quote:
Originally posted by andrewdodd13
quote:
Originally posted by segosa
quote:
Originally posted by andrewdodd13
It should work.
Be very careful though, universities (if this is in halls) are usually very strict in saying that you're are explicitly not allowed to do this. And I know at my uni they have pretty good ways of insta-banning your room's account automatically.
then just connect the university connection to the wan port of the router and register the router's mac address on the university's network - as far as they will then be able to see you have one machine connected and they don't need to know what's going on behind the router (and they won't, unless they do some lame packet inspection but even then they'd need to be specifically looking for the signs of nat)
Generally this is what they do. I was told that a masters student came up with some piece of software which inspects the header of a random packet from each room every now and then and checks if it's using IP Masquerading.
what? the router is the device that grabs an ip off the university's network and ip masquerading is exactly what makes nat possible - that is, as far as the university's end is concerned every packet coming from that room is coming from only one device (the router) with the source ip being the ip that the router has on the university network. ip masquerading is exactly what prevents detection, and i don't think there's anything in any packets that leave the room that would give it away.
quote:
Originally posted by Ezra
That might not work, at my university they use 802.X for authentication and I think dd-wrt support this, but I don't think standard firmwares do. So then you'd need to use repeater mode as then authentication is handled at the devices again and not the router. Also using NAT will cause all the problems that NAT has and repeater will avoid these.
are you talking about wireless? I was under the impression he had a wired connection to the university network, not a wireless one.