[NOTE: I HAVE POSTED THIS QUESTION ALSO IN "SUPERUSER"]
At work, we have Windows 10 machines. We also have a customer VMWare Workstation VM (Ubuntu) running locally. The customer provides a connection from our host machines to a VPN Server. Connecting to the VPN Server lets us downloading required files, connect to Internet, etc. ALL of this inside the Ubuntu VM.
However, the VPN connection (Cisco AnyConnect) blocks any Internet access from the host machines (Windows 10): When we are connected to the VPN: Outlook is not working, Lync is not working, host Internet is not working, and so forth. Of course:
• Customer does not provide a split tunneling (and will not provide it). If we try to run (for instance) another VPN service, the customer VPN is disconnected...: all the work that you have been doing during hours inside the VM (downloading GBs of files, compiling code with the tools only accessible using the VPN, so forth) is lost.
• The Internet access via the VM is extremely limited: we cannot Google to review a bash command, or a Python or C one; you cannot access StackOverflow... Trying to find out a solution:
• I am thinking to install VirtualBox (to avoid conficts with the customer environment);
• Install a Windows 10 VM (yes... a W10 guest in a W10 host);
• Forward a USB port to this W10 guest machine;
• Connect to that USB port an external WiFi card.
With this configuration, I am assuming the customer VPN will not "realize" that one USB port has been stolen from the host machine. Thus, we would be able to have Internet traffic inside the W10 guest machine using the external WiFi card through the USB port.
Questions:
Is that configuration a possible one?
Will this configuration provide the solution we are looking for?
I do not realize how the host applications (Outlook, Lync, browsers) would be able to benefit from the guest access to Internet. Is there any way to use the W10 guest machine as a gateway or proxy for the host one (weird... right?) ?
Finally, I found somewhere some advice related to provide some kind of obfuscation to the Internet traffic of the USB stolen port. But, if it is really stolen and the customer VPN has no way (?) to know that the stolen port exists, I do not find this as a necessary step, unless this scenario can be assumed as a split tunneling and thus, the Internet traffic of W10 guest is vulnerable to external attacks, like is usually described in documents related to split tunneling.
Thanks in advance! Any help will very much appreciated!