By default, all traffic goes through
the VPN tunnel. You select split tunneling so that the VPN client sends only
the traffic destined for the secured network through the VPN tunnel. The secured
network consists of the addresses specified as accessible networks.
When split tunneling is active, group-based policies apply to the internal NIC only. For connections from inside of the firewall, group-based policies do not apply to traffic to external resources or resources local to the network; the traffic is not encrypted.
|If you decide to not use split tunneling and turn it off, any packet destined for a network not appearing in the specified allowed list is dropped.|
Return to Top
Copyright © 1996 - 2005 WatchGuard Technologies, Inc. All rights reserved.