Overview of VPN split tunneling


To understand split tunneling, first a brief overview of VPN is given: When a VPN connection is established to a remote network, there is a secure tunnel created. Your network communications, also known as network traffic, are sent through this tunnel and cannot be viewed by third parties.

A split tunnel means that only network traffic bound for the particular organization for which you are using the VPN will be sent through the VPN tunnel. All other network traffic will be sent through your normal Internet connection outside the VPN tunnel. For enterprise VPN services like TTUnet VPN, this is ideal in almost all cases.

Turning off split tunneling would mean that all network traffic is sent through the VPN connection tunnel. This means that if you establish a VPN tunnel to an organization's network from your home, then attempt to access https://www.google.com, the request will not go directly from your ISP's network to Google; instead it will go through the VPN tunnel to the organization's network and then to Google.

Sending all network traffic through a VPN connection is not ideal in most cases. It creates an unnecessary burden on the network you are connecting to via the VPN and may adversely affect network speed for the other network users. It can also result in unexpected problems in accessing some services, and it adds overhead to your connections to those services.

TTUnet VPN uses a split tunnel by default. This cannot be changed in the GlobalProtect settings on the client end.