![]() ![]() The network configuration in Figure 37 shows that the local network and the protected network at the other end of the VPN tunnel both have a subnet with the same private IP address, 10.10.0.0/24. When split tunneling is enabled, split tunneling resource policies enable you to define the specific IP network resources that are excluded from access or accessible through the VPN tunnel.įigure 37 shows a simple network configuration with three possible routes: through the default router, to the local subnet, or to a router connection to an indirectly connected subnet. Split tunneling settings enable you to further define the VPN tunnel environment by permitting some traffic from the endpoint to reach the local network or another connected subnet. When the client and Pulse Connect Secure establish a VPN tunnel, the Pulse server takes control of the routing environment on the endpoint to ensure that only permitted network traffic is allowed access through the VPN tunnel. ![]() Split tunneling is configured as part of the role that is assigned to a user after authentication. The Pulse Secure clients for Windows, Apple OS X, Google Android, and Apple iOS and the Pulse Secure Network Connect client all support split tunneling. ![]() ![]() You are here: Pulse Connect Secure Split Tunneling Overview ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |