quote:
Originally posted by andrewdodd13
quote:
Originally posted by segosa
quote:
Originally posted by andrewdodd13
quote:
Originally posted by segosa
quote:
Originally posted by andrewdodd13
It should work.
Be very careful though, universities (if this is in halls) are usually very strict in saying that you're are explicitly not allowed to do this. And I know at my uni they have pretty good ways of insta-banning your room's account automatically.
then just connect the university connection to the wan port of the router and register the router's mac address on the university's network - as far as they will then be able to see you have one machine connected and they don't need to know what's going on behind the router (and they won't, unless they do some lame packet inspection but even then they'd need to be specifically looking for the signs of nat)
Generally this is what they do. I was told that a masters student came up with some piece of software which inspects the header of a random packet from each room every now and then and checks if it's using IP Masquerading.
what? the router is the device that grabs an ip off the university's network and ip masquerading is exactly what makes nat possible - that is, as far as the university's end is concerned every packet coming from that room is coming from only one device (the router) with the source ip being the ip that the router has on the university network. ip masquerading is exactly what prevents detection, and i don't think there's anything in any packets that leave the room that would give it away.
Well, I'm not too techy on the subject.
But if there was no identification at all, how the hell would the router know where to send the packets it receives?
this is how nat works. the natting device doesn't know where to send
initial incoming packets (for new connections), indeed, which is why port forwarding exists. outgoing packets seen by the router are recorded so that the packets that come back can be sent to the correct internal ip.