Information Technology Services

  1. You must have the newest UTHSC Cisco VPN product installed.  The download and installation instructions can be found here. Please go through those instructions first, then come back to this page.
  2. If you have never connected to your work computer using remote desktop, you must first configure your work computer to allow remote desktop connections. 
    NOTE: You must be running Windows XP Professional, Windows Vista Business, or Windows Vista Ultimate or Windows 7 on your work computer to use remote desktop.
    • For XP Professional users, right click on "My Computer", then click on "Properties", and select the "Remote" tab to see the screen below.
    • For Vista users, right click on "Computer", then click on "Properties" and select "Remote Settings" to get the screen below.
      screenshot image
  3. Select the "Allow Remote Connections" radio button then click "Apply" and "OK" to close the window.
  4. You will need to know the DNS host name of your work computer to connect remotely.  To find the DNS host name, click on this link https://ipreg.uthsc.edu/status.php from your work computer.  You'll see a window that looks like the one below.
    NOTE:  You cannot click on this link from off campus.  This must be done while you are at work. screenshot image
  5. Write down the "DNS entry" on this page.  You'll need it to connect from off-campus to your work computer.
  6. From your home computer, run the Cisco VPN client and log in according to the Cisco VPN instructions.
  7. To connect to your work computer, open Microsoft Remote Desktop Connection and type the DNS name of your work computer followed by ".uthsc.edu" in the "Computer:" field, and click "Connect".  In this example, the full DNS name is stark.uthsc.edu
    NOTE:  Your home computer must have Microsoft Remote Desktop installed to connect.  This won't work otherwise.  Remote Desktop comes pre-loaded on Windows XP and Vista and can be found under "Start", "Accessories".  It must be installed separately for other operating systems. screenshot image
  8. If everything has been properly configured, you should be asked to log in to your work machine just as if you were at the office.