So I got the GL-SFT1200 to use while working when I’m outside the country and still have my IP show that I’m home. I got a dedicated IP address from TorGuard, configured with OpenVPN, if I look at Iplocation.net, it shows my dedicated IP, so everything is fine, Gmail authenticator too. But with Teams/Office365, it actually shows the IP address like I’m logged in from where the ISP/provider is located (different country) and not the dedicated one as it should. I find it weird that some apps see the correct IP (dedicated one) and some don’t. Any suggestions to fix this would be more than welcome. I talked with the TorGuard support for a while and did not much help. Thanks!
Except for IP location, you should check ip leak and dns leak using the following domain etc.
Make sure you don’t have leak.
How does the Teams, office365 show your IP?
Hey alzhao, I already tried ipleak.net and it didn’t find any leak. I will try dnsleaktest.com when I get back and have access to the router, thanks!
Office365/Teams shows the wrong location in the Microsoft android Authenticator app. I don’t actually see the location on my PC, only on my phone when I need to confirm the push notification and provide the number shown on the computer.
Thanks a lot, really appreciate the help!
Isn’t your phone giving your location away to teams, instead of the router?
This would actually make a lot of sense. On my PC, all the leak tests turn out fine, Iplocation displays the correct location too. Only getting this issue in the Facebook and Microsoft authenticator apps. I just thought that the PC connection was sending that info to the phone. I tried to disable location on my phone, turn off 4g/roaming and all to just keep wifi but it didn’t change anything. I use a Google Pixel 7 Pro. Any ideas of what I could do to block the phone app from seeing the wrong location and display the one from the dedicated IP instead?
Disable cellular connection and location services, connect the phone to the VPN-enabled router and go to whatismyip, check that your public IP is the same as torguard’s (should be). Try a leak test from your cell phone. Should be no different than from your PC if you are both connected to the same network.
Only way I see teams guessing your actual locations is by overriding the location/GPS settings from your phone. Not an android user.
I’ve used a Beryl in your same scenario (Teams + Okta on iphone) and don’t see any leaks…
This should be the correct way.
When I was travelling I met a strange problem that my macbook does not find some wifi network, it turns out that my phone detect region based on the carrier and sync this info to my macbook.
So I have to do the following so that my phone don’t detect region:
- put iphone in Airplane mode
- Reboot iphone
- Reboot macbook
I turned off cellular connection and in the location services, I found some options called Wifi and Bluetooth Scanning, I turned that off too, I believe that makes the phone guess your location from other networks around, which could make sense. But then again, the location showed on the Team authenticator is not the state I am in, but the state that the ISP providing the dedicated IP is in, so it might not be that.
I did a ipleak test with those options off and it does show the dedicated IP.
I will try it that way for my next login to see if it’s fixed.
Yes, that’s how it works. If you disable location services, the only way of knowing where a connection comes from is from the IP.
What I personally do in these cases (working from abroad), is setting up a VPN at my home. It’s easy using a Brume 2 just set it up as a Wireguard VPN Server and connect to it from overseas. That way, your IP will be the same as ‘working from home’.
I have torguard as a backup, or when I just need quick VPN access (i.e. using a public WiFi).
I’m looking at the Brume 2 on Amazon right now! That sounds like a great idea! I might connect to Asia at some point, do you think it would work well or the distance between Asia and North America might really slow down the connection?
As with all things internet, that will vary.
First, your speed is highly dependent not only on your remote connection, but your VPN servers upload speed. If you’re using your home as a server, your upload speed will become your download speed when travelling, conversely your remote upload speed will be the limiting factor since download speeds are generally larger. If you have symmetric fiber at home (ie:1000/1000) this doesn’t apply.
Then you have lag. The way the internet works is by moving your data between different servers until it reaches the other end “hops”. Each hop adds some latency (measured in ms) You can see this by doing a tracert in a DOS window. Real-time apps like VoIP and Remote Desktop are affected by this, the former being very noticeable and the latter, less
This is usually is not a big factor per se, but it starts to become noticeable when you add a VPN layer on top of it, because instead of the data packets finding their best route out to the destination, they are forced through a tunnel to your home, and then, go out to “the internet”. Add to this the capacity of your VPN server hardware, some overhead, etc.
One way that companies have overcome this is by using split tunneling: only some of the traffic will be router through the VPN while the majority will not (ie:VoIP). Think about it, if you have hundreds of clients connecting to a single VPN server, unless managed correctly and with the right bandwidth will drag everyone down.
Not saying this is your case at all.
So yes, speed and latency will be affected, but not something to be crazy about. It will get the job done.
What is the difference between a Brume 2 and a travel router like a GL.iNet GL-AR300M (NOR)? Do they not essentially provide the same sort of service for using wireguard as a VPN when overseas?
They do provide the same service. Differences in speed due to processor / memory / Ethernet ports and things like that.
AR300M is 10/100 for starters, basic processor to Brume 2, less memory , etc