Thanks for the suggestion.
I'll read it.
(Some background - I need set up test environment for an array of different servers and DHCP client devices.)
Many DHCP clients behind this firewall will be small embedded devices. Which means:
- All 3rd party hardware. I have very little control over them.
- Basically, they can be setup as DHCP clients. That is about it.
- Once they have internet access, they will use http to access web pages.
- They use this web access to decide if they need to update themselves.
- They use http or ftp to download their own updates.
- They update themselves.
- Finally, reboot themselves to become DHCP clients again.
In other words, I cannot force these clients go to a socks proxy.
I can however, make sure that TOR is the only "server" on this LAN.
Given this scenario -
Can TOR still provide (anonymized) service to this LAN?
The anonymized service is important because I have to preserve the identity and the origin of each of these embedded devices.
So that the servers in the test environment provide equal access to any request.