VPNs typically require remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties. VPNs may serve any network functionality that is found on any network, such as sharing of data and access to network resources, printers, databases, websites, etc.
TrueYou Two-Factor Authentication
Prior to connecting to NU VPN, enroll in TrueYou Two-Factor Authentication (2FA). 2FA is a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.
To register with TrueYou Two-Factor Authentication visit the Two-Factor support page for videos and additional help topics.
Free for faculty, staff, and students in the University of Nebraska system.
GlobalProtect is installed as part of the baseline software configuration for all University of Nebraska procured, managed devices. If you are using an NU managed device which does not have GlobalProtect installed, please utilize the “Self-Service” app on MacOS or “Software Center” on Windows or contact your campus help center or DIT support staff.
A VPN user typically experiences the central network in a manner that is identical to being connected directly to the central network. VPN technology via the public Internet has replaced the need to requisition and maintain expensive dedicated leased-line telecommunication circuits once typical in wide-area network installations.
NU Information Technology Services currently supports Palo Alto's GlobalProtect VPN. It is a VPN client that works on a wide variety of operating systems and hardware configurations. The Palo Alto GlobalProtect VPN client and service will work under current NU-supported Mac and Windows versions. Some selected Linux versions, as well as Android and iOS devices, also work with the VPN.
Data Usage and Privacy
The GlobalProtect client reports basic inventory data to perform posture assessments for elevated network access. The data collected is limited to:
- Device information, including operating system, MAC address, and serial number.
- Device security settings, including disk encryption, firewall, and auto-update preferences.
- Cortex XDR Application installation and version.