Stopping VPN split tunnelling

I have a client which has a draytek vigor 2860 firewall router which is setup for VPN connections.

They have had an IT audit (by their major client) and they must implement controls to prohibit split tunnelling during remote access. The problem is that i need to access their network via VPN on a PC. I understand that by default split tunneling is turned off when creating a vpn connection in windows and usually you would control these setting and lock them down via group policy. My machine isn't part of their network so it cannot be controlled, so i could just enable split tunnelling if i wanted. Is there a VPN client or a setting on the draytek router, where i could lock down VPN settings (prohibit split tunnelling) or use some sort of software to have these settings included and not easily changed by a user on a vpn client?? Or do i need to implement another solution?

Thanks for your help.

Riccardo
RiccardoQuestAsked:
Who is Participating?
 
Don JohnstonConnect With a Mentor InstructorCommented:
Okay, I see where you're going now. Sorry.

The thing is, that there are many ways of circumventing a VPN which is not configured for split tunneling.  And most of those methods can not be prevented from the HQ side unless they have control over the host.  For example, if it's a company PC, you can lock it down to prevent changes to the configuration or installation of applications which could bypass the "no split tunnel" rules.

If not, there's not much you can do to enforce that.  For example, on my laptop, I have a wired and wireless NIC.  If I use the Cisco VPN client to establish a VPN over the wired NIC, But I can still browse the internet over the wireless NIC.  So having split tunneling disabled isn't stopping me from having my own, unsecured, internet connection.
0
 
Don JohnstonInstructorCommented:
Split tunneling is configured on the VPN concentrator (or firewall or whatever device you  are establishing the tunnel to).  It is not configured on the remote access computer.

Is there a reason you want split tunneling?
0
 
RiccardoQuestAuthor Commented:
i don't want split tunnelling, i want a method of locking down the client machine settings so they cannot change their settings on their local machines and then enable split tunnelling?
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
Don JohnstonInstructorCommented:
Clients can't choose between split tunneling and hair pinning.  That's determined on the other end of the tunnel.
0
 
RiccardoQuestAuthor Commented:
i understand that if you follow the steps in the below link, that will enable a split tunnel (at the client end) which could have adverse effects on the other network (the one connected via VPN). These settings are all controlled at the client machine.

https://kb.meraki.com/knowledge_base/configuring-split-tunnel-client-vpn-on-windows-and-mac-os-x
0
 
RiccardoQuestAuthor Commented:
Thanks for your help! I now understand that to fully prevent split tunneling, restrictions need to be applied to the host machine stopping additional hardware being added as well as restricting VPN connectivity setting using Group Policies.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.