IT provides protection from hacker attacks. This requires balancing computer and network access for faculty, staff and students with securing sensitive data such as student information, personnel materials, financial records, and medical information. UW’s network firewalls help limit these hacker attacks coming over the Internet by requiring valid usernames and passwords from our users accessing our network from off campus. This access to the UW computers is called VPN or Virtual Private Network. There are different types of VPN connections and each one gives a different level of access. Below is an overview, followed by more detailed information on each connection type.
WyoSecure is used as part of all remote access connections. Two Factor Authentication and Network Connect allow access to areas that cannot be accessed with WyoSecure alone. WyoSecure will allow access to self-service and non-public websites. It requires a valid UW username and password to login. Some of these areas may require a higher level of security in the future.
Through WyoSecure (https://wyosecure.uwyo.edu) a user can create a VPN connection without installing any additional programs on your computer. Since no additional program is needed, WyoSecure can be used on any device equipped with Internet access, including smartphones, public computers, or tablet computers. There is also a feature to allow users to create bookmarks to automatically connect to internal UW websites and UW file storage. Only certain browsers are supported (http://www.uwyo.edu/infotech/services/network/vpn/sslvpncompat.asp).
UW usernames and passwords can, and often are, compromised (hacked).
Users who access HRM, PeopleSoft, or UW financial information remotely need two-factor authentication for that access to be secure.
Similar to your online bank accounts, UW users who need to access certain UW computers from off campus are now requested to use two methods to verify their identity. This is called two-factor authentication, since the identity of the user is verified in two ways: 1) their username and password and 2) their identity through a, simple, easy to use application on their cell phone. While hackers half a world away may be able to steal or hack a username and password, they cannot get access to a phone in the user’s possession. Users will need to log into the two factor authentication site (https://wyosecure.uwyo.edu/2f) to use two factor authentication.
For users who do not have a smartphone, authentication can also be created by entering a passcode that is sent to any phone, through a phone call, or by a key fob (there is a one-time $20 fee to pay for the key fob).
Signing up for two-factor authentication takes just the few quick steps listed out in How To Use Your Two-Factor Authentication Account (http://www.uwyo.edu/askit/displaydoc.asp?id=3302).
Network connect is needed for downloading software from the UW network or connecting to a UW storage location. It requires a small program to be installed on the user’s computer and then allows the remote computer to connect directly to and use resources on the UW network. Since this connection allows access to the UW network, it is important to make sure the remote computer does not have viruses that could be spread to the UW network. Remote computers connecting with Network Connect are automatically checked for an active firewall, up to date patches and antivirus.
To install Network Connect, log into WyoSecure (https://wyosecure.uwyo.edu) and click the Start button next to the Network Connect client application session. This will install the program, which can then be launched by opening the Network Connect application listed under Juniper Networks.
WyoSecure will timeout after 2 hours of inactivity or 12 hours of login time. The remaining session time will appear in the toolbar after logging in.
If you are using a Windows operating system, click on the Add terminal service icon in the Terminal Session toolbar.
In the Add Terminal Services Session window use the following configuration:
This bookmark will be available whenever you sign into WyoSecure using Core Access.
Yes. You must open the Web site share using WyoSecure VPN to upload content from off-campus.
Type the path of the file share in the format \\servername\sharename into the browse field and click the Browse button. For example, type \\warehouse\antivirus into the browse field to open the antivirus share on the warehouse server.
As long as you do not “sign out” prior to closing the page, all resources you have accessed through WyoSecure will remain available. However, it is recommended that you do not close this page until you are finished, then please click on the “Sign Out” button.
Yes. Administration of DMZ machines must be performed from the campus network.
You can only have one WyoSecure session per username open at any given time.
IT provides temporary VPN guest accounts at no charge. The guest account can be used for up to 6 months for vendor support and access to computers that are on the UW network. If the vendor agreement and support requires ongoing access for continued maintenance of UW equipment, departments can request and pay for a full special account. To request a guest or full special account, please contact the IT Help Desk at 766-4357, option 1 or email firstname.lastname@example.org.
Reviewed: 0413 By: JM
Additional help with the installation and configuration of
UW-supported software is available:
Contact your IT user consultant
Contact the IT Help Desk at 766-HELP (4357), option 1
Contact the IT Help Desk at 766-HELP (4357), option 1
Come to the student computer lab in the lobby of the
Information Technology Center.
Chat with a UW IT Representative
Chat with a UW IT Representative:
IT Help Hours:
Monday – Friday, 8:00am – 5:00pm
Closed Sat and Sun