This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Split tunneling" – news · newspapers · books · scholar · JSTOR(March 2020) (Learn how and when to remove this message)
Split tunneling is a computer networking concept which allows a user to access dissimilar security domains like a public network (e.g., the Internet) and a local area network or wide area network at the same time, using the same or different network connections. This connection state is usually facilitated through the simultaneous use of a LAN network interface controller (NIC), radio NIC, Wireless LAN (WLAN) NIC, and VPN client software application without the benefit of an access control.
For example, suppose a user utilizes a remote access VPN software client connecting to a campus network using a hotel wireless network. The user with split tunneling enabled is able to connect to file servers, database servers, mail servers and other servers on the corporate network through the VPN connection. When the user connects to Internet resources (websites, FTP sites, etc.), the connection request goes directly out the gateway provided by the hotel network. However, not every VPN allows split tunneling. Some VPNs with split tunneling include Private Internet Access (PIA), ExpressVPN, Surfshark and NordVPN[1]
Split tunneling is sometimes categorized based on how it is configured. A split tunnel configured to only tunnel traffic destined to a specific set of destinations is called a split-include tunnel. When configured to accept all traffic except traffic destined to a specific set of destinations, it is called a split-exclude tunnel.[2][3][4]
^Long, Moe (July 22, 2021). "Best VPN for Split Tunneling". Tech Up Your Life. Retrieved October 21, 2021.
^Jeffery, Eric (June 19, 2020). "VPN Split-Tunneling – To Enable or Not To Enable". Infosecurity Magazine. Retrieved October 19, 2020.
^Mackie, Kurt (March 26, 2020). "Microsoft Touts Split Tunneling with VPNs To Support Remote Workers -- Redmondmag.com". Redmondmag. Retrieved October 19, 2020.
^Michael Cooney. "Cisco, others, shine a light on VPN split-tunneling". Network World. Retrieved October 19, 2020.
Splittunneling is a computer networking concept which allows a user to access dissimilar security domains like a public network (e.g., the Internet)...
Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms. Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point...
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery...
Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an...
Sharing. Other configuration options include the transport protocol and splittunneling. PureVPN offers users the option to turn on the "VPN Hotspot", allowing...
TunnelBear is a public VPN service based in Toronto, Canada. It was created by Daniel Kaldor and Ryan Dochuk in 2011. In March 2018, TunnelBear was acquired...
OpenVPN uses SSL protocol which is generally more secure than Layer 2 Tunnel Protocol's PPTP. In a review done by PC Magazine, it was concluded that...
between May 19, 2022, and February 7, 2024, affecting those using the splittunneling feature. ExpressVPN has released apps for Windows, macOS, iOS, Android...
locations. In its applications, Surfshark uses IKEv2, OpenVPN and WireGuard tunneling protocols. All data transferred via Surfshark servers is encrypted using...
uses DTLS to form a tunnel between private and public/provider compute environments. ZScaler tunnel 2.0 uses DTLS for tunneling. F5 Networks Edge VPN...
mountain that connects the coastal and continental parts of the Split-Dalmatia County. The tunnel is 4,248 metres (13,937 ft) long, while the western, service...
protocol, which aims for better performance than the IPsec and OpenVPN tunneling protocols. According to tests performed by Wired UK, NordLynx produces...
Junichi (October 2005). "Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency". In Atiquzzaman, Mohammed; Balandin...
Hamachi currently handles tunneling of IP traffic including broadcasts and multicast. The Windows version also recognizes and tunnels IPX traffic. Each client...
VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often...
implemented in a host-to-host transport mode, as well as in a network tunneling mode. In transport mode, only the payload of the IP packet is usually...
several tunneling technologies, depending on the configuration of the network the client is connected to. The client can use 6to4, Teredo tunneling, or IP-HTTPS...
to be smaller and better performing than IPsec and OpenVPN, two common tunneling protocols. The WireGuard protocol passes traffic over UDP. In March 2020...