VPN Instructions


How to connect a Vista computer to the VPN service

The VPN service enables members of the University to connect to the University network from off campus.


Quick Setup

If you have a English version of Windows then you can make use of our setup tools which will configure your computer for you. Please select the appropriate tool:

Student:student tool
Staff:staff tool
Guest:guest tool


Connection Setup Instructions


Automated: Setup Tools

If you are using a English version of Windows Vista, you can use our setup program to configure your computer automatically. This program may work for other versions of Windows Vista, but it is the users responsibility if they wish to try it. If you do not have a English version of Windows Vista, or would prefer to set yourself up manually, instructions are below.

Please be aware if you have any other connections besides the wireless connections the tool will remove them. Please follow the manual instructions if you have any other connections you wish to preserve.

You can download the Setup Tool by clicking the appropriate link below:

Once you have downloaded the tool, select to run the executable. You will be prompted by Windows to Allow the program to run; click Allow. Then click the install button. After you have run the tool and set up the connections, an icon called 'uws-vpn' will appear on your Desktop.


Manual Setup Instructions

If you wish to set up the wireless connections manually the instructions can be found by following the link here.


Configure your web browser proxy settings

If you the FireFox web browser you need to manualy set the proxy settings. Users of Internet Explorer can skip this section.

Firefox:

1. Run Firefox.
2. From the Tools drop down menu select Options...
3. In the Options panel click the 'Advanced' icon.
4. Select the 'Network' tab.
5. Click the 'Settings...' button.
6. Tick the Manual Proxy Configuration button.
7. Under both HTTP Proxy and SSL Proxy type :- wwwcache.swan.ac.uk
and enter a port number of 3128 in the two corresponding port boxes.
8. Choose OK and then in the Options panel choose OK again to finish
9. Close and restart the browser.


Connecting to Swansea VPN Service

To connect to the VPN you must check the following:
1. Ensure you have a existing network connection with your local broadband or wireless provider.
2. Make sure you can access the internet.
3. Now connect the UWS-VPN connection by double clicking the UWS-VPN icon on your desktop.
4. You will be presented with a box that asks for a username and password. Enter your username and password now. Leave the domain field blank. Click Connect.
5. You should then be presented with a message saying 'Successfully connected to UWS-VPN' as seen in figure 4.


Figure 4.


6. You are now fully connected to the Wireless network. Load a broswer to access internet web pages. If you can only access internal web sites then you have not set the cache settings correctly.

Disconnecting from the Swansea VPN Service


To disconnect from the Wireless network click the windows logo, then click 'Connect To' and select the UWS-VPN icon then select 'Disconnect'.

Install security updates

Any computer connected to the University network and the Internet is a target for unauthorised users who can try to access your system. Intruders could watch all your actions on the computer, cause damage by deleting files or changing your data, or steal valuable information such as passwords or credit card numbers. Alternatively intruders may not be interested in your data and instead want control of your computer so they can use it to launch attacks to disrupt other systems. Some attacks known as worms spread automatically from one vulnerable system to another. Don't think 'an attacker would never be interested in me': an automated worm can infect and disrupt millions of computers.

There are three main ways in which an attack on your computer could be successful:

* New vulnerabilities (holes) are always being discovered in computer software. These holes can be exploited to gain access. Software vendors fix the holes by producing patches or new versions, but it is up to you to obtain and install these fixes.
* You could be enticed to run a trojan or virus. A trojan looks like something else to encourage you to click on it but its real purpose is to open up a back door on your computer. Viruses spread by infecting other legitimate computer programs. Trojans and viruses are often spread through email attachments, file-sharing and messaging, and may appear to come from someone you know who is also infected.
* Some software has settings (sometimes the default settings) that allow other users to access your computer unless you change the settings to be more secure. For example, file-sharing built-in to Windows can allow other users to view, modify or add files on your hard disk, which is an obvious risk unless turned off or configured carefully.

To ensure your computer is not vulnerable to attack you need to:

* Install software patches and new versions to fix known holes.
* Follow advice to change software settings to be more secure, or not run known insecure software at all.
* Don't run unknown files and unsolicited attachments to avoid trojans or viruses.
* Run up-to-date anti-virus software.
* Keep backup copies on disk, CD or a network server of important data.