Citrix Systems 9000 Series User Manual

Page 43

Advertising
background image

Configuring the SSL VPN Client

SSL VPN User’s Guide

4-9

the traffic is sent to the local LAN or the Internet. You can view the list of IP

addresses, ports, and applications in the Profile pane of the Configuration dia-

log box as shown in the following figure.

Figure 4-8 List of IP addresses, ports, and applications

Consider a scenario where you have logged on to the SSL VPN and you need to

download a file from a computer on the local LAN. With split tunneling enabled,

you can directly connect to the computer via Windows Explorer and download

the file. This is because, the client intercepts your download request and learns

the destination IP address. As the IP address belongs to a computer in the

local LAN, the client does not send the request to the remote network via the

SSL VPN tunnel. Instead, it sends it directly to the local computer.
When Split Tunneling is disabled, all traffic is sent through the secure SSL VPN

tunnel thus bypassing the local LAN and the Internet. In fact, all DNS lookups

are sent to the DNS server on the remote network. As a result, you will not be

able to access resources on your local LAN.
For you to use this feature, the SSL VPN administrator first needs to configure

and enable it on the gateway. As part of the configuration process, the SSL

VPN administrator needs to specify ranges of IP addresses, ports, and applica-

tion names on the gateway. When the client intercepts traffic on your com-

puter, it compares the destination IP address, port, and application name in

the packets against the values configured by the SSL VPN administrator on the

gateway. If the values lie within one of the ranges, the client sends the packet

to the remote network. Else, it diverts it to the local LAN that your computer is

a part of.
This feature has three options:

Advertising