VPN (Virtual Private Network) – FASRC DOCS https://docs.rc.fas.harvard.edu Thu, 05 Dec 2024 15:33:05 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.1 https://docs.rc.fas.harvard.edu/wp-content/uploads/2018/08/fasrc_64x64.png VPN (Virtual Private Network) – FASRC DOCS https://docs.rc.fas.harvard.edu 32 32 172380571 T-Mobile Home Internet VPN Issues https://docs.rc.fas.harvard.edu/kb/t-mobile-home-internet-vpn-issues/ Thu, 25 Jan 2024 21:41:03 +0000 https://docs.rc.fas.harvard.edu/?post_type=epkb_post_type_1&p=26755 Users of T-Mobile’s 5G home broadband Internet plan have issues connecting to and staying connected to VPNs. This is not an issue with Harvard’s VPNs or with Cisco AnyConnect, but with the T-Mobile Home Internet service. Unfortunately, FASRC cannot help you resolve this issue as it lies with T-Mobile’s service.

According to posts found on the Internet, T-Mobile is aware of this and has responded to customers that:

The issue is that while 5G can provide broadband level speeds and bandwidth wireless solutions, such as 5G, have a higher tolerance [NOTE: they mean ‘higher incidence’] for “packet loss.”  Packet loss is when individual pieces of data are dropped/lost during transmission.  For most applications this is a minimal issue that 5G speeds may render unnoticeable, but a live connection, such as the AnyConnect VPN or Voice Over IP phone services, will experience connection degradation or be completely disconnected forcing you to reconnect.

This is not an issue MTS can mitigate.  For this reason the only recommended Internet service types are fully wired based connections including DSL, Broadband, Cable, and Fiber Optic services.

This information is current as of the time of this posting: Jan 25, 2024

]]>
26755
Updating VPN Client https://docs.rc.fas.harvard.edu/kb/vpn-client-update/ Thu, 28 May 2020 15:10:07 +0000 https://docs.rc.fas.harvard.edu/?post_type=epkb_post_type_1&p=23538 The Cisco AnyConnect VPN client used for the FASRC VPN is the same one used university-wide. If you VPN client is out of date or stops working due to an OS update (for example, MacOS X Catalina), there are three methods for updating:

If none of the above works for you, please see the HUIT VPN Help Page

]]>
23538
VPN Proxy Settings instructions https://docs.rc.fas.harvard.edu/kb/vpn-proxy/ Thu, 01 Jun 2017 15:17:01 +0000 https://www.rc.fas.harvard.edu/?page_id=16430 CEPRProxySettings ]]> 16430 Manual OpenAuth Token Setup (advanced) https://docs.rc.fas.harvard.edu/kb/manual-openauth/ Thu, 08 Oct 2015 18:24:33 +0000 https://rc.fas.harvard.edu/?page_id=14093 NOTE: These Are Advanced Instructions.
The instructions here do not generally apply to most users. See the OpenAuth page for normal setup. Please do not use the manual setup unless you truly need to or are sure this is what you desire.


If you prefer not to install our pre-configured client or you have a class account not tied to your email address, you can set up your OpenAuth token manually. This will require an OpenAuth token code which is either gained from:

  1. Your TA or instructor if you have been given a class account that is not tied to your email address.
  2. Logging into the OA page with your RC username and password, receiving an email with a link to the OA, and copying the code shown at the bottom of that page.

Download the non-configured client for your OS (Mac, Windows, Linux) here

Jauth on Github (Harvard Informatics)

Remember, you have to enter your secret token manually during installation when prompted for the Authentication Secret String. There is no token code embedded in these clients.

Troubleshooting

OSX Error Message
With the gui installer, Mac OSX 10.8 and above users may receive one of two error messages. In those cases you will need to open the app differently the first time you run it:

  • “JAuth OpenAuth Desktop Client Installer” is damaged and can’t be opened. You should eject the disk image.”
    • Got to System Preferences and click Security & Privacy
    • If “Allow apps to be downloaded from” is grayed out, click the lock at bottom to unlock this pane.
    • Note what it’s currently set to and then change the option to ‘Anywhere’ and confirm the change when prompted.
    • Run the installer now (and click Open or OK when dialogue pops up).
    • Once complete, go back to the Security & Privacy pane and change the setting back to its previous setting.
]]>
14093
OpenAuth Troubleshooting https://docs.rc.fas.harvard.edu/kb/troubleshooting/ Mon, 21 Apr 2014 14:51:33 +0000 https://rcwebsite2.rc.fas.harvard.edu/?page_id=10975
  • OpenAuth setup and revoking token
    If you have a new computer or phone and need to re-download the OpenAuth java applet or re-add your token to Google Authenticator/Duo Mobile, the steps are the same.See the OpenAuth Setup page to re-request your token download/QR code.
  • Synchronizing Clocks
  • New phone/computer? Re-downloading or re-adding your token on a new device.
  • Manual Token Setup (Advanced, Not Recomended)
  •  

    OSX Error Message
    With the gui installer, Mac OSX 10.8 and above users may receive one of two error messages. In those cases you will need to open the app differently the first time you run it:

    • “JAuth OpenAuth Desktop Client Installer” is damaged and can’t be opened. You should eject the disk image.”
      • Got to System Preferences and click Security & Privacy
      • If “Allow apps to be downloaded from” is grayed out, click the lock at bottom to unlock this pane.
      • Note what it’s currently set to and then change the option to ‘Anywhere’ and confirm the change when prompted.
      • Run the installer now (and click Open or OK when dialogue pops up).
      • Once complete, go back to the Security & Privacy pane and change the setting back to its previous setting.
    ]]>
    10975
    VPN Setup https://docs.rc.fas.harvard.edu/kb/vpn-setup/ Wed, 02 Apr 2014 11:42:58 +0000 https://rcwebsite2.rc.fas.harvard.edu/?page_id=10715  

    Preface

    Many of the resources available through the FASRC cluster must be accessed through VPN (virtual private network – a sort of tunnel into the Harvard network) to protect sensitive data and prevent unauthorized access. When working outside the Harvard network, a VPN connection is generally necessary. This page describes the process for installing software and connecting to the RC VPN.

    If you are just SSH’ing in to our login nodes, VPN is not required. But it is needed for many other services. Some (but not all) examples are:

    Requirements

    VPN Software Installation

    IMPORTANT NOTE: You need to add a VPN realm, typically @fasrc, after your username in order to login to the FASRC VPN. The FASRC VPN (the client or web page) is the only place you do this. You will not use the username@fasrc format for login anywhere else but the FASRC VPN.
    See example below.

    Install

    The Cisco AnyConnect client can be installed from our VPN portal: https://vpn.rc.fas.harvard.edu
    NOTE: If you already have a current Cisco AnyConnect client installed for Harvard VPN access, you do not need to install it again. Skip to ‘Logging In’

    If the automatic installation fails, you should then be offered an option to download an installer. After downloading the software, click on the executable to run the AnyConnect installation wizard.

    If you are unable to install the client from this page, we recommend following instructions here: Connecting to Harvard VPN tunnels – IT Help

    Logging in

    Start Cisco AnyConnect and enter the FASRC VPN server name: vpn.rc.fas.harvard.edu

    Cisco AnyConnect prompt for server name: vpn.rc.fas.harvard.edu

    Enter your credentials and click OK to connect:

    • USERNAME: When connecting to the VPN you will use your username + @ + VPN realm name. For most people, this will be @fasrc (example: jharvard@fasrc ). If you are in the NCF or another FASSE group, this will be @fasse or a realm provided to you by your PI/lab group.
    • PASSWORD: The password you will enter is your FASRC account password as noted above
    • TWO-STEP VERIFICATION CODE: You enter your OpenAuth token code here

    Box showing prompts for Username, password, and two-factor code

    Once connected, you will have normal Internet and Harvard network access as well as access into the FASRC environment.

     

    ]]>
    10715
    Connecting to the FAS RC VPN from Linux clients https://docs.rc.fas.harvard.edu/kb/linux-vpn/ Fri, 07 Sep 2012 14:01:00 +0000 http://rc.fas.harvard.edu/?page_id=7312 We recommend using openconnect to connect to the Research Computing VPN from Linux.

    First, install OpenConnect on Ubuntu/Debian or Fedora/CentOS, respectively:

    • Ubuntu/Debian: sudo apt-get install network-manager-openconnect-gnome
    • Fedora/CentOS: sudo yum install NetworkManager-openconnect

     

    Option 1: The NetworkManager GUI

    • NOTE: If you prefer to connect using the command line, see “Using OpenConnect from command line” at the bottom of this page after installing OpenConnect.

    Under your network settings, add a VPN connection and specify vpn.rc.fas.harvard.edu as your gateway:

    Turn on your VPN connection to bring up the connect dialog:

    In the “Username” field, be sure to append “@fasrc” (the VPN realm).
    Enter your password and 6 digit verification code:

    You should now be connected to the RC VPN.

    Option 2: CLI and Build from Source

    If you don’t use NetworkManager, need a different version of the software, or otherwise don’t have success with the above, you can try building oath-toolkit and openconnect from source and using them from the command line. The following scriptlets build each under its own prefix in /opt/src and install each under its own prefix in /opt; adjust accordingly if you want to use other locations.

    Build oath-toolkit

    You will need the distro version of xmlsec, xmlcatalog, etc. On Ubuntu, make sure you have installed (at least) xmlsec1, libxmlsec1, libxmlsec1-dev, and libxml2-utils.
    The installation is a very straighforward GNU-toolchain-style build; the following just embellishes it with some automation. Version 2.4.1 is the latest at the time of writing; newer may work better.
    SW=/opt
    SRC=$SW/src
    cd $SRC
    umask 022
    wget --no-clobber http://download.savannah.gnu.org/releases/oath-toolkit/oath-toolkit-2.4.1.tar.gz
    tar xvf $(basename $) APP=$(basename $ .tar.gz)
    cd $APP
    ./configure --prefix=$SW/$APP
    make
    sudo make install

    Create /opt/oath-toolkit-2.4.1/setup.sh with the following content:

    export PATH=”/home/opt/oath-toolkit-2.4.1/bin:$PATH” export CPATH=”/home/opt/oath-toolkit-2.4.1/include:$CPATH” export LD_LIBRARY_PATH=”/home/opt/oath-toolkit-2.4.1/lib:$LD_LIBRARY_PATH” export LIBRARY_PATH=”/home/opt/oath-toolkit-2.4.1/lib:$LIBRARY_PATH” export MANPATH=”/home/opt/oath-toolkit-2.4.1/share/man:$MANPATH” export PKG_CONFIG_PATH=”/home/opt/oath-toolkit-2.4.1/lib/pkgconfig:$PKG_CONFIG_PATH”

    Build openconnect

    On Ubuntu, make sure you have installed (at least) vpnc and gettext.
    The installation is a very straighforward GNU-toolchain-style build; the following just embellishes it with some automation. Note that we found that version 5.99 does not compile easily on Unbutu 14.04. Version 5.03 is the next-to-latest at the time of writing.
    source /opt/oath-toolkit-2.4.1/setup.sh
    SW=/opt
    SRC=$SW/src
    cd $SRC
    umask 022
    wget --no-clobber ftp://ftp.infradead.org/pub/openconnect/openconnect-5.03.tar.gz
    tar xvf $(basename $)
    APP=$(basename $ .tar.gz)
    cd $APP
    ./configure --prefix=$SW/$APP --with-vpnc-script=/etc/vpnc/vpnc-script
    make
    sudo make install

    Create /opt/openconnect-5.03 with the following content:

    export CPATH=”/home/opt/openconnect-5.03/include:$CPATH” export FPATH=”/home/opt/openconnect-5.03/include:$FPATH” export LD_LIBRARY_PATH=”/home/opt/openconnect-5.03/lib:$LD_LIBRARY_PATH” export LIBRARY_PATH=”/home/opt/openconnect-5.03/lib:$LIBRARY_PATH” export MANPATH=”/home/opt/openconnect-5.03/share/man:$MANPATH” export PKG_CONFIG_PATH=”/home/opt/openconnect-5.03/lib/pkgconfig:$PKG_CONFIG_PATH” export PATH=”/home/opt/openconnect-5.03/sbin:$PATH”
    ### Using OpenConnect from command line

    After installing OpenConnect, you can connect to the VPN via the command line using:
    sudo openconnect -s /usr/share/vpnc-scripts/vpnc-script vpn.rc.fas.harvard.edu Then provide:

    [sudo] password for xxxxx: <password for your computer> Username: <rcusername>@fasrc Password: <rcpassword> Password: <six-digit authorization token>

    Using OpenConnect from command line with auto token generation

    Put your openauth (the 15-character alphanumeric string shown on your personalized OpenAuth download page) secret in a file such as ~/.s and make sure only you can read it (e.g. chmod 600 ~/.s). Run the following, replacing USERNAME appropriately:

    source /opt/oath-toolkit-2.4.1/setup.sh
    source /opt/openconnect-5.03/setup.sh
    openconnect --user USERNAME@fasrc --token-mode=totp --token-secret=base32:$(cat ~/.s) --background vpn.rc.fas.harvard.edu

    • NOTE: If you get a Permission Denied error, you need to use sudo: sudo openconnect –user USERNAME@fasrc –token-mode=totp –token-secret=base32:$(cat ~/.s) –background vpn.rc.fas.harvard.edu You will then need to type your computer password (not your RC password) at the [sudo] password for xxxxxx: prompt.

    You should then see the connection being negotiated and will be prompted for your RC password:

     
    (answer yes if you receive a certificate warning)
    Connected to HTTPS on vpn.rc.fas.harvard.edu
    Please enter your username and password.
    Password: [enter your RC password]
    Generating OATH TOTP token code
    Got CONNECT response: HTTP/1.1 200 OK CSTP connected.
    DPD 30, Keepalive 30 Connected
    tun0 as 10.255.12.49, using SSL Established DTLS connection (using OpenSSL)

    After that you should be connected to the VPN. Leave the window open. You can terminate the session at any time by going back to the window and pressing Ctrl+C

    ]]>
    7312
    OpenAuth https://docs.rc.fas.harvard.edu/kb/openauth/ Thu, 19 Apr 2012 09:21:23 +0000 http://rc.fas.harvard.edu/?page_id=6987 Most Research Computing services, such as the FASRC high performance computing cluster or VPN, are protected by two-factor authentication — access requires providing a normal password and a time-dependent “verification code.” We use a package, built on open standards, that we call OpenAuth to provide the two-factor authentication.

    REQUESTING YOUR TOKEN

    Please visit the following link, using your RC account username and password, to setup your account to work with OpenAuth: https://two-factor.rc.fas.harvard.edu

    Note: Clicking this link will cause an email to be sent to you. That email will contain a link to the OpenAuth install page with instructions, download links and your personalized token. The download link is valid for 24 hours.

    • This site will prompt you for your Harvard FAS Research Computing username and password. If you don’t yet have an account, you can request one here.
    • Since the site uses email verification to authenticate you, you must also have a valid email address on record with us.
    • All OpenAuth tokens are software-based, and you will choose whether to
      – use a smart phone app (the page will display a QR code for use in Google Authenticator [Android or iOS] or to allow display of the code in Duo Mobile [in addition to your Harvard Key code – these are two separate tokens])
      – or use 1Password on your phone or desktop to generate your verification codes. HUIT provides 1Password to members of Harvard.
      – or the java desktop app to generate your verification codes. (a Java runtime is required for the desktop app to function – Java install help page). For most operating systems you will simply double-click the Jauth.jar file to start the java applet. There are also scripts for Windows (,bat) and Linux (.sh) if needed.

    Once you complete the quick steps in the above site, you’ll be all set to use OpenAuth. You may also revisit that site in order to setup your token on an additional device (you’ll still be able to use your original device, too).

    Having Trouble after setting up your token?

    NOTE: If you need to set up on a new phone or computer, you do not need to revoke your token. Just re-do the steps at the top of this page for Requesting Your Token. You only need to revoke a token if your device is lost or stolen or you token stops working.

    REVOKING/RESETTING Please keep in mind that you can revoke your token if you ever lose the device with your token or otherwise insecurely handle your token and need to start over with a new one. This is also useful if your token has time drift or otherwise stops working.
    To revoke your token visit two-factor.rc.fas.harvard.edu/oa/revoke

    After revoking the token, remove your token from any existing device: If using the java applet, delete that folder from your computer. If using a phone app, remove that token entry from the app. You will then need to re-do the process at the top of the page to install a new token.

    TROUBLESHOOTING For additional OpenAuth troubleshooting, including time synchronization, please see here.

    ]]>
    6987