What is the split tunneling?

Split tunneling is a configuration of network architecture, where the operation is focused on the client Virtual Private Network (VPN) to the business network and also via the Internet connection gate. Internet and company network is accessible at the same time. One application includes the option to go to the Internet when using a network printer from the same computer. Concerns about this concept of computer networks have been worried about security, but with various safety steps and policy controls, tunneling or some information about the network access can be divided. The router provides an Internet connection for each computer and device on the network. Access to the local network requires connection to the local network (LAN), but because it is necessary to find the shortest path to resources, the system turns to the gate if it cannot find the LAN target. Any request is sent via the Internet without the address of the Internet computer log (IP) and the return signal passes through the router and back to the computer.

The interest in the division of tunneling is that corporate data can be leaked to places that could pose a security risk. The websites that have access to data from computers can be blocked by a network firewall or are programmed to a list that prevents users from accessing such a site. An employee working from home has access to internet and network, but is usually not limited by the company firewall. When tunneling is divided, the company's principles can be set to apply to the home machine to extend the network access control.

6 If the packet comes from unrecognized or blocked addresses, it will not be allowed to the network. The protocols can also be filtered according to their identification from what address or port they come from, and the connection from which they arrive. You can program a profile to determine the rules for providing information in.

The policies can also be set to manage the split tunnels. Security of a computer network in mcan be endangered by malicious software that passes. Documents can be accessed in this way and be a tunnel to another network. Applications, protocols and ports can be automatically connected via the policy and configuration of the split tunneling can be set when the prohibited application is running.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?