Conserve bandwidth and improve speeds by splitting your connection between your secure VPN gateway and the public internet.
Split tunneling allows you to reserve your secure VPN connections for business systems and applications and route the remaining traffic directly to the internet.
No card needed. Full onboarding support.
BENEFITS
Access your internal systems via an encrypted tunnel to protect your traffic from online threats while saving VPN server capacity.
Main benefit
Route your non-critical traffic directly through your local ISP to improve speed and latency of streaming services or web browsing.
Main benefit
Experience GoodAccess via an interactive demo. Get a feel for all its features and find out why GoodAccess is the right choice for your business.
Case study
Case study
Creative Dock needed to ensure ISO 27001 compliance, but they struggled to achieve the required level of security and control over their network and user devices (BYOD) with their prior remote-access solution.
Without any additional hardware, GoodAccess provided Creative Dock with full, centralized control over their infrastructure and covered up to 70% of technical security requirements of ISO 27001.
Discover why leading companies rely on GoodAccess for building their Zero Trust Architecture solutions.
Overall, the GoodAccess platform is amazing. From the administration side, the platform is incredibly user friendly and you can be up and running in a few minutes, managing users takes no time at all and the customer service is fast and very helpful. We have been with GoodAccess for a number of years with no complaints. The product is very competitive in price with its competitors.
We have been very happy with the reliability of GoodAccess. We find the connectivity and stability of connections stable, we have users across multiple countries and the experience has been very good.
GoodAccess's Zero Trust Architecture effectively secures our access to critical network infrastructure and web applications. By enabling a unified IP address for all clients, it simplifies access management and reduces network administration complexity.
GoodAccess provides fast onboarding, excellent reporting, and helpful support. It offers secure, scalable access to critical systems across a global IP reach, making it vital for managing multiple users effortlessly. The platform's user-friendly management enhances our operational efficiency and security.
Test all premium features for 14 days without limitation. No credit card required.
Connect to a gateway near your location, decide what systems to include in your secure environment.
Invite team members and enable split tunneling in the Control Panel.
No card needed. Full onboarding support.
Schedule a call with the GoodAccess success manager to get all the details about our product features.
Other features
Extend full control over inbound connections, manage them centrally with zero hardware required.
Get a permanent and unique identifier of your business on the public internet.
Use your static IP address to identify trusted connections to your critical systems.
Split tunneling guide
Split tunneling is a networking technique that allows you to connect to two networks at the same time. A common use case is accessing internal business systems and applications via a secure VPN connection and routing the remaining traffic, such as normal internet browsing, directly to the internet.
Split tunneling can help you improve latency and optimize bandwidth if you have a lot of traffic passing through your dedicated VPN gateway. In places where the gateway needs to handle a lot of traffic, routing low-risk traffic, e.g. video streaming, directly to the internet reduces the load on the VPN server.
GoodAccess supports split tunneling on the VPN gateway. By default all traffic is routed via a secure VPN tunnel. GoodAccess’ split tunneling allows you to specify domains or IP addresses that will be excluded from the tunnel.
More information on our support portal.
Inverse split tunneling allows no traffic to pass through the VPN gateway except for those destinations (IP addresses) permitted by access rules on the VPN server. Therefore, its primary function is to add a layer of security to the allowlisted systems/applications, rather than as a bandwidth optimization technique.
Split tunneling can void certain access policies, such as content restrictions, if these are configured on the VPN gateway. In such a case internet traffic is routed directly and the policy rules cannot be applied.
Moreover, it can represent a security hazard, because the part of the traffic which is routed via the local ISP is not encrypted, and can therefore be hijacked by attackers on unsecured public networks.