Using Virtual Private Network (VPN), employees and doctoral students can log in to the university network from home, abroad, or other university. When connected to a VPN the computer will work as if connected directly to the university network.

Available for


How does VPN work?

The client asks the server to create a VPN tunnel. When the server verifies the username and password, both the client and the server create new network interfaces that are connected by a tunnel that is encrypted and through which all data passes.
Other servers along the way see the encrypted communication between the client and the server and can not read it. The destination server then decrypts the data and forwards it to the Internet. From the outside it looks like the client has a computer connected directly to the server.

VPN groups

The basic policy for working with VPN is the “vpn” group. Here, the entire operation is tunneled to the CTU network and externally you are seen under IP address from the CTU network range. The group “vpn” is suitable primarily for a safer connection from a café or for a connection to outside license servers and to electronic resources that require an IP address from the CTU range.
Another VPN policy is the “vpncvut” group, where only communication with CTU is tunneled and you communicate with the rest of the Internet under your home IP address. This is useful if you do not want to be cut off from your home network printer or disk array. Other groups are not intended for general users.

VPN service at faculties

Some faculties provide VPN service separately for their own employees and students.

VPN connection to FS (Czech only)
VPN connection to FSv (Czech only)
VPN connection to FEL
VPN connection to FJFI (Czech only)
VPN connection to FIT

Getting started

Instructions for Windows 8 and 10
Instructions for Windows 7
Instructions for Linux
Instructions for Rectorate of CTU

Content owner: CIC - Department of Network and Computer Administration (81340) , Last change: 05.12.2023