Webinar: Migrating to a Zero Trust architecture with TailscaleSign up now
Get started - it's free!
Login
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2025 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Go back

Split Tunneling: Improve Speed and Secure Critical Data with VPNs

Split tunneling is a powerful VPN feature that gives you greater control over your internet traffic. Discover its benefits, disadvantages, explore use cases for split tunneling, and best practices for enabling this feature.

What is Split Tunneling?

Split tunneling is a powerful VPN feature that gives you greater control over your internet traffic. The split tunneling feature allows you to direct some of your data through an encrypted virtual private network (VPN) for enhanced security, while letting the rest travel directly over the open internet.

This dual-routing capability can help balance privacy, speed, and functionality.

Split Tunneling Example

Imagine you’re working remotely. You might want sensitive information, such as emails or file transfers, to be encrypted through the VPN. Meanwhile, streaming a video or accessing a local printer doesn’t need that extra layer of security and can bypass the VPN for better speed. Split tunneling makes this possible by letting you customize which apps, websites, or devices use the VPN.

How Does VPN Split Tunneling Work?

By default, a VPN encrypts and routes all your internet traffic through a secure tunnel to a remote server. While this protects your data, it can also slow down your connection because of the encryption overhead. Split tunneling introduces flexibility by creating two parallel pathways:

  • VPN Tunnel: Routes traffic requiring security, such as accessing work servers or banking websites.
  • Open Internet Tunnel: Handles less sensitive tasks like streaming, gaming, or browsing local content.

With split tunneling, you can choose specific applications, URLs, or devices to connect via the VPN while the rest operate outside it. This selective routing boosts speed and ensures critical data remains protected.

Types of Split Tunneling

There are several types of split tunneling, including app-based, URL-based, inverse, policy-based, and route-based. Each has its own unique characteristics and use cases:

  • App-based Split Tunneling: Allows users to choose which apps can bypass the VPN tunnel.
    • Example: You want your video streaming app to use your regular internet connection for better speed, while your email client routes through the VPN for added security.
      This approach ensures that bandwidth-intensive applications don’t slow down your secure activities.
  • URL-based Split Tunneling: Users can specify which websites or URLs should bypass the VPN tunnel.
    • Example: You want to access online banking or shopping sites that require a direct internet connection for optimal performance.
      By routing only specific URLs through the open internet, you can maintain a secure connection for other activities.
  • Inverse Split Tunneling: Lets users choose which services will use the VPN tunnel, rather than which will bypass it.
    • Example: You want most of your traffic to go through the VPN, but need a few exceptions for specific tasks that require direct internet access.
  • Policy-based Split Tunneling: Routes traffic based on predefined policies set up by users or network administrators.
    • Example: An organization might enforce a policy that all traffic to certain sensitive servers must go through the VPN, while other traffic can use the open internet.
      This method ensures compliance with security protocols and organizational policies.
  • Route-based Split Tunneling: Divides traffic based on predefined network routes, which can be dynamic.
    • Example: This is useful for organizations that need to route traffic based on specific network conditions, such as directing traffic through different VPN servers based on geographic location or network load.

Benefits of Split Tunneling

The benefits of VPN split tunneling include better internet speeds. Since only part of your traffic goes through the VPN, the bandwidth demands on the encrypted connection decrease. This can alleviate bottlenecks, especially for activities like large downloads or video streaming.

Other benefits of split tunneling include:

  • Conserved Bandwidth: Organizations with bandwidth restrictions often benefit from split tunneling.
    By routing traffic, particularly non-essential traffic, through the open internet, it reduces the load on the VPN server.
  • Access to Local Network Devices: When connected to a VPN, encryption can block access to devices on your local network, such as printers or shared drives.
    Split tunneling ensures you stay connected to these resources while still using the VPN for secure activities.
  • Flexible Multitasking: Need to connect to a corporate network while streaming a local TV show?
    Split tunneling lets you do both simultaneously, avoiding the need to repeatedly connect and disconnect from your VPN.

Common Use Cases for Split Tunneling

Remote Work

Remote employees often use a VPN connection to access company resources securely. With split tunneling, they can reserve the VPN for work-related tasks and use their regular internet connection for personal activities without compromising speed.

Streaming and Gaming

Streaming services and online games often rely on local servers to deliver optimal performance. A VPN split tunnel allows you to decide which traffic is encrypted through the VPN while other traffic can access the internet directly. Split tunneling enables you to enjoy these activities without the latency sometimes caused by VPNs.

Accessing Geo-Restricted Content

While traveling, you might want to use a VPN to access content from your home country while still browsing local websites. Split tunneling makes this seamless by separating traffic based on your needs.

Bypassing Censorship

In regions with restricted internet access, split tunneling can enable users to access censored content through the VPN while keeping other activities local.

Setting Up and Configuring Split Tunneling

Setting up and configuring split tunneling can vary depending on the VPN provider and the device being used. Here are some general steps to follow:

  1. Enable Split Tunneling: The first step is to enable split tunneling on your VPN client or app. This is usually done by navigating to the settings or preferences menu and selecting the split tunneling option. Look for terms like “split tunneling,” “selective routing,” or “app exclusion.”
  2. Choose Which Apps or Websites to Bypass: Next, decide which apps or websites you want to bypass the VPN tunnel. This can typically be done by selecting specific apps from a list provided by the VPN client or by entering specific URLs. For example, you might choose to route your streaming service through the open internet while keeping your email client on the VPN.
  3. Configure Routing Rules: Depending on your VPN provider, you may need to configure routing rules to specify which traffic should be routed through the VPN tunnel and which should go directly to the internet. This step ensures that your internet traffic is divided according to your preferences and security needs.
  4. Test the Connection: Finally, it’s crucial to test your connection to ensure that split tunneling is working correctly. Open the apps or websites you configured and verify that the traffic is being routed as intended. This step helps identify any misconfigurations and ensures that your setup is functioning as expected.

By following these steps, you can effectively set up and configure split tunneling, allowing you to enjoy the benefits of a secure connection for critical tasks while maintaining high-speed access for everyday activities.

Potential Risks of Split Tunneling

Reduced Security

Routing part of your traffic outside the VPN exposes it to potential risks, such as interception by hackers or monitoring by internet service providers (ISPs). Sensitive data sent through the open internet lacks the encryption safeguard provided by the VPN.

Corporate Vulnerabilities in VPN Connection

In business settings, improperly configured split tunneling can open pathways for attackers to exploit unsecured devices. If a remote worker’s local network is compromised, it could endanger corporate resources accessed through the VPN.

Increased Setup Complexity

Setting up split tunneling requires thoughtful planning. Misconfigurations can lead to unintended data leaks or connectivity issues, reducing the effectiveness of the VPN.

Best Practices to Enable Split Tunneling

  • Understand Your Needs: Clearly identify which apps, websites, or devices should use the VPN and which can bypass it.
  • Use Trusted VPN Providers: Select VPN services that offer robust split tunneling options and prioritize security.
    Establish mandatory device security baselines before allowing VPN connections to enhance computer hygiene and enforce policy consistency across various devices and users.
  • Regularly Monitor and Update: Ensure your VPN and associated software are up-to-date to minimize vulnerabilities.
  • Limit Open Internet Use: Route only non-sensitive traffic outside the VPN to reduce exposure to potential threats.

Split Tunnel vs. Full Tunnel

  • Full tunnel VPN. This routes all your traffic through the VPN for maximum security, encrypting everything. While this approach offers comprehensive protection, it can lead to slower speeds and higher bandwidth usage.
  • Split tunnel VPN. Allows users to customize their traffic routes based on security and performance needs, providing better balance.

Is Split Tunneling Right for You?

Split tunneling can be an excellent option if you value both security and speed. It’s particularly beneficial for remote workers, gamers, and anyone managing multiple tasks requiring different levels of security. However, it’s essential to weigh the risks and ensure proper configuration to maximize its benefits. An encrypted VPN tunnel ensures that while communication crosses the public internet, sensitive data remains private through encryption, with only the VPN vendor able to decrypt it.

By understanding and implementing split tunneling effectively, you can enjoy the best of both worlds: a secure connection for critical tasks and high-speed access for everyday activities.

[Doc] Configure app-based split tunneling on Android

[Doc] Why do I need split DNS?

[Webpage] Seamless network connectivity with Tailscale

FAQs

Split DNS is a configuration method that allows a network to use different sets of DNS records depending on whether a request originates from within the network or from an external source. It enables users to access internal and external network resources using different domain name resolutions.
Learn more in this article.

Try Tailscale for free

Schedule a demo
Contact sales
cta phone
mercury
instacrt
Retool
duolingo
Hugging Face