I have been using SFC for bandwidth bonding of 2 WANs but have now been blacklisted at several websites, apparently because connecting via SFC looks to them like a VPN connection and they have “no VPN connection” policies. This is a much worse problem than simple website blocking of SFC connections, such as at reddit.com, which can be undone by turning off SFC. Instead at several websites my connectivity has been blacklisted permanently. Most recently I have been locked out of my online US Social Security account because of trying to access it via SFC, which I discovered after several hours on the phone with their tech support people who were unable to tell me if I could ever be allowed access again. I had a similar problem a couple of months ago having used SFC to reach etsy.com, but was eventually able to regain access after sending several apologetic emails for “having used a VPN”. Is there a way to use SFC without it appearing to be a VPN to websites that have “np VPN connection” policies ?
It’s best to not use VPN except for use cases that specifically require VPNs. Else, put a Peplink device at your house (or one of a friend/family member) and use that to speedfusion with and egress from.
When you use the Peplink SpeedFusion Connect service (SFC), you share the same public IP with thousands of others, not just a few, so it will appear like it is being used as a public VPN.
Lots of organisations/services will now block public VPNs as they are often used to mask the identity of rouge users.
Just as those of us who are legitimate with our VPNs, some are not, and the few spoil it for the majority.
Happy surfing,
Marcus
Investigate running FusionHub Solo. You won’t be sharing the IP with anyone else and won’t have the problem you are experiencing.
We are thinking of launching a service for this exact reason, so DM me.
Running a fusionhub yourself, or using speedfusion connect relay and taking it through one of your other, better connected sites, is the answer
The only issue, running FH Solo, you still share an IP block with others. Given the IP blocks at places like AWS and Azure are assigned to them in aggregate (more often than not), others will label entire subnets as VPN blocks.
But, as Bryn and Michael said, FH Solo is 100% the best way to do this.
I have a very simple, quick, and no cost solution that works for us and may work for you. I have the default outbound policy to use SFC for all traffic; however, I also set up an outbound policy to exclude web traffic from using SFC. We no longer have issues with websites blocking us. Also, we have not seen any issues without SFC on web traffic since a glitch here & there is recoverable and hasn’t been noticeable after using for months now. Because of the default policy, we still have SFC for everything else which includes critical real-time applications like Zoom, VoIP, etc. Hope this helps.