I'm guessing (and purely a guess) that coming in the LAN of the RT is different, either NAT, Firewall, or otherwise, than coming in through the WAN. Once in the LAN of the RT, going out the WAN is transparent. I am knowledgeable about networking, but by no means a pro. A side benefit of doing it this way is one can "manage" the RT through a normal IP address since it's on the same subnet.
My RT is running 1.25.00.
/c
I'll have to check and see what version my RT is running. I know both of the ones VoIPo sent me are running the same version and when I checked there was a later version of the firmware out there.
I'm able to manage my RT that is plugged into my WAN port today. I just go out to http://192.168.15.2:999 (or is it 4 9's?) and it brings up the login popup and then I'm in.
I'll let you know version and if I get it to work.
Since it is not an everyday thing for me, I may not notice if it doesn't fall off. If it works, even tho it is not "clean", I'd be able to live with it.
I was referring to being able to manage it without using port numbers. See? You can't even remember what the port was!.
Latest firmware for the RT is 1.30.07, dated (gasp) 12/20/06. The 1.25.00 firmware is from 2004 (December 1 to be exact). I asked VOIPo if I could upgrade. They said that they ship the routers with the support firmware level.
From work, I SSH (using autossh, and not port 22) into my WRT and set up a tunnel (one could also use the very excellent Tunnelier on Windows). I use proxy forwarding, using FoxyProxy to manage my FireFox connections (internal to work or external), and all external traffic is being tunneled to my home router, which then relays back all internet traffic. This way all external traffic, including DNS requests, is fully encrypted from prying eyes in IT (including IM messages).I've use wireshark to verify the traffic, and boy is it encrypted.
This also allows me to directly connect to my home routers/adapters/PC from work. I can monitor the status of the RT (and WRT) from the comfort of my office chair.
/c
Last edited by ctaranto; 01-13-2010 at 11:58 AM.
Well, I can't tunnel back to my home computer from the office. Well, I could, but I would have to fire myself. I don't work in IT, but Security of the network falls under my control, and when I see people connecting to their network at home to bypass filters and such, they get marched to HR. There is too many things that people have access on here that we can't have either walking off, or a unsecured internet point coming in.
BUT, I know what you are saying.
I supposed, but it's no different that someone with a 32GB memory stick dumping everything on that and walking out. Nothing's more effective or stealth than sneaker-net.
I don't use it to bypass filtering. I'm tired of reauthing every 30 minutes since I run Linux of my laptop and not on a domain.
Anyways, back to topic. Let me know if you get around to changing the wiring and if it helps.
/c
Bookmarks