isrgrootx1.pem /opt/.cisco/certificates/ca
  5. As a normal user, start the client on the command line:
    /opt/cisco/secureclient/bin/vpnui
    or via the graphical user interface: Call menue for the VPN client
  6. Notes on configuration and use you'll find under: Instructions for use of Cisco Secure Client

macOS

  1. Please read this instuction until the end. It is important to choose the option during the installation!
  2. Load the current installation package on your computer: cisco-secure-client-macos-5.1.2.42-predeploy-k9.dmg
  3. Start the installation by double clicking the VPN icon. start the installation
  4. Follow the first step of the installation instruction and read and accept the licece after that. If you only have one drive in your Mac, the "Select target volume" point is automatically skipped. licence acceptance
  5. It is important to remove all tick marks in front of all packages, except “VPN”. These software modules are not necessary for a successful connection and can even be disruptive. deselect packages
  6. In addition, the installation instructions will inform you about the required storage space and provide a summary. summary
  7. Once the installation is complete, AnyConnect will open a large window labelled “Attention”. In this window, you are urgently requested to make settings in the “Security & Privacy” menu. Do not make these settings. With a few exceptions, you will not need the installed function “Cisco AnyConnect Socket Filter”. On the contrary, previous experience has shown that if you agree to install the “Cisco AnyConnect Socket Filter”, your Mac may become slow due to high processor load and consequently battery life will decrease!

    Just close this window!

    Cisco AnyConnect Socket Filter
  8. You can now start the Cisco AnnyConnect Client. After start, you have the possibility to enter the VPN server of the university: “vpngate.hrz.tu-chemnitz.de” server name
  9. After entering the correct server name, you can click on “Connect”. Cisco AnyConnect will ask you for your TUC-username and TUC-password. login

    The error occurs in macOS due an API change made by Apple. Cisco Secure Client needs uses this new API since version 5.1 and therefore needs new authorisations.

    conection error in version 5.1 of Cisco Secure Client

    To remove this error, you must allow background services for Cisco Secure Client.

    Open the system settings and go to „General“.

    On the right-hand side open the submenue „Login Objects“.

    In „Allow in background“ allow the „Cisco Secure Client – AnyConnect VPN Service“ by moving the slider to the right.

    Allow macOS background connection for Cisco Secure Client version 5.1
  10. Once you have entered your login details and everything has gone smoothly, you will be welcomed by our welcome message. Login

iPhone/iPad

A version of Cisco Secure Client for iPhone/iPad is available in the iTunes Store. There, search for Cisco Secure Client and install the program. Start the program and select Add new VPN Connection. Use vpngate.hrz.tu-chemnitz.de for the server address.


Android

A Version of Cisco Secure Client for Android is available in the Google Playstore. There, search for Cisco Secure Client and install the progra,. Start the program and select Add new VPN connection. Use vpngate.hrz.tu-chemnitz.de for the server address.


Instructions for use of Cisco Secure Client

The initial configuration and instructions for use are explained using the Cisco Secure Client under Windows as an example. These also apply to the clients on the other operating systems.

  1. At the first start of the client, enter the address vpngate.hrz.tu-chemnitz.de into the start window and click on „Connect“.
    enter address
  2. In the field „Username:“ enter your username. The correspronding password is entered in the „Password:“ field. By clicking „OK“ you are establishing a VPN connection.
    enter user data
  3. If you have registered a second factor (Multi-Factor Authentication), this will be queried. By clicking „Continue“ you're establising the VPN connection.
    entering the second factor
  4. After the successful connection, the Cisco Secure Client window is minimised and can be found under the Cisco symbol in the taskbar.
  5. The connection is terminated by „Disconnect“ in the Cisco Secure Client start window.

Frequenty Asked Questions(FAQ)

No. For security reasons, after starting the VPN client, all traffic is routed via the VPN tunnel and thus via the Chemnitz University of Technology campus network. The computer is logically part of the campus network. This means that all usage and security regulations of the URZ also apply.

Access to the following private address spaces is possible parallel to the VPN connection:

  • 192.168.0.0/16

If these address spaces are used in the local network, access to local network resources (e.g. printers) is possible.

When using Cisco Secure Client, make sure that access to the LAN is permitted in the settings.

Permit LAN Access

90 minutes when using the Cisco Secure Client

A maximum connection time of 72 hours currently applies to all Cisco Secure Client connections.

In principle, yes. However, the following should be noted. A new IP address is assigned to your computer when the VPN connection is established. This changes the identity of your computer to the AFS server. There have already been examples where this has led to AFS problems on the user side. Therefore, the following advice on how to proceed:

  • Terminate the AFS client before establishing the VPN connection.
  • Start the VPN connection.
  • Starten AFS client again.

The same applies to terminating the VPN connection. Make sure that the AFS client is terminated before the connection is terminated.

The URZ only offers support for the Cisco Secure Client and eduVPN. The use of alternative VPN clients is possible. Please note the following specifications:

  • Installation and configuration of the VPN software is done exclusively by the user.
  • The establishment of a VPN tunnel from the Internet to Chemnitz University of Technology is intended for connecting individual workstations. Routing functionality is only permitted for access to an existing local network. For the local newtork addresses from the private 192.168.0.0/16 have to be used.
  • The functionality of the VPN connection using alternative VPN software cannot be guaranteed by the URZ.

If the VPN connection establishment works under Windows, but no data is transferred via the connection, there may be various causes:

  1. A network bridge has been installed on the computer. A network bridge is used to use other connections such as Firewire (IEEE 1394) as a LAN connection. To solve the problem, delete the network bridge.
  2. Defective firmware of the wireless network card: Try to load a driver update from the manufacturer's website (or from the manufacturer of the chip set). For the following wireless network cards problems are known:
    • Intel PRO/Wireless 2200BG
  3. Additionally installed software may have influence on the network access. To solve the problem, please delete this software. Problems in connection with the following products have been reported:
    • NetBalancer
    • Connectify

By default, for secure connections (https) the IE7 checks for blocked server certificates. In doing so, it tries to establish connections to servers in the Internet. Such connections are not permitted before an authentication via VPN client. Therefore, it takes some time until this unsuccessful search is completed (several minutes). Hence, this creates the impression that the network connection does not work. To avoid this behavior, you can deactivate the option “Check for revoked server certificates”

To be found under:

ExtrasInternet Options → Tab ExtendedSecurity

After the installation of the VPN client, you can reactivate the option.

Possible reason: At one or more network interfaces, “Internet Connection Sharing” is activated.

Solution: Deactivate sharing the Internet connection.

In Windows OS, the data protection settings should be set to "medium high".

It is possible, that the file /etc/resolv.conf has been changed by the connection setup. If the system does not reset this file after the VPN connection is terminated, the name resolution and thus apparently the Internet access no longer works. The command

sudo dpkg-reconfigure resolvconf

may solve this problem.

Make sure that under „Cisco Secure Client settings” → „Preferences“ the option

  • Allow local(LAN) access when using VPN (if configured)

is selected.

If there are still problems with local printing, you must configure your printer statically using the printer IP address. To do this, determine the IP address of your printer. This is often assigned automatically by your internet router. For example, if you are using a Fritzbox, you can find this under Home Network → Home Network Overview → Network Connections

Make sure that the internet router always assigns the same IP address to the printer. In the Fritzbox, select the printer entry and set the option “Always assign the same IPv4 address to this network device”. You can now use this IP address to set up your printer statically under Windows (configuration example Windows 10)

  • Windows Settings → Devices → Printer & Scanner
  • Add Printer or Scanner → Select “The printer is not listed”
  • In the window “Search printer by other options” select “Add Priter by TCP/IP address or hostname” → Next
  • In the window “Enter a printer hostname or IP address” enter the IP address → Next
  • The printer is set up and can now be used also when the VPN connection is established.

Openconnect does not connect with current Cisco server versions anymore (openconnect bug).

As a workaround you can set the following openconnect option: --useragent=“AnyConnect“

The error occurs after a glibc update.

As a workaround the following change can be made:

Anyconnect up to 4.10.*: Become root and edit /opt/cisco/anyconnect/AnyConnectLocalPolicy.xml

Cisco Secure Client 5.*: Become root and edit /opt/cisco/secureclient/AnyConnectLocalPolicy.xml

Change the line with ExcludeFirefoxNSSCertStore from false to true

The error occurs due an API change by Apple in Mac OS, Cisco Secure Client uses this API from version 5.1 on and therefore needs new authorizations.

connection error message in version 5.1 of Cisco Secure Client

To eliminate this error, the background services for Cisco Secure Client must be allowed.

Open the system settings and navigate to “General”.

Open the “Login objects” submenu on the right-hand side.

In the “Allow in background” area, allow the “Cisco Secure Client - AnyConnect VPN Service” by activating the slider to the right.

allow Mac OS background connections for Cisco Secure Client version 5.1