Networking Nerds — Can the job tell if your router is using a dedicated IP through a VPN provider?

My 2 Js require me to be located in a certain state. These are corporate devices. Let’s just say I’m in my second house and I have full admin access to the router. Mobile formatting.

Proposed solution:
Install OpenVPN client on router.
Purchase a dedicated IP address in my home state from a big name VPN provider.
Log into router with a certain VPN provider’s login.
Change router IP from DHCP from current ISP to dedicated IP from VPN provider.
Connect all work devices to the new router.

I’m not an expert hacker/network engineer type, but I know my way around the admin screens on routers and do know the lingo (I think). Can I do this?

Why do I ask? I’ve seen many comments on posts here saying “my IT department contacted me immediately and asked if I’m using a VPN.” I think that because this is at a router level, not foolishly/impossibly installing VPN software on a corporate device, I should be okay.

However, I don’t know if IT will see the “hops” and show the VPN provider (or the out-of-state ISP) in some of their processes.

Edit: I will not use the VPN provider’s DNS servers. Prob will use Google or something. Might even use the DNS of my home ISP just for continuity. I know this adds latency but this is temporary.

It would be better if you could setup a VPN connection to your home router. That way when you are connected, it will still be the same IP address they see (or range) when you are at home.

It really depends on how competent your admin’s are and how much they care. You could also rent a VPS (Virtual Private Server) from a location that’s around your state and setup a VPN connection to it, which would not show as a normal VPN IP as it’s a dedicated server.

They will be able to tell you’re connecting from a VPN by the IP address. VPN providers usually have known ranges. That’s how places like Netflix block VPNs.

I want saw a guy logging in from Medellin Colombia. Laughing my ass off I contacted him saying we had an usual login from his account and was verifying if it was him. I was like hey bro you set off some alarms

This would most likely work. Most companies aren’t going to notice. I’ve used a Raspberry Pi with OpenVPN for work while travelling and never got flagged. Before connecting with your work laptop, I would try connecting a personal device to run a dns leak test. If that doesn’t have any info about your original hops or where you’re really at, then you’ve configured your network properly and you’re good to go.

YouTube has a ton of videos on how to set up a travel VPN router using OpenVPN. That’s basically what your trying to accomplish.

I think that because this is at a router level

No…its gonna look exactly the same from IT’s end either way

The only real advantage/difference is you not needing to stick the vpn dialing software on the corporate device

I’m using Exit nodes (route all traffic) · Tailscale Docs

Just a thought on this. I wonder if it would be possible to setup a client in the cloud to work from in a DC in the state you need? Not sure how audio or video meetings would work but you should be able to do everything that way and if you have issues you would have good backup and restore in place.

You could also use lesser known vpn services. I would look at something like a PFsense device

Why not just buy a preconfigured router from flash routers dot com? I got mine from there and use from all over the world. They don’t say anything. Done it for years.

I think that’s a fair and cheap recommendation for next time, but I don’t need it to look like I’m at my house. Just in a state. Not even the same metro area.

Thanks for the second paragraph. That’ll be my backup. Appreciate it.

Sent a PM. Hoping to get some more info

I was concerned about that as well, since that’s the easiest way to filter them out. I specifically asked about that and they said the dedicated IPs come from a different pool.

I don’t understand how what they’re saying could be true. You still own a block of addresses to sell the dedicated IPs from. It’s still a big ass block that’s publicly labeled under your ownership.

I’m going to try it out. It’s fully refundable.

Hi. With the GLinet routers you can create a Site to Site connections and connect 2 routers. One on your house a server like the GLinet mv1000 and for carryon the glinet axt1800 (Wireguard Connection). If possible get a static IP from you ISP. Make sure in your house you DMZ the Glinet router and your should be good to go. and then you

I was thinking about going this route as I work remotely in the states and would like to travel to Latin America for a month or two.

VPN’s eat up space on packets, so your traffic is going to be noticeably smaller than typical after exiting the VPN. It depends on the level of paranoia with your employers if they will be watching for this, too.