Under direction of FieldComm Group staff, you may be granted access to an isolated testing network that can be access via vpn. The following will help you configure your vpn client application to connect.
You will need the TLS pre-shared key <secret>, username <username> and password <password>. These three items will be provided to your separately.
The remote VPN network is 192.168.1.0/24. This is a private, but common ip network range. If your computer is connected to a network that uses the same network range, then you may not be able to connect to the remote network.
Windows L2TP VPN Client
VPN Provider: Windows (built-in)
Connection name: L2TP
Server name: remote.fieldcommgroup.org
VPN Type: L2TP/IPsec with pre-shared key
Pre-shared key: <secret>
Type of sign-in info: User name and password
User name: <username>
Security > Allow these protocols > Microsoft CHAP Version 2 (MS-CHAP v2)
3. Configure a split vpn (prevents all traffic from routing through vpn tunner)
First, you need to enable split running by removing the Default Routing option on the VPN connection your just created.
After removing the default gateway option, you may not be able to access to vpn. This is due to a missing route that must be manually added. You will need the name of the VPN connection you created above.
Open an Administrative command windows and enter the following command
netsh interface ipv4 add route 192.168.1.0/24 "<name of vpn connection>"
Where you replace <name of vpn connection> with the name you created above. Make sure to enclose the name in quotes.
macOS L2TP VPN Client
VPN Type: L2TP over IPSec
Service name: VPN (L2TP)
Server Address: remote.fieldcommgroup.org
Account Name <username>
User Authentication: <password>
Machine Authentication: <secret>
Session Options: Send all traffic over VPN connection (checked)