Article sections

    The University Technology Office has identified a small subset of the VPN technologies in use that pose a threat to the ASU network and its users, due to their use by malware to evade detection, secondary features which permit users outside the ASU network to use ASU devices as proxy servers, or other significant security vulnerabilities that put the ASU network at risk.

    While ASU does allow the use of most VPN technologies on the ASU network, ASU feels it is important to protect against this specific set of VPN technologies for the greater good of ASU’s user population.  For this reason, The University Technology Office has implemented protective measures to safeguard against the use of the following VPN technologies effective 10/18/2017:

     

    • droidvpn
    • firephoenix
    • forward
    • frozenway
    • gbridge
    • gtunnel
    • hola-unblocker 
    • i2p
    • icmpsh
    • ngrok
    • packetix-vpn
    • pagekite
    • rdp2tcp
    • steganos-vpn
    • tcp-over-dns
    • tor
    • vipnet-vpn
    • vpnmaster
    • vtun
    • freenet
    • hamachi
    • remobo
    • vnn

     

    A wide variety of alternative VPN technologies, which do not pose an unacceptable level of risk to ASU or its users, is still available for use on the ASU network.  This policy will not affect the use of the ASU SSLVPN in any way – its continued use is still authorized.  A list of these acceptable VPN technologies can be found on the ASU GetProtected Web site at https://getprotected.asu.edu/content/using-vpn-technologies-asu-network.