www.lakeridge.us Open in urlscan Pro
2600:1f18:2489:8200::c8  Public Scan

Submitted URL: https://lakeridge.us/what-is-split-tunneling-cmmc
Effective URL: https://www.lakeridge.us/what-is-split-tunneling-cmmc
Submission: On December 21 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter">
  <input type="hidden" name="LEADSOURCE" value="What is Split Tunneling? Should You Allow It?">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c

<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&amp;id=2ee620784c" method="POST" id="join-our-newsletter-blog">
  <input type="hidden" name="LEADSOURCE" value="What is Split Tunneling? Should You Allow It?">
  <div class="form-group row">
    <label for="first_name">Name*</label>
    <input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
  </div>
  <div class="form-group row">
    <label for="email">Email*</label>
    <input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
  </div>
  <div class="form-group row">
    <label for="company">Company*</label>
    <input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
  </div>
  <div class="form-group row mt-3">
    <div class="d-grid">
      <input class="btn btn-primary" type="submit" value="Submit">
    </div>
  </div>
</form>

Text Content

JOIN OUR NEWSLETTER

Name*
Email*
Company*

 * Compliance Solutions
   
   NIST SP 800-171 & CMMC COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with NIST SP 800-171 and CMMC requirements.
   
   Learn More
   
   HIPAA COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with HIPAA security rule requirements.
   
   Learn More
   
   FAR 52.204-21 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information
   Systems requirements.
   
   Learn More
   
   ISO 27001 COMPLIANCE
   
   Become compliant, provide compliance services, or verify partner compliance
   with ISO 27001 requirements.
   
   Learn More
 * About
 * Contact

Login Book a Call




WHAT IS SPLIT TUNNELING? SHOULD YOU ALLOW IT?

What is split tunneling as it relates to virtual private networks? Is using
split tunneling secure? How does it impact CMMC compliance requirements?

--------------------------------------------------------------------------------

 * email
 * facebook
 * twitter
 * reddit

Join Our Newsletter
Join our newsletter:
Name*
Email*
Company*



WHAT IS SPLIT TUNNELING?

Split Tunneling is a VPN setting that allows a VPN user to route a portion of
their internet traffic through an encrypted virtual private network while
routing the rest through a separate tunnel on the open network.

Split tunneling allows you to access resources on a corporate network via the
VPN by routing that connection through an encrypted tunnel while internet
traffic is not routed through that tunnel.


BENEFITS OF SPLIT TUNNELING

Split tunneling reduces traffic on corporate networks, because not all of a
remote user’s traffic goes through the VPN connection. This results in increased
speed through reduced latency. Split tunneling also provides privacy benefits to
VPN users because their internet traffic isn’t being monitored and logged by
their company.


DISADVANTAGES OF SPLIT TUNNELING

From a security perspective allowing split tunneling creates additional risk.
When split tunneling is enabled the firewall rules that apply to computers on
your internal network won’t apply to your remote endpoints. If you have certain
protocols and websites blocked in your firewall settings these won’t apply to
your remote end-points. Basically any perimeter defense you have setup for your
network won’t apply to your remote end-points.


SHOULD YOU USE SPLIT TUNNELING?

It depends. If speed, convenience, and a lower internet bill is important for
your organization then enabling split tunneling is a good option for you. You
can make up for some of the security risks by improving the security of your
endpoints by leveraging the firewall on your end points and using other tools
such as Cisco’s OpenDNS.

If security is paramount to your organization then you should disable split
tunneling. This provides you more control over your end-points and can help you
meet cybersecurity compliance requirements.


SPLIT TUNNELING CMMC REQUIREMENTS

CMMC Practice SC.3.184 states: Prevent remote devices from simultaneously
establishing non-remote connections with organizational systems and
communicating via some other connection to resources in external networks (i.e.,
split tunneling).
It is clear that if you have cybersecurity maturity model certification (CMMC)
requirements and use a VPN you need to disable split tunneling.
 

Quick & Simple


DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS:

Whether you need to meet and maintain your compliance requirements, help your
clients meet them, or verify supplier compliance we have the expertise and
solution for you


NIST SP 800-171 & CMMC COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
NIST SP 800-171 and CMMC requirements.
Learn More


HIPAA COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
HIPAA security rule requirements.
Learn More


FAR 52.204-21 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
requirements.
Learn More


ISO 27001 COMPLIANCE

Become compliant, provide compliance services, or verify partner compliance with
ISO 27001 requirements.
Learn More
 



CYBERSECURITY COMPLIANCE
QUICK. SIMPLE. AFFORDABLE.
GET STARTED TODAY

Book a Discovery Call
 * 
 * 
 * 
 * 

PRODUCT

 * Login
 * Register
 * Forgotten password
 * NIST SP 800-171 & CMMC Compliance
 * HIPAA Compliance
 * FAR 52.204-21 Compliance
 * ISO 27001 Compliance

COMPANY

 * About us
 * Join our team
 * Affiliate Program
 * Contact us

RESOURCES

 * Our blog
 * HIPAA Handbook
 * NIST SP 800-171 & CMMC 2.0 Handbook
 * CMMC 1.0 Handbook

LEGALS

 * Privacy policy
 * Terms & conditions
 * Security
 * Sitemap

All rights reserved © Lake Ridge Technologies 2023