Configure Split Tunneling

Configure Split Tunneling

Another new feature in this release is split tunneling that allows the administrator to specify all Internet traffic originating from the Trusted interface of the SOHO 6 to go through the VPN tunnel. Previously, only traffic headed specifically for the other end of the VPN tunnel was sent through the tunnel; Traffic destined for other Internet addresses was sent directly to the Internet. Split tunneling allows a company to centrally enforce an Internet access policy.

To set up split tunneling:

1With your Web browser, go to the System Status page using the

trusted IP address of the SOHO 6.

For example, if using the default IP address, go to: http://192.168.111.1

2From the navigation bar on the left side, select

VPN => Manual VPN.

The Manual VPN page appears.

3Click Add.

The Add Gateway page appears.

4Enter the information to add the gateway.

For instructions on completing the Add Gateway page, see “Set Up Multiple SOHO-SOHO VPN Tunnels” on page 89.

5Type the network IP address of the Local Network.

6Type 0.0.0.0/0 as the IP address of the Remote Network.

7Click Submit.

MUVPN Clients

The SOHO 6 can be upgraded to use the MUVPN clients option. This feature allows remote users to securely connect to the SOHO 6 through an IPSec VPN tunnel. The remote user gains access to the local trusted network and networks on Branch Office VPN tunnels

User Guide

93

Page 111
Image 111
WatchGuard Technologies SOHO 6.1 manual Configure Split Tunneling, Muvpn Clients