Students using VPN via Chromebook

Student owned devices so not enrolled in GAFE.

SSID password changed.
I hard reset all student owned Chromebooks and connected them to our WiFi.

In the google console, made it a “per user” setting and added the new password to automatically connect.

Now students can log into their school issued account but the moment they log into personal accounts the WiFi cuts out.

Worked well for a week :wink:

Now students are logging onto personal Google accounts and connecting to VPN extensions installed whilst at home. The moment they connect to VPN their school WiFi access is restored!

Is there any way I can block VPN access on their Chromebooks?

“student owned”- so you have no control- you will be playing a game of whack a mole that you will never win. If they are violating the AUP then it is a discipline issue.

I could be completely wrong… But if you know what extensions they are using… Just add those to the block list?

Can your firewall or filter block vpns? I’m not sure this should be your problem either.

Are you using any sort of web filtering, aside from what’s built into GAFE? Because it sounds like you aren’t, but should be.

For our BYOD, the current best mitigation against VPNs is to block the CIDR address block. That’s a big of a pain, but it’s been effective. For those kids that just can’t stop, I throttle the personal devices down to 20K up and down. I don’t have time to play whack-a-mole all day, and we offer our BYOD network as a convenience, not a guarantee.

Gets a little sticky when the chromebooks are unmanaged/not district owned. If you don’t manage them, other than blocking on your network, you can’t block the VPN extensions.

You will never get control of the situation if you allow unmanaged student own devices that can use personal accounts. It is impossible. Nearly all policies for security are set at the user level, not the machine level. So allowing them to log into personal account simply bypasses all of your policies.

You can use an on-prem filtering appliance to reduce the issues. At least that will capture all traffic on your network. Then you were going to add to the complexity and overhead of SSL inspection. And at the end of the day, there’s nothing to stop them from simply bypassing all of this by connecting to their phone’s wireless hotspot.

Ah in a perfect world we can assign responsibility to teachers but in this Central London school, nope!

They’re using personal accounts on unmanaged personal devices. I don’t think you can block them. A lot of these vpn extensions are hosted on AWS too, so blocking that is tough.

This is what we’ve been doing but it’s a whack a mole game!

IIRC a vpn that runs as a browser extension is seen as standard ssl traffic in Firewalls, unless you are doing SSL decrypt the firewall just lets it through. I remember an incident where a teacher caught a student streaming Netflix in class and reported it to us. When I tested the extension the kid was using the firewall just saw it as traffic going to a random website instead of Netflix.

Yes we are using Securly for filtering. Authenticates via domain account only.

we offer our BYOD network as a convenience, not a guarantee.

Good luck with that argument when the curriculum is designed around the student having a device online before, during, and after class.

If you don’t follow the AUP then you can’t have any pudding.

Monitor and log. Make SLT aware of the risks (no filtering, no safeguarding protection, GDPR issues if data is exfiltrated etc) and that this can’t be resolved by technology. It’s SLT’s decision how to handle it, not yours. As long as they’re made aware, they can’t come back at you if things to badly.

Missed the part about personal accounts. My mistake.

Reverse it. Whitelist; that’s what we do. We own the devices however.

Ah okay. My ancient filter can’t do anything. But students using personal devices for classes? Thats a big can of nope.

Is Securely your only means of filtering traffic? You may want to look into an on-prem supplement. Otherwise, the only other options are making rules in Securely to block that VPN traffic, or find out where those VPNs are pointing to, and block that on your Firewall.

There’s your problem. You need some on-prem layer 7 filtering