Split tunneling is the process of allowing a remote VPN user to access a public network, such as the Internet, at the same time that the user is allowed to access resources on the VPN.
When you set up split tunneling, only traffic that is destined for the subnets on your Internal LAN will go through the encrypted VPN tunnel. Other traffic will go through your employee's regular internet traffic. By using the user's local internet for non-VPN traffic, split tunneling avoids overloading the company network.
Split tunneling helps balance two key priorities of any business: performance and security. It can benefit virtually any company that needs to increase their remote employment capabilities without decreasing productivity. And split tunneling doesn’t have to be complicated: with the right VPN, setup is fast and easy, and you can continue business as normal, regardless of the situation.
For a helpful overview of internet access configuration as it relates to CloudConnexa, check out this guide.
VPN encryption is the process of converting data into an unreadable format to protect it from unauthorized access as it travels between your device and the VPN server. Encryption methods vary depending on the protocols and ciphers used by the VPN provider, but the goal is always the same: to secure your data and ensure privacy.
Below are key VPN encryption methods:
Encryption is crucial in maintaining data privacy, especially in a world where online threats and surveillance are prevalent. VPN encryption methods, such as symmetric and asymmetric encryption, play a key role in securing data during transmission. Here’s why encryption matters for VPNs:
Different VPN protocols use various encryption methods, and each has its strengths and weaknesses. Here’s a comparison of common encryption protocols:
Protocol |
Encryption Method |
Strengths |
Weaknesses |
Best For |
OpenVPN |
AES-256 (encryption), RSA-2048 (key exchange), SHA-256 (integrity) |
Highly secure, supports Perfect Forward Secrecy (PFS), open-source, highly configurable |
Slower than other protocols due to strong encryption |
High-security needs, such as business networks or protecting sensitive personal data |
IKEv2/IPSec |
AES-256, combined with IPSec for secure tunneling |
Excellent speed and stability, especially on mobile networks, supports seamless reconnection |
Slightly less configurable than OpenVPN |
Mobile devices or users who need quick reconnections when switching between networks |
WireGuard |
ChaCha20 (encryption), Poly1305 (authentication) |
Lightweight, faster than OpenVPN and IKEv2, simpler codebase, efficient |
Still relatively new, less widely audited for security |
High-speed connections, low-resource devices, general users who want strong security with minimal performance loss |
L2TP/IPSec |
AES with IPSec for secure tunneling |
Easy to set up, more secure than PPTP |
Slower due to double encapsulation, older and less secure than newer protocols |
Compatibility and ease of setup, not focused on high-security needs |
PPTP |
MS-CHAP v2 authentication, MPPE encryption |
Fast, simple to set up, widely supported |
Obsolete, highly vulnerable to security exploits, considered insecure |
Speed is more important than security, such as accessing geo-restricted content (not recommended for privacy) |
No two protocols are the same; while each has its strengths and weaknesses, choosing the right protocol depends on the balance between security, speed, and specific use cases.
The key difference between split tunneling and full tunneling in a VPN lies in how internet traffic is routed through the VPN connection. Full tunneling encrypts all traffic and routes it through the VPN, offering maximum security but often at the cost of slower internet speeds. In split tunneling, only selected traffic is encrypted. This provides better performance and bandwidth management but poses higher security risks for unencrypted traffic.
Here’s a quick visual comparison of the two options:
Feature |
Full-Tunnel VPN |
Split-Tunnel VPN |
Security |
Encrypts ALL internet traffic |
Encrypts only selected traffic (configurable) |
Data Leakage |
Minimized risk |
Potential exposure of non-VPN traffic |
Privacy |
Enhanced online anonymity |
IP address exposed for non-VPN traffic |
Performance |
Slower due to additional encryption overhead |
Faster due to bypassing VPN for some traffic |
Local Network Access |
Limited (may require additional configuration) |
Maintains access to local network resources |
Use Cases |
Ideal for high-security environments, public WiFi |
Balancing security with performance, accessing local resources |
Because split tunneling allows users to route some traffic through a VPN while sending the rest through their local internet connection without encryption, this can impact both network performance and security.
There are many real-world cases where split tunneling offers clear benefits by balancing security and performance.
In corporate environments, split tunneling is often used to route work-related traffic (e.g., accessing corporate servers, databases, or internal applications) through the VPN while non-work-related traffic (e.g., streaming music, browsing the internet) is routed through the regular internet. This ensures secure access to the company network while maintaining high performance for non-essential tasks.
If a user is connected to a VPN but wants to access local devices like printers, network storage, or smart home devices on the same network, split tunneling allows local traffic to bypass the VPN. This prevents disruptions in local network services while ensuring that sensitive data is still routed securely.
Downloading large files (e.g., operating system updates or software patches) over a VPN can strain both the VPN server and the user's bandwidth, slowing down both the download and other activities. With split tunneling, users can download updates via their normal internet connection while continuing to route critical data (e.g., VoIP calls, remote desktop sessions) through the VPN.
In split tunneling, secure connections balance privacy and performance. Sensitive activities (e.g., banking, emails) are encrypted, while non-sensitive tasks bypass the VPN for speed. This saves bandwidth for critical data and improves overall network efficiency. Customization allows users to decide which traffic uses secure connections, protecting sensitive information without sacrificing performance.
Secure connections ensure privacy by encrypting data, preventing unauthorized access. They protect against man-in-the-middle attacks, especially on public networks, and prevent ISPs from tracking or logging user activity. For businesses, secure connections safeguard customer data and intellectual property, reducing the risk of data breaches.
Maintaining a secure connection is essential in a variety of situations. In a remote work/hybrid work scenario, employees accessing corporate networks remotely need secure VPN connections to protect sensitive data from hackers. Additionally, travelers and remote workers using public WiFi rely on VPNs to protect personal information from cybercriminals. And as we’ve seen in so many healthcare-related cyberattacks of late, secure VPN connections for healthcare organizations are vital for protecting patient data and ensuring compliance with regulations like HIPAA.
Secure connections in split tunneling maintain speed while ensuring that sensitive data is protected through encryption, reducing the risk of privacy breaches and cyberattacks.
Split tunneling offers significant advantages for businesses, balancing security and efficiency. By allowing users to route specific traffic through a VPN while other traffic bypasses it, organizations can optimize performance, conserve bandwidth, and ensure smooth access to critical resources.
One of the key benefits of split tunneling is the ability to conserve bandwidth. In a traditional VPN setup, all traffic is routed through the VPN server, potentially leading to congestion and slowdowns. However, with split tunneling, businesses can implement strategies that reduce unnecessary traffic while maintaining security for sensitive data.
Organizations can configure their VPN to ensure that only critical traffic, such as corporate emails, file transfers, or sensitive application usage, is routed through the VPN. Meanwhile, non-essential traffic like streaming videos, social media, or software updates can bypass the VPN, conserving bandwidth for more important tasks.
Another effective strategy is using data compression techniques within the VPN configuration. By compressing data before it is sent through the VPN tunnel, organizations can reduce the amount of bandwidth used, allowing more data to be transmitted efficiently.
To manage bandwidth effectively, companies should regularly monitor network traffic to identify bottlenecks. Setting up policies to control how traffic is routed and prioritizing critical tasks ensures that bandwidth is allocated where it’s needed most. Additionally, businesses can implement Quality of Service (QoS) policies to prioritize business-critical traffic.
Split tunneling offers the unique advantage of allowing employees to access local network resources, such as printers, storage devices, and intranet applications, without disconnecting from the VPN. This is especially useful in scenarios where workers need simultaneous access to secure corporate networks and local devices. Here a couple examples:
Being able to access local resources while maintaining a secure VPN connection ensures that employees don’t have to toggle between networks or sacrifice security to access essential tools. For instance, a remote worker might need to print documents on a local printer while staying connected to a VPN to access company files. Split tunneling ensures that both tasks can be accomplished simultaneously, leading to improved productivity.
By enabling local resource access, split tunneling ensures that workflow is uninterrupted. Employees don’t face delays or technical issues when switching between local and VPN-connected tasks, making it easier to collaborate, share files, and work efficiently.
Another major benefit of split tunneling is improved internet speed for certain applications. By allowing non-sensitive traffic to bypass the VPN, split tunneling reduces the load on the VPN server, allowing high-bandwidth tasks to run smoothly without compromising essential security protocols.
Since encrypted traffic requires more processing power and bandwidth, routing all traffic through a VPN can slow down applications that don’t need encryption, like video calls, streaming, or large downloads. Split tunneling alleviates this by allowing these bandwidth-heavy applications to use the direct internet connection, resulting in faster speeds.
The speed improvements in split tunneling depend on several factors, including the bandwidth of the direct connection, the processing load on the VPN server, and how well the traffic is distributed. By reducing the data passing through the VPN, there is less strain on the server, which can lead to noticeably faster performance for both VPN-protected and non-protected tasks.
While split tunneling improves performance, it can introduce security risks. Addressing these is key to maintaining a secure network.
Split tunneling can inadvertently expose users to vulnerabilities when traffic bypasses the VPN, making it susceptible to interception on untrusted networks. This puts data integrity and confidentiality at risk.
By allowing certain traffic to travel outside the VPN, organizations risk exposing sensitive information. Attackers could exploit unsecured connections, especially in public WiFi settings, to steal data or inject malware. Unencrypted traffic, especially when routed through non-secure channels, may be intercepted or altered.
Ensuring strong endpoint protection is essential in split tunneling setups, as endpoints are often the first target of cyberattacks. By reinforcing device security, organizations can minimize the risks associated with split tunneling.
Devices must be equipped with up-to-date antivirus software and properly configured firewalls to protect against malicious traffic that may bypass the VPN. Firewalls can block incoming threats, while antivirus software scans files for potential malware or viruses.
In split tunneling configurations, robust data encryption is crucial for protecting sensitive traffic. Even when only a portion of traffic is routed through the VPN, it is essential that the encrypted traffic remains secure and uncompromised. Here are some key points to consider:
To optimize split tunneling and reduce risks, careful planning and configuration are essential. Here are ten best practices we recommend to get you started:
Policy-based routing allows organizations to control traffic flows based on predefined criteria, giving them more flexibility in how split tunneling is implemented.
Policy-based routing enables businesses to prioritize VPN traffic based on predefined criteria like application type, source (IP address), or destination. For instance, traffic related to corporate databases or financial applications can be automatically routed through the VPN, while other traffic bypasses it.
One example of a common rule is to include routing only corporate network traffic through the VPN while allowing internet-bound traffic to take a direct path.
VPN applications often offer app-based configuration options for split tunneling, allowing end users and administrators to specify which apps should use the VPN and which can bypass it.
For end users, app-based split tunneling offers convenience by automatically routing only necessary traffic through the VPN. For administrators, it allows granular control over which applications are protected, ensuring that sensitive apps always use encrypted tunnels.
URL-based exclusions can be used to optimize split tunneling by allowing organizations to specify certain websites or domains that can bypass the VPN.
For non-sensitive sites, URL-based exclusions can improve speed by allowing traffic to avoid the encryption process. This is particularly useful for high-bandwidth tasks like video streaming or accessing public websites.
While URL-based exclusions can boost performance, it’s important to ensure that no sensitive traffic is excluded from the VPN tunnel. Organizations should carefully vet URLs before adding them to the exclusion list.
The Internet Access setting can be configured directly on individual User Groups, Hosts, and Networks. Still, the Access > Internet section allows you to view, filter, search, and change the Internet access settings of all User Groups, Networks, and Hosts in one central place. To change the internet access settings from this central place, follow the steps below:
In terms of performance improvements, split tunneling provides a major win, especially for remote workers. This setup frees up bandwidth for non-sensitive tasks, allowing your entire team to work securely and efficiently.
By using split tunneling, remote workers can securely access company files via the VPN while simultaneously using local network resources.
As such, you’re likely to see enhanced collaboration across remote teams. Secure file access through a VPN allows remote teams to collaborate seamlessly by ensuring that sensitive files can be safely accessed, shared, and updated in real-time without risking exposure to unauthorized users.
In addition, secure file access helps organizations meet regulatory compliance requirements, such as GDPR or HIPAA, by ensuring that sensitive data, such as customer records or financial information, is always transferred over encrypted channels, even when split tunneling is enabled.
Split tunneling also allows workers to access local content or stream media without putting a strain on the VPN, making it ideal for balancing work and leisure activities.
Remote employees who need access to local area network (LAN) devices, such as printers or local servers, also benefit from split tunneling. It allows them to connect to these devices without disconnecting from the VPN — again, enhancing efficiency while ensuring security.
Selecting the right VPN solution that supports split tunneling, while also offering robust security features, is critical for organizations looking to optimize performance without compromising security. A well-designed VPN can strike the perfect balance between efficiency, flexibility, and protection, ensuring that both critical and non-critical traffic is handled appropriately.
Integrating a zero trust architecture ensures that split tunneling is part of a broader security strategy where no traffic is inherently trusted, further protecting data.
With the rise of zero trust security models, selecting a VPN that supports or integrates with zero trust architecture can enhance overall network security. Zero trust principles require continuous authentication and verification of every user, device, and piece of data, reducing the risk posed by unsecured traffic in split tunneling configurations. VPNs that are compatible with zero trust environments ensure that security is maintained, even for traffic routed outside the encrypted tunnel.
It's crucial to select a VPN that integrates seamlessly with existing endpoint security tools such as firewalls, antivirus software, and intrusion detection systems. This integration provides a layered defense, ensuring that even traffic bypassing the VPN is monitored and protected at the device level. Look for VPN solutions that offer endpoint security features as part of their package or that are compatible with industry-standard security solutions.
Choose VPNs with advanced security features, such as policy-based routing and app-based configuration, to maximize the benefits of split tunneling.
OpenVPN equips users of both Access Server and CloudConnexa to take advantage of the benefits of split tunneling.
Check out this tutorial on using CloudConnexa for remote access, complete with split tunneling guidance. For detailed instructions on setting up split tunneling on your Access Server, see our resource: Understanding how split tunneling works with OpenVPN Access Server.
A: By excluding some traffic from the VPN, split tunneling exposes that traffic to potential interception on untrusted networks. This is a concern for sensitive data. Such data should always be routed through the VPN to minimize risk.
A: Split tunneling can improve performance for tasks that don't require the VPN, like accessing local network printers or file servers. This can boost productivity and be beneficial for remote workers.
A: Most modern VPN clients offer split tunneling functionality. However, configuration options may vary between clients, requiring some IT management effort.
OpenVPN customers love their experience with our products, and we have the G2 awards to prove it.
An Access Server user in education management put it this way:
“We found OpenVPN to be a reliable and scalable VPN solution with good security features. The user interface is web based and easy to use. We found the split tunneling feature very useful not having to route all traffic back through our network.”
And a CloudConnexa user agrees that it was “extremely easy to enable things like tunneling.”
So why wait? Sign up for free to get started with Access Server and CloudConnexa. You can also sign up for a product demo here.
Looking for less commitment? We get it! Check out our interactive product demo to see what our platform looks and feels like before you sign up.