JHA VPN

Corporate teams manage an F5 Big-IP VPN solution that gives our users access to; corporate resources, the JHA data center, Azure, AWS and non-proxy, non-MiTM web browsing (currently unfiltered). The devices are based out of Monett, Branson and Allen. Our internet-bound traffic passes through a firewall, but a list of exceptions is allowed through.

The BIG-IP solution is fully tunneled; all internet-bound traffic will go through the VPN tunnel. We are advocating for a change to policy that would allow some users split tunneling or potentially split tunnel for video services, but this effort is in the initial stages.

VPN Configuration

Access to VPN requires four components.

  • BIG-IP Edge Client: preinstalled on your machine
    • The server list should be pre-populated
      • If your server list is not pre-populated, click the VPN icon in the menu bar > Manage VPN Servers > Add https://dca.jhavpn.com and/or https://vpn.jhavpn.com/ into the server address field.
  • A VPN certificate
    • Issued automatically
  • Appropriate permissions applied to your @jhacorp account
  • Okta configured

Internet ACLs

More specifics are available, but at the moment corporate allows internet-bound traffic from our VPN IPs to all destination IPs on ports for Google services (Meet, Docs, etc.), Slack video calls, freenode-irc, most mail ports (imap, pop3), and basic web services (web, ftp, ssh, ntp, whois, dns, and 8443).

BEP

The BEP site at https://bep.jackhenry.com provides off VPN access to resources that have traditionally only been available on the corporate network. It leverages the same authentication mechanisms as VPN to securely use these apps without requiring VPN connectivity.

  • Microsoft cloud-hosted services: jhaToday, Office 365 email and apps, Teams
  • PeopleSoft Applications: CRM (customer tickets), FSCM (Finance), HCM (HR)
  • Else: Building access, Policy Center, JHAUniversity, Directory, Service Center (8100/JHA helpdesk)

Troubleshooting

Problem: Client Certificate Validation Failure

Note: If you are a contractor, you may not have automatically get a certificate. If you have never logged into VPN before, contact Ground Control first.

If you get this error, open Self Service+ and run Reissue VPN Certificate. This process may take several minutes. Once complete, restart your Mac and try logging into VPN again.

Problem: Spinning Wheel

In the Big-IP client, the authentication looks successful, but a spinning wheel is shown in the client and it never successfully connects.

Cause: The user is not in the correct Active Directory group to authorize access to VPN.

Solution: Ground Control can work with Identity management to verify the appropriate group membership and correct it if necessary.

Problem: I can’t get to certain resources

Cause #1: Not accessing the correct endpoint

Solution: Corp blocks some resources Digital doesn’t so make sure you’re using our endpoint: https://dca.jhavpn.com

Cause #2: Incorrect AD group membership

Solution: Check-in #org-ground-control so we can make sure you’re in the right VPN group(s) for your role

Problem: Name resolution issues

When doing DNS queries and NXDOMAIN response is returned

Solution: Confirm that you’re connecting to https://dca.jhavpn.com

Problem: Alert Pop Up

Users may see a pop-up when turning the VPN on. The pop-up states “Your configuration data appears to be corrupted. Would you like to reset them to their default values?” Users should have the option to ‘Cancel’ or ‘Continue.’ Pick ‘Continue,’ and your configuration will be updated once the VPN is connected.

Problem: continually promps for Mac password

If the VPN Client keeps prompting for you Mac password and you’ve already ran Privileges.app and selected Always Allow (as pictured below) then try reinstalling the VPN App.

screenshot of the mac password prompt from BIG-IP Edge Client

To reinstall:

  1. Open the “Self Service+” app (formerly known as “Tech Services”)
  2. Search for “reinstall”
  3. Click on “Reinstall Big-IP Edge Client” screenshot of reinstall option for BIG-IP Edge Client in Self Service+