To accommodate the increased need for remote access to the campus network, we now have multiple VPN servers for different purposes, and we are continuing to order and deploy more hardware.  Meanwhile, to help us make the best use of the resources we have, please choose your connection to the campus carefully.

For many, there is no need to use the VPN at all: Canvas, Zoom, and email (Gmail or Office 365) don’t require the VPN.  But here are some guidelines regarding use of the VPN:


  • If you use subscriptions licensed by the UCI Libraries, please use with Group UCIFull.  You can also use the WebVPN: go to and choose WebVPN as the GROUP.


In addition to the library, mentioned above,

  • If you are using Research Cyberinfrastucture Center services (SRE, CRSP, HPC), you will need to use the VPN (as described below).
  • For other resources, please consult with your School IT Director if you are unsure which VPN you need.


  • Certain administrative applications (Cascade, Data Warehouse, KSAMS, FileNet, and others) require the VPN (see connection instructions below).
  • Remote Desktop to your workstation on campus requires the VPN.
  • You may need departmental resources which require the VPN. Please consult with your local IT support.

Accessing the VPN

If you try to access a UCI resource without the VPN and cannot make a connection, try these in order:

  1. Use the Cisco AnyConnect application (the “Software VPN”), enter in the Ready to Connect field, then choose Default-UCI as the Group.
  2. If you cannot get a connection on vpn2, enter in the Ready to Connect field, then choose Default-UCI as the Group.
  3. If you cannot get a connection with Default-UCI, enter in the Ready to Connect field, then choose UCIFull as the Group.

If you are already using please disconnect and try

The various VPN choices and their applicability are documented at which will be updated with any new instructions.

We appreciate your cooperation as we try to make UCI resources available to as many people as we can.  Please reach out to OIT Security by opening a ticket if you have any questions.

Thank you,

Josh Drummond
Chief Information Security Officer
Office of Information Technology