Service description


The IT Center offers a secure and encrypted access to the RWTH network from outside. Depending on the user group there are different usage scenarios.

Operating principle

After the end-user's computer established a VPN connection (Virtual Private Network), an encrypted, so called "tunnel" between the computer and the VPN server is generated. All traffic towards the RWTH network (and depending on the operation mode also beyond) is routed through that tunnel. Only after the VPN server, the data goes its normal un-encrypted way. Logically, the users computer has been moved into the VPN server's network: For third parties it only appears with the IP address from RWTH Aachen University.

 

Störungsmeldungen


RWTH Störungsmeldungen
Störungsmeldungen für Dienste der RWTH Aachen

News


Blog stream

Create a blog post to share news and announcements with your team and company.