Im not attempting to split hairs... I just wish to clarify my situation and ensure im not breaking any rules. I reread the rules and rule and focused alot harder on #8, which says...
Using a proxy server (beyond any required for you to access the Internet) to access the Imperial Conflict server. It should be noted that many download accelerators use proxy servers, and thus using such a download accelerator with IC is a breach of the rules. Use of a proxy server will result in an immediate block from the game.
I'm not a huge Techy, so I wanted to make sure i wasnt confused, and I did some research to make sure I wasnt blatantly and ignorantly breaking IC rules. Every document i found ensured me that VPN and Proxies are completly different. Also even Rule #8 suggests that a Proxy server could be allowed in some form if it was required to connect to the internet (though im using a VPN, not a proxy).
Also for further clarification my VPN does not in any way block my IP address, im assigned 1 IP address that i always use, to my understanding.
below is the most detailed, and yet straight forward research I could find. My understanding of a VPN is that its nothing like a proxy server.
---
a proxy is a computer which communicates on behalf of another computer. proxies are frequently used in business networks to create an intermediary between web clients inside the network and web servers outside it.
your workstation sends a connection request addressed to http://www.imperialconflict.com. your company's proxy server intercepts this request and retransmits it to yahoo's web server. yahoo's web server sends the requested data to your company's proxy server, and the proxy server forwards the data on to your workstation. if all web traffic is forced to go through your company's proxy server, it allows easier application of security measures (such as content filters, virus scanning, etc.).
VPN is a virtual private network -- it is the emulation of private, local network connections over public networks such as the Internet. It is frequently used to allow people working from remote locations to access their company's data network as if they were connected from within a company office.
For example, suppose you use your laptop to establish a VPN connection from a hotel room in Chicago to your company's headquarters in New York. First, a packet of data on the laptop is encrypted. A VPN "wrapper" is attached to the encrypted data (this is called encapsulation) and the whole package is delivered from the laptop to the VPN endpoint via the internet. The VPN endpoint receives the package, removes the VPN wrapper, and decrypts the data. The VPN endpoint then transmits the unencrypted data onto your company's private network. The entire process of encryption, encapsulation, transmission across the internet, decryption, and decapsulation are completely transparent to both your laptop and any servers or other workstations you connect to in the corporate office.
Essentially VPN and proxy servers really don't have much in common, so there is not much basis for comparison. In very general terms, both technologies involve interaction between private, closed networks and the internet.
---
If my VPN is forbidden, I'll attempt to only access IC through my Laptop, which would be a pain... I apologize, this question is probably annoying... I just want to ensure im not blocked.
Thank You, in advance.