www.lakeridge.us
Open in
urlscan Pro
2600:1f18:2489:8200::c8
Public Scan
Submitted URL: https://lakeridge.us/what-is-split-tunneling-cmmc
Effective URL: https://www.lakeridge.us/what-is-split-tunneling-cmmc
Submission: On December 21 via api from US — Scanned from US
Effective URL: https://www.lakeridge.us/what-is-split-tunneling-cmmc
Submission: On December 21 via api from US — Scanned from US
Form analysis
2 forms found in the DOMPOST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter">
<input type="hidden" name="LEADSOURCE" value="What is Split Tunneling? Should You Allow It?">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
POST https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c
<form action="https://cubcyber.us18.list-manage.com/subscribe/post?u=79455d5135b0c2705f487b697&id=2ee620784c" method="POST" id="join-our-newsletter-blog">
<input type="hidden" name="LEADSOURCE" value="What is Split Tunneling? Should You Allow It?">
<div class="form-group row">
<label for="first_name">Name*</label>
<input id="first_name" class="form-control" type="text" name="NAME" maxlength="40" required="">
</div>
<div class="form-group row">
<label for="email">Email*</label>
<input id="email" class="form-control" type="email" name="EMAIL" maxlength="80" required="">
</div>
<div class="form-group row">
<label for="company">Company*</label>
<input id="company" class="form-control" type="text" name="COMPANY" maxlength="40" required="">
</div>
<div class="form-group row mt-3">
<div class="d-grid">
<input class="btn btn-primary" type="submit" value="Submit">
</div>
</div>
</form>
Text Content
JOIN OUR NEWSLETTER Name* Email* Company* * Compliance Solutions NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More * About * Contact Login Book a Call WHAT IS SPLIT TUNNELING? SHOULD YOU ALLOW IT? What is split tunneling as it relates to virtual private networks? Is using split tunneling secure? How does it impact CMMC compliance requirements? -------------------------------------------------------------------------------- * email * facebook * twitter * reddit Join Our Newsletter Join our newsletter: Name* Email* Company* WHAT IS SPLIT TUNNELING? Split Tunneling is a VPN setting that allows a VPN user to route a portion of their internet traffic through an encrypted virtual private network while routing the rest through a separate tunnel on the open network. Split tunneling allows you to access resources on a corporate network via the VPN by routing that connection through an encrypted tunnel while internet traffic is not routed through that tunnel. BENEFITS OF SPLIT TUNNELING Split tunneling reduces traffic on corporate networks, because not all of a remote user’s traffic goes through the VPN connection. This results in increased speed through reduced latency. Split tunneling also provides privacy benefits to VPN users because their internet traffic isn’t being monitored and logged by their company. DISADVANTAGES OF SPLIT TUNNELING From a security perspective allowing split tunneling creates additional risk. When split tunneling is enabled the firewall rules that apply to computers on your internal network won’t apply to your remote endpoints. If you have certain protocols and websites blocked in your firewall settings these won’t apply to your remote end-points. Basically any perimeter defense you have setup for your network won’t apply to your remote end-points. SHOULD YOU USE SPLIT TUNNELING? It depends. If speed, convenience, and a lower internet bill is important for your organization then enabling split tunneling is a good option for you. You can make up for some of the security risks by improving the security of your endpoints by leveraging the firewall on your end points and using other tools such as Cisco’s OpenDNS. If security is paramount to your organization then you should disable split tunneling. This provides you more control over your end-points and can help you meet cybersecurity compliance requirements. SPLIT TUNNELING CMMC REQUIREMENTS CMMC Practice SC.3.184 states: Prevent remote devices from simultaneously establishing non-remote connections with organizational systems and communicating via some other connection to resources in external networks (i.e., split tunneling). It is clear that if you have cybersecurity maturity model certification (CMMC) requirements and use a VPN you need to disable split tunneling. Quick & Simple DISCOVER OUR CYBERSECURITY COMPLIANCE SOLUTIONS: Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you NIST SP 800-171 & CMMC COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC requirements. Learn More HIPAA COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements. Learn More FAR 52.204-21 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements. Learn More ISO 27001 COMPLIANCE Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements. Learn More CYBERSECURITY COMPLIANCE QUICK. SIMPLE. AFFORDABLE. GET STARTED TODAY Book a Discovery Call * * * * PRODUCT * Login * Register * Forgotten password * NIST SP 800-171 & CMMC Compliance * HIPAA Compliance * FAR 52.204-21 Compliance * ISO 27001 Compliance COMPANY * About us * Join our team * Affiliate Program * Contact us RESOURCES * Our blog * HIPAA Handbook * NIST SP 800-171 & CMMC 2.0 Handbook * CMMC 1.0 Handbook LEGALS * Privacy policy * Terms & conditions * Security * Sitemap All rights reserved © Lake Ridge Technologies 2023