Actually it goes beyond that. Depending on how big your company is, they most likely have a firewall in place with ACLs (Access Control Lists) that determine what traffic is or is not allowed. Additionally, any computer security person worth a Darn has logs that show what that firewall is stopping. We had a Sidewinder we used and were routinely getting hacked by a Holiday Inn in Ft. Walton Beach, Fl. Turns out it was spoofed and was actually comeing from a country in Europe. Anyway, point is that the more you bang away trying to get around stuff like that, the more they will pay attention to it. We keep an eye on the stuff trying to get in pretty much constantly....but we also check what is trying to get out since people have a tendancy to download and install software that contains malicious code in it. Best bet is simply don't try anymore. Unless you have a friend in your IT department that can give you a hand, eventually someone may notice the unusual traffic coming from your terminal and try and investigate. Kinda what I do where I'm at.
As to your original question, the only thing I can think of is if you setup a redirect from your home. You might try setting up a proxy at your house that will listen for telnet connections on port 80 and then redirect you out to where ever you are trying to go. You could setup the proxy so it only accepted connections from your work's IP address. Try going to
http://www.broadbandreports.com/ip while at work and check your IP a couple of times to see that it stays pretty stable. Once you know your IP range you should be able to lock down the access to anything you setup.
Hope that gives you some info at least.