Question to those who say this type of connection would be blocked by IT Dept on a corporate network.? HOW?? How would the network prevent this device from calling/tunneling home?
Since VPN is encrypted, it would look like any other encrypted traffic to the network.? The network doesn't block HTTPS connections or other encrypted connections usually, so how would it know it's a VPN connection and not something else?? If the answer is a specific port #, can't you just configure the VPN to use a different port that isn't blocked?
I know some Corps block TeamViewer and Dropbox/Box and things, but I always assumed these were blocked by both standard port usage and endpoint/host connection. ie: they all call home to a limited number of IP addresses owned by TeamViewer or Dropbox, and those can be blocked if you have a list of them.? But if you're doing your own VPN, they wouldn't have a list of what VPN server address you are using to block, it would be some random IP to them.? Unless this rely's on a very well known VPN server service that they have on a block list (I doubt it).
Just like my ISP can't tell if I VPN outside of their network or not, I don't think a corporate network can tell easily either.? I'm not a VPN expert though, am I missing something?
--
Jason Mussetter
Control Systems Designer
Mussetter Programming Services
www.mpsav.com