Service description

The IT Center offers a secure and encrypted access to the RWTH network from outside. Depending on the user group there are different usage scenarios.

Operating principle

After the end-user's computer established a VPN connection (Virtual Private Network), an encrypted, so called "tunnel" between the computer and the VPN gateway is generated. All traffic towards the RWTH network (and depending on the operation mode also beyond) is routed through that tunnel. Only after the VPN gateway, the data goes its normal un-encrypted way. Logically, the users computer has been moved into the VPN gateway's network: For third parties it only appears with the IP address from RWTH Aachen University.



RWTH Störungsmeldungen
Störungsmeldungen für Dienste der RWTH Aachen


Blog stream

Create a blog post to share news and announcements with your team and company.