Skip to main content

Cornell University

Use a GuestID with a VPN

This article applies to: CU VPN , GuestIDs

On This Page

GuestID VPN (GID VPN) is a remote-access VPN created exclusively for GuestID users. Unlike CU VPN, which uses Cisco technology, GID VPN uses VPN technology from Fortinet, specifically the FortiClient remote access VPN software.

Security Liaisons and TSPs interested in deploying a GuestID VPN should contact the IT Security Office ( Individuals with GuestIDs who have questions or need support using the GuestID VPN service should contact their sponsor for more information.

Download, Install, and Configure the GuestID VPN Software

  1. Download the OS-appropriate FortiClient software from (GuestID users may need to click on the blue “Cornell NetID” bar to get to the authentication prompt).
  2. If you're upgrading from a previous version of FortiClient, you must uninstall it first.
  3. Run the installer using administrative access on your machine.
  4. Disconnect from CU VPN or any other VPN connection you might have active.
  5. Start the FortiClient software, accept the “no support” acknowledgment, and click Configure VPN, which is located low and centered in the window:

  6. Fill in the fields as follows:
    1. Connection Name - an arbitrary mnemonic label that the user will recognize;
    2. Remote Gateway - enter, then append the exact name of the AD group for your VPN access (available from your Cornell technical support provider)
    3. Save login radio button - select Save login.
    4. Username (which will appear after Save login has been selected) - the user's GuestID, “@”, and the exact name of the AD group as before.

      A screenshot of the FortiClient VPN client with a sample configuration
  7. Click Save. The window will revert to displaying the Connection Name and Username configured, with a blank password dialogue box.
  8. Test to make sure that the connection functions.


To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.