
- #VPN PREVENT SAME NETWORKVIEW SAME WIFIE LOCA INSTALL#
- #VPN PREVENT SAME NETWORKVIEW SAME WIFIE LOCA SOFTWARE#
Route print from (Windows) Client (192.168.1.2 on Client Network) IPv4 route table The only issue is if I visit 192.168.1.1 when connected to VPN I get the configuration web interface of the Client Network's router and not the Home Network's. I can also access 192.168.1.40 web interface from Client Network over internet when (obviously) connected to VPN. With this configuration I can successfully connect to VPN, I have internet access and the IP reported from when I'm connected with the client to the VPN is the Home Newtork's as expected. (I can access the VPN server from internet at the address my.:1194)Ĭlient Network (Local) 192.168.1.1 => Router/Modem Gatewayġ92.168.1.2 => VPN Client (connects to my.:1194 and gets 10.8.0.6 Ip address) The ISP has a Dynamic Public IP so in the Router a Dynamic DNS service is configured:
#VPN PREVENT SAME NETWORKVIEW SAME WIFIE LOCA INSTALL#
Also, if the Network guys were smart would already be tracking and logging traffic from your device.ĭitch the VPN and buy a Logmein account, install it on a computer at home and just remote into your home computer when away.I successfully configured a VPN connection to my Home network over internet following this guide.ġ92.168.1.20 => OpenVPN server (BananaPI device) on port 1194ġ92.168.1.40 => Other Device (with WebInterface) Your VPN, almost no matter how high the encryption values are, can absolutely be tracked, then packets tagged for collection, decrypted, recompiled and analyzed. I would error on the side of caution because, and I'm speaking from experience.

Also, if the network your using at school isn't a DMZ, but rather a "production" network, and I was in your position hypothetically. No policy, no repercussions.įortinet products can actually be very advanced and shouldn't be disregarded as a low end Firewall. If this true, then you might want at least ask what the policy is regarding the use of VPN's, and let the answer to that dictate your actions. In other words, when you login to your laptop it might look something like " myschoolsucks\vpnkid ". If this is true then I'd assume that you have to login to a domain that the school setup. Point here is, most likely no one is paying attention so. Its also likely that your egress traffic through the Firewalls are rate limited anyways, meaning that you can only use a limited amount of bandwidth. In other words, the Network guys don't care what you do on the Network and the content filters were put in place for either liability and or moral reasons. Kid owns it: If this is your laptop and your allowed to use the schools network then it's likely that the network your using is part of a DMZ. Kid wants or is using a vpn to bypass content filter ACL's on the school's firewalls.Įnvironment: Based on provided information.ġ+ Fortigate Firewall : Manufacturer-Fortinet If you're not worried about that, Isaac's advice about staying under the radar is probably a good idea. With all of that said, you'll want to make sure you're not violating your school's policies, as it may be against the rules to circumvent their security measures. The IT staff could potentially be logging every keystroke you type, taking random screenshots, or remotely viewing your desktop, all without your knowledge.


#VPN PREVENT SAME NETWORKVIEW SAME WIFIE LOCA SOFTWARE#
If this is a school computer, or there is some sort of school software installed on your personal computer: The IT staff can see that you're connected to VPN Reactor based on the endpoint of your connections from their networking equipment's point of viewĪs long as your computer is routing all traffic over the VPN, the IT staff cannot actually see anything you're sending over over the networkĪll traffic going over the VPN appears as if it's travelling to the VPN, from the IT staff's point of view The IT staff can see that there is traffic, and that it is encrypted If this is your personal computer, and the school has not had any access to it:
