Configure split tunneling, Muvpn clients – WatchGuard Technologies WatchGuard Firebox SOHO 6 User Manual

Page 111

Advertising
background image

User Guide

93

Configure Split Tunneling

Configure Split Tunneling

Another new feature in this release is split tunneling that allows
the administrator to specify all Internet traffic originating from the
Trusted interface of the SOHO 6 to go through the VPN tunnel.
Previously, only traffic headed specifically for the other end of the
VPN tunnel was sent through the tunnel; Traffic destined for other
Internet addresses was sent directly to the Internet. Split tunneling
allows a company to centrally enforce an Internet access policy.
To set up split tunneling:

1

With your Web browser, go to the System Status page using the
trusted IP address of the SOHO 6.

For example, if using the default IP address, go to: http://192.168.111.1

2

From the navigation bar on the left side, select
VPN => Manual VPN.

The Manual VPN page appears.

3

Click Add.

The Add Gateway page appears.

4

Enter the information to add the gateway.

For instructions on completing the Add Gateway page, see “Set Up

Multiple SOHO-SOHO VPN Tunnels” on page 89.

5

Type the network IP address of the Local Network.

6

Type 0.0.0.0/0 as the IP address of the Remote Network.

7

Click Submit.

MUVPN Clients

The SOHO 6 can be upgraded to use the MUVPN clients option.
This feature allows remote users to securely connect to the SOHO 6
through an IPSec VPN tunnel. The remote user gains access to the
local trusted network and networks on Branch Office VPN tunnels

Advertising
This manual is related to the following products: