2 min read

What is Split Tunneling and How Does It Work?

Vlad CONSTANTINESCU

February 15, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
What is Split Tunneling and How Does It Work?

VPN is gaining popularity nowadays as casual Internet users grow more concerned about online privacy. A trustworthy VPN in today’s climate is paramount to keep your online whereabouts away from prying eyes.

All VPN services share two important advantages that keep your privacy safe:

  1. A network of private servers where the VPN directs your traffic
  2. Solid encryption technology

Without either one, VPN would probably be quickly surpassed by other privacy services, such as proxy servers or HTTPS. And, aside from these critical features that ensure their functionality, modern VPN solutions also incorporate additional features for convenience.

Some now include a kill switch, which we previously discussed, and split tunneling. Although it sounds convoluted, we can assure you that split tunneling is not only a handy feature, but a simple one, too.

What is split tunneling?

VPN services protect your privacy by redirecting your traffic away from its usual ISP-assigned route. They also encrypt that traffic, so even if someone did intercept it, they couldn’t make anything of it.

These tools create a virtual network adapter on your computer and use it to connect to a virtual private network (i.e., a VPN).

It’s worth mentioning that the VPN connection supersedes your regular, unencrypted one; in simpler terms, it stacks on top of it, so online entities no longer detect you on your regular (home or work) network.

Although that sounds like good news, if you have shared resources (documents, devices, or services) on your local network, connecting to a VPN means they’ll become inaccessible to you.

For instance, if you have a shared folder on your home network, you may no longer be able to access it while you’re connected to the VPN, since you’re technically not on your home network anymore.

The same goes for network printers, mail servers, multimedia servers, and everything else you host locally.

That’s where split tunneling comes in: this feature essentially splits your connection, letting you choose which apps go through the VPN’s encrypted tunnel and which don’t.

Why should you use split tunneling?

Although the example above is among the most common, split tunneling is handy for many other reasons, namely:

  • Preserve Bandwidth– VPN traffic is encrypted, so it’s transmitted slower than regular, unencrypted traffic. Enabling split tunneling can enhance speed, which is paramount if the network has bandwidth restrictions.
  • Use LAN Resources – If you need to access network resources such as shared folders, devices or services, doing so is impossible if your entire traffic is routed through a VPN tunnel. Split tunneling lets you exclude certain apps or services from being tunneled, letting you access LAN resources.
  • Enhanced Security for Remote Workers – Split tunneling lets employees work remotely with sensitive resources securely through an encrypted connection while also letting them access other non-critical Internet resources faster through their ISP connection.
  • Flexibility – While traveling, you can use split-tunneling to access content in your home country and still access potentially geo-restricted local websites by excluding certain apps from the encrypted VPN tunnel (i.e., your web browser).

Bitdefender VPN includes split tunneling

Sturdy VPN solutions, such as Bitdefender VPN, embrace split tunneling, increasing the convenience and flexibility of the product.

To enable it, access the Settings menu, then flip the Split tunneling switch on. Once you’ve toggled the feature, you’ll also need to configure the websites that will bypass your VPN connection.

We recommend keeping the list as light as possible and only excluding websites from the VPN tunnel if absolutely necessary.

tags


Author



Right now

Top posts

What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read
Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

Bitdefender Reveals the Top Cyber Threats Faced by Consumers in 2021

June 22, 2022

1 min read
Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

Scam alert: Cybercrooks use shady investment domain to scam keen investors out of money and data

May 24, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Is VPN Traffic Easy to Monitor? Is VPN Traffic Easy to Monitor?
Vlad CONSTANTINESCU

April 01, 2022

2 min read
Can VPN Protect You from Being Hacked? Can VPN Protect You from Being Hacked?
Vlad CONSTANTINESCU

March 29, 2022

3 min read
Can VPN Protect You from DoS and DDoS Attacks? Can VPN Protect You from DoS and DDoS Attacks?
Vlad CONSTANTINESCU

March 25, 2022

3 min read