Stopping VPN split tunnelling

Posted on 2015-01-05
Last Modified: 2015-01-08
I have a client which has a draytek vigor 2860 firewall router which is setup for VPN connections.

They have had an IT audit (by their major client) and they must implement controls to prohibit split tunnelling during remote access. The problem is that i need to access their network via VPN on a PC. I understand that by default split tunneling is turned off when creating a vpn connection in windows and usually you would control these setting and lock them down via group policy. My machine isn't part of their network so it cannot be controlled, so i could just enable split tunnelling if i wanted. Is there a VPN client or a setting on the draytek router, where i could lock down VPN settings (prohibit split tunnelling) or use some sort of software to have these settings included and not easily changed by a user on a vpn client?? Or do i need to implement another solution?

Thanks for your help.

Question by:RiccardoQuest
  • 3
  • 3
LVL 50

Expert Comment

by:Don Johnston
ID: 40531411
Split tunneling is configured on the VPN concentrator (or firewall or whatever device you  are establishing the tunnel to).  It is not configured on the remote access computer.

Is there a reason you want split tunneling?

Author Comment

ID: 40531417
i don't want split tunnelling, i want a method of locking down the client machine settings so they cannot change their settings on their local machines and then enable split tunnelling?
LVL 50

Expert Comment

by:Don Johnston
ID: 40531423
Clients can't choose between split tunneling and hair pinning.  That's determined on the other end of the tunnel.
Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.


Author Comment

ID: 40531434
i understand that if you follow the steps in the below link, that will enable a split tunnel (at the client end) which could have adverse effects on the other network (the one connected via VPN). These settings are all controlled at the client machine.
LVL 50

Accepted Solution

Don Johnston earned 500 total points
ID: 40531655
Okay, I see where you're going now. Sorry.

The thing is, that there are many ways of circumventing a VPN which is not configured for split tunneling.  And most of those methods can not be prevented from the HQ side unless they have control over the host.  For example, if it's a company PC, you can lock it down to prevent changes to the configuration or installation of applications which could bypass the "no split tunnel" rules.

If not, there's not much you can do to enforce that.  For example, on my laptop, I have a wired and wireless NIC.  If I use the Cisco VPN client to establish a VPN over the wired NIC, But I can still browse the internet over the wireless NIC.  So having split tunneling disabled isn't stopping me from having my own, unsecured, internet connection.

Author Comment

ID: 40538180
Thanks for your help! I now understand that to fully prevent split tunneling, restrictions need to be applied to the host machine stopping additional hardware being added as well as restricting VPN connectivity setting using Group Policies.

Featured Post

Network it in WD Red

There's an industry-leading WD Red drive for every compatible NAS system to help fulfill your data storage needs. With drives up to 8TB, WD Red offers a wide array of solutions for customers looking to build the biggest, best-performing NAS storage solution.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Secure Connection Failed - Sonicwall FW 1 58
integration of incident management and linking to CMDB 1 20
Viber-Only Restriction 6 26
Network access 4 23
Let’s list some of the technologies that enable smooth teleworking. 
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now