Fact-checked by Grok 2 weeks ago

Split tunneling

Split tunneling is a networking technique used in virtual private network (VPN) configurations that allows a remote user or device to route only organization-specific traffic through a secure VPN tunnel while directing all other traffic directly through the user's local internet gateway, thereby splitting the data paths between encrypted and unencrypted connections. This approach contrasts with full tunneling, where all traffic is forced through the VPN, and is commonly implemented to optimize resource usage in remote access scenarios. In practice, split tunneling operates by defining access control lists (ACLs) or route policies on the VPN gateway—such as those on Cisco Adaptive Security Appliances (ASA)—to specify which IP subnets, hosts, or applications send data via the tunnel, with the remainder bypassing it for faster local access. Microsoft Windows VPN profiles, for instance, support this through the VPNv2 Configuration Service Provider (CSP), where administrators can configure include or exclude routes to direct traffic selectively, often via tools like Microsoft Intune for enterprise management. Key benefits include reduced bandwidth consumption on the corporate VPN infrastructure, improved performance for non-sensitive activities like web browsing or streaming, and better scalability for large remote workforces, as seen in optimizations for Microsoft 365 traffic. However, it introduces security risks by potentially exposing non-tunneled traffic to threats on the user's local network or the public internet, such as malware infections or data leaks, unless mitigated with endpoint protection and strict policy enforcement. Split tunneling has become increasingly relevant in hybrid work environments, particularly since the early 2000s with the maturation of VPN technologies, enabling dynamic configurations like Cisco's AnyConnect or Microsoft's split tunnel for Teams media to balance security and efficiency. Configurations can be static, based on predefined routes, or dynamic, adapting to application needs, but require careful auditing to ensure compliance with standards like NIST SP 800-53, which recommends controls to prevent unauthorized external access. Overall, while it enhances and efficiency, organizations must weigh these gains against the need for robust threat detection to maintain .

Definition and Basics

Definition

Split tunneling is a networking technique that allows a user's device to simultaneously connect to multiple networks or security domains, such as a local network, a corporate intranet, and the public internet, by routing specific traffic through a secure virtual private network (VPN) tunnel while directing other traffic via direct connections. In this approach, typically implemented in remote-access VPN clients, only selected data packets—often those destined for internal organizational resources—are encapsulated within an encrypted tunnel to ensure secure transmission over public networks, enabling controlled access without forcing all internet activity through the VPN. This method contrasts with full tunneling, where all outbound traffic from the device is routed through the VPN gateway, regardless of its destination. The primary purpose of split tunneling is to optimize and resource utilization by avoiding unnecessary and consumption for non-sensitive , such as general web browsing or streaming, which can instead use the user's default gateway. For instance, in corporate environments, it permits remote employees to securely access proprietary systems or databases via the VPN while allowing everyday online activities to bypass the tunnel for faster speeds and reduced load on the organization's . This selective is configured based on criteria like addresses, domains, or applications, ensuring that tunneling serves as a secure path primarily for protected resources.

History

Split tunneling emerged in the mid-1990s as a configuration option in early remote access VPN protocols, notably alongside the (PPTP), which was developed by and a of companies including Ascend Communications, , and to enable secure dial-up connections over the public . PPTP, introduced in 1996, supported split tunneling through client settings that allowed users to route only specific traffic through the VPN while directing other traffic directly to the local connection, addressing the limited bandwidth of dial-up modems prevalent at the time. The feature gained popularity in the early 2000s with the advent of enterprise-grade VPN solutions, particularly as began replacing dial-up but bandwidth constraints persisted for remote workers. Systems played a key role in its widespread adoption by incorporating split tunneling into its remote access products; in 1999, following user feedback during testing, Altiga Networks added the capability to its VPN appliances, which acquired in March 2000 and rebranded as the VPN 3000 Series concentrator. Similarly, integrated split tunneling into its SSL VPN offerings around the mid-2000s, enhancing remote access efficiency in enterprise environments where full tunneling would overload connections. These implementations were driven by the need to optimize performance during the transition to , allowing corporate traffic to traverse the VPN while permitting local without unnecessary overhead. By 2005-2010, split tunneling had become a standard feature in major VPN clients and appliances, with Cisco's release of the 5500 series in 2005 merging firewall and VPN functionalities that included advanced split tunneling policies, and the introduction of the AnyConnect client in 2006 further standardizing it across platforms. Adoption accelerated post-2010 amid the growth of and services, as organizations sought to balance with performance; for instance, the rise in distributed workforces from 2010 onward, fueled by , prompted wider use of split tunneling to route only internal resources through VPNs while accessing applications directly. This trend intensified dramatically during the starting in , when global lockdowns led to a surge in — with remote workers increasing by over 400% in some regions from pre-pandemic levels—overloading traditional VPN infrastructures and driving widespread of split tunneling to optimize bandwidth for essential corporate traffic while allowing direct for other activities. As of 2025, split tunneling remains a core feature in hybrid work models, supporting efficient access in distributed environments.

Technical Implementation

Mechanism

Split tunneling functions by selectively routing network traffic through a virtual private network (VPN) tunnel while directing the remainder via the local connection, leveraging the foundational VPN encapsulation process where data packets are wrapped in a secure for transmission over an untrusted . The process begins when the VPN client establishes a secure to the VPN using protocols such as or , creating a virtual on the client device. Once the is active, rules—defined by criteria like destination IP addresses, ports, or domains—are applied to classify . These rules direct matching , such as packets bound for corporate , into the encrypted for encapsulation and forwarding to the , while non-matching , like general web browsing, bypasses the tunnel and follows the client's to the local gateway. The client then updates its operating system's to implement these decisions, ensuring persistent separation of paths during the session. Key components enabling this mechanism include modifications to the client's routing tables, which add specific entries pointing to the VPN for selected destinations while preserving the original for others. (PBR) extends this by allowing decisions beyond simple IP destinations, incorporating factors like protocols or source interfaces to enforce the split. Application-layer proxies may also intervene, inspecting traffic at higher OSI layers to redirect it accordingly. In IPsec implementations, split routes encapsulate targeted packets using protocols like Encapsulating Payload (ESP), routing them via the tunnel . achieves similar results by pushing route directives from the server, which the client integrates into its table to route only defined subnets through the tunnel. Regarding traffic flow, corporate-bound packets originating from the client are first evaluated against the routing rules; if they match, they undergo encapsulation within the VPN protocol and are transmitted to the server over the tunnel, where they are decapsulated and forwarded to the internal network. In contrast, general internet packets that do not match the rules proceed directly to the local ISP gateway without encapsulation, utilizing the client's native network interface for faster, unencrypted transit. This dual-path approach relies on the VPN encapsulation basics, such as adding security headers to protect tunneled data while leaving local traffic untouched.

Configuration Methods

Client-side configuration of split tunneling typically involves modifying VPN client settings to exclude specific routes or applications from the tunnel. For instance, in Windows built-in VPN, administrators can enable split tunneling by editing the connection properties in the Network and Sharing Center, where routes are specified to direct only certain traffic over the VPN while allowing other traffic to use the local interface. Similarly, AnyConnect Secure Mobility Client supports split tunneling through its profile editor, where users or admins define IP address ranges or application-based rules to bypass the tunnel, such as excluding local access via the "AllowLocalLanAccess" parameter in the client profile XML. Server-side policies for split tunneling are enforced at the VPN gateway to based on administrative rules. These policies often distinguish between split-include modes, which only specified ranges (e.g., corporate subnets), and split-exclude modes, which all except designated exclusions like public destinations. Dynamic assignment of such policies can integrate with protocols like or LDAP; for example, firewalls use LDAP attribute maps to assign group policies dynamically upon user , pushing tailored split tunneling rules to clients based on user roles or groups. FortiGate devices similarly configure server-side split tunneling in SSL VPN settings, defining addresses that push selective routes to clients via the FortiClient. Integration with firewalls enhances policy enforcement for split tunneling. FortiGate firewalls enable split tunneling by configuring SSL VPN portals with split tunneling enabled and defining firewall policies that route only internal through the tunnel while excluding external destinations. firewalls, through GlobalProtect gateways, support split tunneling based on access routes, domains, or applications, where administrators configure selection lists to include or exclude specific flows at the gateway level. For mobile devices, (MDM) solutions facilitate split tunneling by deploying VPN profiles; , for example, configures per-app VPN policies for and , enforcing split rules that tunnel only managed app while allowing personal apps to bypass the VPN. Best practices for initial split tunneling setup emphasize thorough verification to ensure correct traffic segregation. Administrators should test configurations using tools like to compare paths for tunneled versus excluded destinations, confirming that internal resources route via the VPN while external ones use the direct connection. This testing, combined with route table inspections post-connection, helps identify misconfigurations early and validates the overall split behavior without disrupting user access.

Benefits and Drawbacks

Advantages

Split tunneling conserves by general directly through the user's local , bypassing the VPN server and thereby reducing the load on organizational networks. This approach alleviates the need for all data to traverse centralized gateways, which can otherwise strain resources and increase operational costs for enterprises with limited allocations. By avoiding the and overhead of full tunneling for non-sensitive , split tunneling improves connection speeds and reduces , particularly for bandwidth-intensive activities such as video streaming or large file downloads. Users experience smoother performance in these scenarios because the follows the most direct path to public destinations, rather than detouring through remote VPN servers. Split tunneling enhances user flexibility by allowing seamless access to local network resources, such as printers or shared drives, without requiring a full VPN disconnection or reconfiguration. This capability is especially valuable in environments, where it helps mitigate bottlenecks associated with routing all traffic through a single , enabling multitasking between corporate and personal activities. For large-scale deployments, split tunneling promotes network efficiency by distributing loads more evenly, as only corporate-bound data consumes VPN resources, supporting for organizations with numerous remote users. This selective prevents at central points, optimizing overall throughput without compromising access to essential internal systems.

Disadvantages

Split tunneling can result in inconsistent connectivity due to mismatched decisions, where intended for the secure may inadvertently use the local network path or vice versa. This mismatch often leads to DNS resolution failures, as queries may fall back to the physical 's DNS servers after failing on the VPN , causing unreliable name for internal resources. In heterogeneous environments, such inconsistencies can further complicate access to resources, exacerbating connectivity variability across different network conditions. The implementation of split tunneling introduces significant management complexity, as administrators must define precise rules for to prevent misrouting between the tunnel and local paths. This precision requirement often results in substantial overhead, particularly when updating rules to accommodate changing topologies or needs. Compatibility challenges arise because not all VPN protocols and client devices support split tunneling uniformly, leading to setup difficulties in diverse environments with mixed operating systems or hardware. For example, certain client systems, such as kiosks without sufficient privileges, may fail to handle split effectively, requiring additional workarounds or exclusions. These issues can prolong deployment times and increase operational friction in multi-vendor or multi-device setups.

Security Considerations

Risks

Split tunneling introduces significant cybersecurity vulnerabilities by routing certain traffic outside the protected VPN tunnel, exposing users and organizations to various threats. Non-tunneled traffic remains unencrypted and traverses public networks or local connections directly, making it susceptible to interception by service providers (ISPs), malicious actors, or installed on compromised devices. This can result in the exposure of sensitive , such as credentials or , as attackers may eavesdrop on unsecured connections without the VPN's layer. For instance, on public networks, this direct routing amplifies risks from passive monitoring or active exploits. A primary concern is the bypass of corporate security measures, as split-tunneled traffic evades organizational firewalls, intrusion detection/prevention systems (IDS/), and content filtering tools. Users can thus access potentially malicious websites or services directly via their local connection, introducing or enabling unauthorized without detection by central security infrastructure. This creates blind spots in network visibility, allowing threats like or command-and-control communications to proliferate unchecked. Direct internet paths in split tunneling also heighten susceptibility to and man-in-the-middle (MITM) attacks. Without the VPN's secure DNS resolution or traffic inspection, users are more vulnerable to ISP-level tampering, where domain queries are redirected to fraudulent sites, or to MITM intercepts on untrusted networks that alter . Phishing attempts become easier, as attackers can impersonate legitimate endpoints without the protective routing enforced by full tunneling. Compliance with data protection regulations poses another critical risk, as split tunneling can lead to unauthorized leakage of sensitive information via unprotected routes, violating standards such as GDPR and HIPAA. For organizations handling personal health data or citizen information, this partial exposure may result in regulatory penalties, as it undermines requirements for and auditability of data flows. A notable example is the TunnelCrack discovered in (disclosed in ), which exploits split tunneling configurations in VPN clients to leak traffic outside the tunnel through manipulated routing tables, affecting platforms like , Windows, and macOS, and potentially compromising compliance by revealing unencrypted user data.

Mitigation Strategies

To mitigate the security risks associated with split tunneling, organizations can implement strict enforcement mechanisms that define app-based or domain-based rules, ensuring only authorized bypasses the VPN while integrating endpoint protection platforms for real-time monitoring of split . For instance, (EDR) tools can enforce granular policies by inspecting bypassed for anomalies, such as unauthorized attempts, and blocking malicious activities at the device level. This approach maintains visibility into non-tunneled flows without requiring full tunneling, thereby balancing performance and protection. Hybrid strategies that incorporate zero-trust network access (ZTNA) models further enhance security by providing granular, identity-based controls for resources accessed via split tunnels, verifying users and devices continuously rather than trusting network perimeters. ZTNA solutions, for example, can segment access to specific applications, ensuring that even direct internet-bound traffic adheres to least-privilege principles and preventing lateral movement if a device is compromised. Complementing this, multi-factor authentication (MFA) enforced at VPN entry points adds an additional layer of verification, reducing unauthorized access risks during tunnel establishment. Effective monitoring and auditing involve deploying comprehensive on VPN gateways to capture details of bypassed , such as destination and protocols, enabling detection of policy violations or suspicious patterns. Regular audits of these logs, often integrated with (SIEM) systems, ensure rule accuracy and , allowing organizations to refine split tunneling configurations proactively. This ongoing oversight helps identify misconfigurations that could expose sensitive , maintaining operational integrity without overwhelming resources. Integrating complementary technologies, such as local firewalls on endpoints and secure DNS protocols like (), protects direct paths by filtering outbound traffic and preventing DNS-based attacks that exploit split routes. Local firewalls can enforce device-level rules to block unauthorized connections from non-tunneled traffic, while encrypts DNS queries to mitigate spoofing or risks on untrusted networks. These layered defenses ensure that split tunneling does not create unprotected vectors, enhancing overall resilience.

Variants

Include-Exclude Models

In split tunneling, the include-exclude models represent two primary rule-based approaches for selectively through a VPN versus direct connections. These models rely on predefined policies to determine which network is encrypted and sent via the secure , balancing access needs with resource efficiency. The split-include model, also known as "tunnelspecified" in implementations, routes only explicitly designated traffic through the VPN while directing all other traffic directly to the local gateway. This approach is particularly suited for scenarios requiring minimal corporate , such as remote workers needing connectivity to specific internal resources like file servers or applications without encumbering general web browsing. For example, an organization might configure the model to traffic destined for corporate ranges (e.g., 192.168.1.0/24) while allowing or streaming services to bypass the . In contrast, the split-exclude model, referred to as "excludespecified" in terminology, tunnels all traffic by default except for explicitly excluded destinations, which are routed directly to the local network. This configuration is ideal for environments prioritizing broad protection, such as excluding high-bandwidth activities like video streaming to specific domains (e.g., netflix.com) while ensuring the majority of traffic, including sensitive data, passes through the VPN for inspection and . An example includes excluding local traffic (e.g., 10.0.0.0/24) to maintain access to printers or nearby devices without VPN overhead. Rule implementation in these models typically uses access control lists (ACLs) or equivalent policies to match traffic based on criteria such as subnets, ports, or fully qualified domain names (FQDNs). In configurations supporting IKEv2, an defines the include or exclude criteria; for instance, an extended might permit traffic from a client to a corporate on port 443 for the include model. These rules are applied via group policies, such as split-tunnel-policy tunnelspecified followed by split-tunnel-network-list value acl_name, ensuring compatibility with IKEv2's negotiation for remote access VPNs. GlobalProtect similarly supports include/exclude rules for addresses, FQDNs, or access routes in its portal and gateway configurations. The include model offers significant bandwidth conservation by limiting VPN usage to essential traffic, reducing latency and costs for non-corporate activities, but it carries the risk of overlooking unlisted resources, potentially leading to incomplete access or security gaps if policies are not exhaustive. Conversely, the exclude model ensures comprehensive coverage of traffic for security enforcement, minimizing exposure of sensitive data, yet it imposes higher overhead on the VPN infrastructure due to increased data volume, which can strain bandwidth in large-scale deployments.

Inverse Split Tunneling

Inverse split tunneling is a variant of split tunneling that routes all incoming and outgoing traffic through the VPN by default, with explicit exclusions for specific addresses, domains, or applications to allow direct . This ensures that the vast majority of data flows are encrypted and subject to , while permitting controlled bypasses for performance-critical or low-risk . It is commonly deployed in controlled environments, such as networks, to maintain compliance with standards like NIST SP 800-53, which permits split tunneling only if securely provisioned to prevent unauthorized external connections. Unlike traditional split tunneling, which selectively routes only designated through the VPN to conserve , inverse split tunneling reverses this logic by prioritizing over optimization. All enters the tunnel unless explicitly excluded, thereby minimizing exposure to unmonitored paths and reducing opportunities for by ensuring sensitive communications are inspected at the VPN gateway. This approach is particularly effective in high-security settings where full tunneling might impose excessive latency, but partial direct access must be tightly restricted to trusted destinations. In enterprise implementations, such as ' GlobalProtect, inverse split tunneling is achieved via exclude-route options in access route-based configurations, where rules are defined using access control lists (ACLs) to specify excluded traffic like video streaming or VoIP services. For instance, administrators can exclude IP ranges for to optimize performance while tunneling all other traffic for policy enforcement. This setup aligns with include-exclude models by focusing on exclusions as the primary mechanism. A key application of inverse split tunneling is in scenarios, where it helps protect against lateral movement by channeling most internal traffic through inspected VPN paths, enabling detection of anomalous communications that might otherwise occur directly between compromised endpoints. By defaulting to the tunnel, it limits attackers' ability to pivot across the network without passing through centralized .

Dynamic Split Tunneling

Dynamic split tunneling represents an adaptive approach to VPN traffic routing, where inclusion or exclusion rules for the tunnel are modified in based on contextual factors such as hostname resolution via DNS, user details, or integrated feeds. This allows the VPN client to dynamically resolve fully qualified domain names (FQDNs) to addresses at and adjust routing accordingly, ensuring that traffic to specific services—such as cloud-based applications with frequently changing endpoints—is handled optimally without manual reconfiguration. For instance, domains associated with corporate resources can be automatically included in the tunnel upon resolution, while non-essential traffic bypasses it to maintain performance. Implementation of dynamic split tunneling typically relies on policy attributes and within enterprise VPN platforms, enabling runtime inclusion or exclusion. In solutions like AnyConnect, administrators define custom attributes such as dynamic-split-exclude-domains or dynamic-split-include-domains within group policies on devices like or Firepower Threat Defense (FTD), listing domains in comma-separated format (e.g., office.com,sharepoint.com). The client then performs DNS lookups during the session to populate access control lists (ACLs) dynamically, supporting policies like "tunnel all domains except specified" or vice versa. This mechanism integrates with existing split tunneling frameworks but extends them by processing rules post-authentication, often through management interfaces like Adaptive Security Device Manager (ASDM) or Firepower Management Center (FMC). In practice, dynamic split tunneling enhances responsiveness to evolving network conditions, such as adding routes for newly accessed corporate applications during a session or applying geolocation-based policies to route traffic from high-risk regions through the tunnel for added scrutiny. By leveraging user context—such as role-based group policies—it ensures that, for example, executive users receive stricter tunneling for sensitive domains compared to general staff. This adaptability contrasts with static include-exclude models by allowing ongoing adjustments without session restarts, thereby optimizing bandwidth for remote work scenarios involving tools like 365. Despite its advantages, dynamic split tunneling introduces challenges that necessitate sophisticated management. It requires advanced orchestration tools, such as centralized policy engines in platforms like FMC, to handle DNS resolution overhead and ensure consistent rule application across clients. Potential issues include rule conflicts, where overlapping dynamic and static exclusions lead to unintended traffic leakage, often stemming from syntax errors in domain lists (e.g., missing commas), which can necessitate policy recreation rather than simple edits. Administrators must also monitor for performance impacts from frequent DNS queries, particularly in high-latency environments.

Full Tunneling

Full tunneling, in contrast to split tunneling which routes only specific traffic through the (VPN) while allowing other traffic to access the directly, directs all traffic—including internet-bound packets—through the VPN to ensure comprehensive and centralized enforcement. This approach establishes a secure conduit where the VPN acts as the sole gateway for outgoing and incoming , preventing any direct exposure to public networks and enabling uniform application of such as firewalls and intrusion detection. Compared to split tunneling, full tunneling provides superior by protecting the entire flow from , but it incurs higher due to the additional overhead and consumes more on the VPN as all traverses the tunnel. It is commonly implemented in high-compliance sectors like and healthcare to support requirements for visibility and auditing of communications, helping to mitigate leakage risks. Common use cases for full tunneling include corporate environments requiring total oversight of employee internet activity, such as monitoring for compliance with data protection standards, and implementations in ecosystems, which default to force tunneling when no specific routes are configured to enforce without user-configurable bypasses. Organizations may transition from split to full tunneling during risk assessments when heightened threats, such as advanced persistent threats or regulatory audits, necessitate stronger controls over traffic visibility and encryption, prioritizing security over performance optimizations.

IPv6 Dual-Stack Networking

In dual-stack networking environments, where both IPv4 and IPv6 protocols coexist, split tunneling can be configured to selectively route internal IPv6 traffic through a VPN tunnel while directing external IPv4 and IPv6 internet traffic directly to the public network. This approach addresses key transition challenges during IPv6 adoption, such as ensuring secure access to IPv6-enabled corporate resources without compromising the performance of general internet access. Technically, this involves establishing protocol-specific routing policies, where prefixes associated with the corporate network (e.g., a private range like 2001:db8::/32) are directed via the VPN tunnel, while the default routes for IPv4 (/0) and (::/0) external traffic bypass it. Such configurations often leverage VPN client settings to enable split tunneling, allowing dual-stack tunnels that handle both protocols independently and mitigate issues like (NAT) complications, which are less prevalent in native but can arise in mixed environments. For instance, in SSL VPN implementations, administrators can explicitly enable split tunneling to route specific destinations, such as an internal server, through the secure tunnel. The relevance of dual-stack split tunneling has grown since the widespread rollout in the , particularly following the World IPv6 Launch in 2012, which encouraged permanent IPv6 enablement by major providers. In cloud environments like AWS Virtual Private Clouds (VPCs), Client VPN endpoints support IPv6 alongside split tunneling, enabling users to tunnel only VPC-specific IPv6 traffic (e.g., via Transit Gateway attachments with inner IPv6 addresses) while accessing the broader directly, thus optimizing hybrid network connectivity. A key benefit is the ability to provide seamless access to IPv6-only internal resources without requiring all dual-stack traffic to traverse the VPN, which reduces for public activities and lowers costs in scenarios like or cloud integration. This selective tunneling also enhances security by isolating corporate IPv6 segments while preserving native IPv6 performance for external communications, avoiding the need to disable IPv6 entirely on client devices.

References

  1. [1]
    split tunneling - Glossary | CSRC
    Definitions: A method that routes organization-specific traffic through the SSL VPN tunnel, but routes other traffic through the remote user's default gateway.Missing: authoritative | Show results with:authoritative
  2. [2]
    Configure Secure Client with Split Tunneling on an ASA - Cisco
    Jun 19, 2015 · Split tunnelling is a feature that you can use in order to define the traffic for the subnets or hosts that must be encrypted. This involves the ...
  3. [3]
    VPN routing decisions | Microsoft Learn
    Jan 28, 2025 · Split tunnel configuration. In a split tunnel configuration, routes can be specified to go over VPN and all other traffic will go over the ...
  4. [4]
    Overview: VPN split tunneling for Microsoft 365
    Nov 18, 2024 · Overview of VPN split tunneling with Microsoft 365 to optimize connectivity for remote users.
  5. [5]
  6. [6]
    What Is a VPN Tunnel? - Palo Alto Networks
    VPN split tunneling is a feature that allows a user to route some internet traffic through a secure VPN, while other traffic accesses the internet directly, ...
  7. [7]
    VPN Split Tunneling: What It Is & Pros and Cons - Auvik Networks
    Jun 24, 2024 · Split tunneling means that some of your data is routed through an encrypted VPN connection while other apps and data have direct access to the Internet.Missing: authoritative | Show results with:authoritative
  8. [8]
    Split Tunneling VPN Explained: Balance Security With Performance
    Sep 24, 2024 · Split tunneling is the process of allowing a remote VPN user to access a public network, such as the Internet, at the same time that the user is allowed to ...
  9. [9]
    Split Tunnel Traffic on GlobalProtect Gateways - Palo Alto Networks
    You can configure split tunnel traffic based on an access route, destination domain, application, and HTTP/HTTPS video streaming application.Configure a Split Tunnel... · Configure Split DNS for...
  10. [10]
  11. [11]
    Enable PPTP Split Tunneling - PeteNetLive
    Solution: PPTP Split Tunneling · 1. Windows Key + R > ncpa. · 2. Untick “Use default gateway on remote network” > OK > OK > OK. · 3. WARNING: At this point you may ...
  12. [12]
    Cisco has long history with VPNs - Network World
    Mar 21, 2011 · Our main complaint was the lack of split-tunneling capability, a feature that was quickly added. In 2000: Cisco acquired Compatible Systems and ...
  13. [13]
    How remote work rose by 400% in the past decade - TechRepublic
    Jan 22, 2020 · The report found that the rise of remote work popularity is thanks to the evolution of supporting technologies including powerful mobile devices ...Missing: split tunneling adoption
  14. [14]
    AnyConnect VPN Connectivity Options - Cisco
    Mar 29, 2018 · With dynamic split tunneling, the limit goes to 5000 characters (about 400 domain names) and is only enforced via truncation on the client.
  15. [15]
    CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide, 9.1
    Jun 25, 2014 · Split tunneling lets a remote-access IPsec client conditionally direct packets over an IPsec tunnel in encrypted form or to a network interface ...
  16. [16]
    Implementing Tunnels - Cisco
    The following example shows how to use policy-based routing to route some specific protocol types through the tunnel. In this example, an extended access ...
  17. [17]
  18. [18]
    Configure RA VPN with LDAP Authentication and Authorization for ...
    May 18, 2023 · This document describes how to configure Remote Access VPN with LDAP AA on a Firepower Threat Defense (FTD) managed by a Firepower Management Center.Missing: side | Show results with:side
  19. [19]
    SSL VPN split tunnel for remote user | FortiGate / FortiOS 6.4.0
    This is a sample configuration of remote users accessing the corporate network and internet through an SSL VPN by tunnel mode using FortiClient
  20. [20]
    Enabling split tunnel feature for SSL VPN... - the Fortinet Community!
    Sep 10, 2019 · This article shows the steps to enable the split tunneling feature and route only internal traffic via the tunnel. First configure the SSL-VPN ...Missing: Palo Alto
  21. [21]
    Microsoft Tunnel for Mobile Application Management for iOS/iPadOS
    Sep 9, 2025 · When configuring proxy and split tunneling: ... You can choose to use MAM Tunnel with enrolled devices instead of using MDM Tunnel configurations.
  22. [22]
    Implementing VPN split tunneling for Microsoft 365
    Mar 24, 2025 · In this article, you'll find the simple steps required to migrate your VPN client architecture from a VPN forced tunnel to a VPN forced tunnel with a few ...
  23. [23]
    What is Split Tunneling? Improve Speeds and Secure Critical Data ...
    Split tunneling directs some data through a VPN for security, while the rest goes directly over the open internet. It creates two pathways: VPN and open ...Missing: definition authoritative
  24. [24]
    Split Tunneling VPN Guide - NETGEAR Blog
    Aug 19, 2025 · Enhanced Performance: By directing only the necessary traffic through the VPN, split tunneling can improve your internet speeds, especially for ...
  25. [25]
    Split tunnel vs. full tunnel VPN: Main differences explained
    ### Summary of Advantages of Split Tunneling from the Article
  26. [26]
    Examine the Behavior of DNS Queries and Domain Name Resolution
    May 23, 2024 · This document describes how Cisco OS handles DNS queries and the effects on domain name resolution with Cisco AnyConnect and split or full tunneling.
  27. [27]
    [PDF] NIST SP 800-113, Guide to SSL VPNs
    Disadvantages: ▫ Holes need to be opened in the firewall between the SSL VPN device and internal hosts. ▫ The firewall is bypassed when split tunneling ...
  28. [28]
    [PDF] zscaler-digital-transformation-admin-study-guide.pdf
    Avoid split tunneling or bypassing specific locations, as this can lead to inconsistent routing, performance issues, and a poor user experience. For work ...Missing: disadvantages | Show results with:disadvantages<|control11|><|separator|>
  29. [29]
    Split Tunneling - BlackFog
    Nov 11, 2024 · Split tunneling allows organizations to divide internet connections into two separate streams. This method will route organization specific data through a VPN ...Missing: authoritative | Show results with:authoritative
  30. [30]
    5 VPN split tunneling security risks and how to prevent them
    ### Summary of Split Tunneling Security Risks
  31. [31]
    Split Tunneling: What Is It and How Can It Help You? - LIVEcommunity
    Jun 29, 2021 · Split tunneling is a computer networking concept that allows users to access different security domains at the same time.
  32. [32]
    What is VPN Split Tunneling? Explained in Simple Terms
    Aug 20, 2025 · VPN with split Tunneling can route certain traffic outside the secure VPN tunnel, potentially violating regulatory requirements for data ...
  33. [33]
    What to Know About Split Tunneling - IntrapriseHealth - 2024
    Sep 16, 2019 · Utilizing a split tunnel can also increase the possibility of data exfiltration out of the organization. If any controls are in place to prevent ...Missing: GDPR | Show results with:GDPR
  34. [34]
    TunnelCrack: Widespread design flaws in VPN clients
    ### Summary of TunnelCrack Exploits on Split Tunneling in VPNs
  35. [35]
    [PDF] Leaking VPN Client Traffic by Abusing Routing Tables - Publications
    Split tunneling is also used to specify that only selected apps will (not) ... In both of our attacks, we assume that the encrypted VPN tunnel is not vulnerable to ...
  36. [36]
  37. [37]
    Securing the distributed enterprise for the long-term - Cloudflare
    In addition, split-tunnelling VPN traffic means remote devices are no longer protected by perimeter-based defenses, increasing their risk of compromise via ...
  38. [38]
    How to Monitor VPN Split Tunneling and Remote Endpoints with ...
    Apr 15, 2020 · Implement VPN split tunneling to alleviate VPN capacity constraints without sacrificing security; Monitor and further optimize traffic you put ...
  39. [39]
    What Is DNS Tunneling? [+ Examples & Protection Tips]
    You'll want to detect tunneling attempts early, mitigate suspicious traffic, and prevent known abuse paths from being exploited. Here's how to tackle the issue ...
  40. [40]
    CLI Book 3: Cisco Secure Firewall ASA VPN CLI Configuration ...
    Sep 26, 2025 · DHCP intercept is supported for IKEv2 to allow Windows to do split-tunneling. This feature only works with IPv4 split-tunneling attributes.
  41. [41]
    Configure a Split Tunnel Based on the Access Route
    You can set up a split tunnel to allow remote users to access the internet without going through the VPN tunnel.
  42. [42]
    VPN split tunneling explained - GoodAccess
    VPN split tunneling routes traffic through two tunnels: one encrypted VPN tunnel, and another directly to the internet via your local ISP.Missing: authoritative | Show results with:authoritative
  43. [43]
    Splitting Hairs on Split Tunneling - Fractional CISO
    Mar 25, 2021 · Split tunneling reduces the usage of limited VPN bandwidth. Only traffic that needs to be encrypted goes through the VPN, so other traffic does not use up VPN ...<|control11|><|separator|>
  44. [44]
    What is VPN Split Tunneling? - Fortinet
    VPN split tunneling allows traffic to be routed through a VPN and a local network at the same time. Learn how to encrypt data while conserving bandwidth.
  45. [45]
    Split tunneling behavior on the GlobalProtect client
    May 10, 2021 · The following are different access route-based and domain-based split tunneling options. Please be aware that the traffic behavior with the route-based option ...Missing: inverse | Show results with:inverse
  46. [46]
    Configure AnyConnect Dynamic Split Tunnel on FTD Managed by ...
    This document describes how to configure AnyConnect Dynamic Split Tunnel on Firepower Threat Defense (FTD) managed by Firepower Management Center.<|separator|>
  47. [47]
    Dynamic Split Tunneling in AnyConnect VPN - Cisco Community
    Tunnel All Networks—All exclusions from the VPN tunnel are dynamic. Exclude Specific Networks—Dynamic exclusions are added to preconfigured static ones. Include ...
  48. [48]
    Configure ASA/AnyConnect Dynamic Split Tunneling - Cisco
    This document describes how to configure AnyConnect Secure Mobility Client for Dynamic Split Exclude Tunneling via ASDM.
  49. [49]
    Full tunnel vs split tunnel VPN: Key differences - Scalefusion Blog
    Aug 19, 2025 · Strongest encryption and data control. Simplifies compliance audits. Prevents data exfiltration from unmanaged apps. Why should you rethink ...
  50. [50]
    Enhancing VPN performance at Microsoft - Inside Track Blog
    Jan 26, 2025 · Split tunneling allows only the traffic destined for the Microsoft corporate network to be routed through the VPN tunnel, and all internet ...Missing: mitigating | Show results with:mitigating
  51. [51]
    What is VPN Split Tunneling ? | Perimeter 81 - Check Point
    VPN split tunneling enables you to route some of your device traffic through the encrypted VPN tunnel and the rest of the traffic gets routed through a ...How Does VPN Split... · Different Types of VPN Split... · How To Enable VPN Split...
  52. [52]
    About forced tunneling for site-to-site - Azure VPN Gateway
    Mar 31, 2025 · Forced tunneling lets you redirect or "force" all Internet-bound traffic back to your on-premises location via S2S VPN tunnel for inspection and auditing.
  53. [53]
    How Does a VPN Work? - Palo Alto Networks
    Split tunneling allows for direct internet access by the user's device for noncorporate traffic. This conserves bandwidth on the corporate network. However, ...
  54. [54]
    About Azure Point-to-Site VPN connections - Microsoft Learn
    Jul 9, 2025 · Secure Socket Tunneling Protocol (SSTP), a proprietary TLS-based VPN protocol. A TLS VPN solution can penetrate firewalls, since most ...How Are P2s Vpn Clients... · Which Gateway Skus Support... · What Ike/ipsec Policies Are...
  55. [55]
    How to prevent IPv6 VPN breakout - Network World
    Oct 15, 2019 · Most corporate VPNs enforce what is called no split-tunneling to enhance security by forcing all IPv4 connections to traverse the VPN. With no ...
  56. [56]
    Dual stack IPv4 and IPv6 support for SSL VPN
    Dual stack IPv4 and IPv6 support for SSL VPN servers and clients enables a client to establish a dual stack tunnel to allow both IPv4 and IPv6 traffic to pass ...
  57. [57]
    Always On VPN and IPv6 | Richard M. Hicks Consulting, Inc.
    Jan 22, 2024 · When split tunneling is enabled, Microsoft Intune will not accept IPv6 routes using the standard IPv6 subnet prefix of /64. The UI complains ...
  58. [58]
    World IPv6 Launch Solidifies Global Support for New Internet Protocol
    Jan 17, 2012 · Web companies participating in World IPv6 Launch will enable IPv6 on their main websites permanently beginning 6 June 2012. Inaugural ...
  59. [59]
    Split-tunnel on AWS Client VPN endpoints
    You can use a split-tunnel Client VPN endpoint when you do not want all user traffic to route through the Client VPN endpoint.
  60. [60]
    [PDF] Dual Stack and IPv6-only Amazon VPC Reference Architectures
    Jun 23, 2022 · One of the VPN tunnels is configured with inner IPv6 addresses, and routes IPv6 traffic. This enables you to maintain IPv6-only in on-premises ...