F5F Stay Refreshed Power Users Networks Checking for VPN functionality solely on the guest virtual machine within VirtualBox

Checking for VPN functionality solely on the guest virtual machine within VirtualBox

Checking for VPN functionality solely on the guest virtual machine within VirtualBox

R
RaysWarrior
Member
55
04-27-2016, 04:39 AM
#1
Hello, your current configuration uses a paid VPN service and you're exploring ways to boost both security and privacy while browsing and uploading/downloading. You're running Windows 8.1 x64 as the host and a guest VM inside VirtualBox. Both devices have the same VPN installed, but you're testing it on the guest first. Once the VPN connects on the guest, you confirmed no DNS leaks and that your public IP matched the original. The host still showed the correct IP and passed the leak test. You enabled the VPN's kill switch, which stops connectivity if it drops, and verified pings from both machines stayed active.

Your concern is valid—keeping all traffic inside the VM seems safer since you're not exposing host details. However, running the VPN on the host could still risk host information being exposed. If you want extra assurance, consider testing the setup with the VPN only on the host, or ensure your host's firewall and network settings are secure. Overall, this approach appears reasonable for privacy-focused browsing, but weigh the risks carefully. Let me know if you need further clarification!
R
RaysWarrior
04-27-2016, 04:39 AM #1

Hello, your current configuration uses a paid VPN service and you're exploring ways to boost both security and privacy while browsing and uploading/downloading. You're running Windows 8.1 x64 as the host and a guest VM inside VirtualBox. Both devices have the same VPN installed, but you're testing it on the guest first. Once the VPN connects on the guest, you confirmed no DNS leaks and that your public IP matched the original. The host still showed the correct IP and passed the leak test. You enabled the VPN's kill switch, which stops connectivity if it drops, and verified pings from both machines stayed active.

Your concern is valid—keeping all traffic inside the VM seems safer since you're not exposing host details. However, running the VPN on the host could still risk host information being exposed. If you want extra assurance, consider testing the setup with the VPN only on the host, or ensure your host's firewall and network settings are secure. Overall, this approach appears reasonable for privacy-focused browsing, but weigh the risks carefully. Let me know if you need further clarification!

K
Kynedee
Posting Freak
784
04-27-2016, 05:59 AM
#2
If you're overly cautious, why not opt for Tor instead?
K
Kynedee
04-27-2016, 05:59 AM #2

If you're overly cautious, why not opt for Tor instead?

S
SubTemp
Junior Member
41
04-28-2016, 02:11 PM
#3
I’ve learned about TOR but haven’t tried it yet, so I’m not overly confident. My goal is simply to reach websites and possibly download/upload later. I’m curious whether setting up a VM is practical or unnecessary.
S
SubTemp
04-28-2016, 02:11 PM #3

I’ve learned about TOR but haven’t tried it yet, so I’m not overly confident. My goal is simply to reach websites and possibly download/upload later. I’m curious whether setting up a VM is practical or unnecessary.