GlobalProtect Split Tunneling Deep Dive

What is Split Tunneling?

Split Tunneling in Palo Alto Networks GlobalProtect is a configuration method that precisely controls which network traffic originating from a remote user's endpoint is sent through the secure VPN tunnel to the corporate network, and which traffic is allowed to go directly to its destination (like the internet) using the user's local network interface and internet connection.

This contrasts fundamentally with the alternative mode, **Full Tunnel**, where *all* network traffic generated by the endpoint – whether destined for internal corporate resources or public internet sites – is forcibly routed through the VPN tunnel. This ensures all traffic is inspected by the corporate firewall.

Full Tunnel Mode

Split Tunnel Mode

Traffic

Destination: 10.x.x.x

Destination: zoom.us

Destination: 10.x.x.x

Destination: zoom.us

To Internal

To Internet (Inspected)

Remote User Endpoint

GP Agent Routing Decision

VPN Tunnel

Local Internet

VPN Tunnel

Corporate Firewall

Internal Resources

Internet

Internet Direct

Conceptual difference between Split Tunnel and Full Tunnel traffic flow.

The decision to implement Split Tunneling involves a trade-off, primarily balancing the desire for comprehensive security inspection against user experience, performance, and corporate bandwidth utilization.

Use Cases & Comparison: Split vs. Full Tunnel

Why Choose One Over the Other?

The choice between Split Tunnel and Full Tunnel depends on your organization's priorities:

Consideration Split Tunnel Full Tunnel
Security Visibility & Control Less visibility ; only corporate-bound (tunneled) traffic inspected by firewall. Direct internet traffic bypasses corporate security stack (Threat Prevention, URL Filtering, etc.). Potential risk if endpoint is compromised via direct connection. More visibility ; all traffic inspected by corporate firewall. Consistent policy and threat prevention applied.
Bandwidth Consumption (Corporate) Lower ; general internet and SaaS traffic uses user's local bandwidth. Only specified corporate traffic consumes VPN/firewall bandwidth. Higher ; all traffic (including internet browsing, video streaming, SaaS) traverses corporate links and firewall.
Performance (Internet/SaaS Apps) Potentially Better ; direct connection to internet/SaaS avoids latency introduced by routing through the corporate network (hairpinning). Crucial for real-time apps (Zoom, Teams). Potentially Slower ; internet performance limited by corporate bandwidth and latency to/from the corporate network.
Performance (Internal Resources) Generally similar to Full Tunnel for included resources. Generally similar to Split Tunnel for internal resources.
Local Network Resource Access Easy access to local resources (home printers, other devices on local LAN) as local traffic is not tunneled. Often Blocked by default or requires specific exclusions/configurations to allow local LAN access.
Configuration Complexity More Complex ; requires careful definition and maintenance of included/excluded networks, domains, or applications. Potential for misconfiguration. Simpler initial network setup (conceptually "send everything"). Complexity shifts to firewall policy.
Compliance & Auditing May not meet requirements if regulations mandate logging/inspection of *all* user traffic originating from corporate assets/connections. Easier to meet strict compliance mandates requiring full traffic inspection and logging.
Common Use Cases Optimizing SaaS (O365, Salesforce, Zoom) performance, reducing corporate bandwidth load, enabling local resource access. Common for general user populations. High-security environments, meeting compliance, ensuring consistent policy for all traffic, simplifying initial setup for required internal access only. Common for admins, developers, restricted users.

Typical Use Cases for Split Tunneling:

Understanding the trade-offs between Split and Full Tunnel (security vs. performance/bandwidth) and the common use cases for each is essential for the exam.

Licensing Requirements

Understanding the licensing implications is important when planning your split tunneling strategy:

Know that basic IP-based split tunneling (Access Routes) does not require extra licenses. However, Domain/Application based split tunneling (including the "Exclude Video" checkbox) depends on App-ID and thus requires an active App-ID (usually via Threat Prevention) subscription.

Licensing Check

Requirement: Allow direct internet access for `office.com` traffic while tunneling all other traffic.

Method: Use "Exclude Domain/App" setting in the Split Tunnel configuration.

License Needed? Yes, an active App-ID subscription is required for domain-based split tunneling to work reliably.


Requirement: Only send traffic destined for `10.0.0.0/8` through the VPN.

Method: Use "Access Routes (Include List)" specifying `10.0.0.0/8`.

License Needed? No, only the base GlobalProtect Gateway license/subscription is needed.

Configuration Methods

Configuration Location

Split tunnel settings are an integral part of the client configuration pushed down from a GlobalProtect Gateway. You configure these settings within a specific **Agent Configuration** block defined on the Gateway.

GUI Path:

  1. Navigate to Network > GlobalProtect > Gateways .
  2. Select the desired Gateway object and click to edit it.
  3. Go to the Agent tab.
  4. Inside the Agent tab, select the Client Settings sub-tab.
  5. Click Add to create a new agent configuration block, or select an existing one to modify it. (Remember, you can have multiple agent configuration blocks matched by OS/User/HIP).
  6. Within the agent configuration window, navigate to the Split Tunnel tab.

This is where you define which traffic goes through the tunnel using the methods described in the following sections.

Remember the path: It's within the Gateway's Agent > Client Settings configuration, specifically on the Split Tunnel tab.

Method 1: Access Routes (Include List - Network Layer)

This is the most fundamental and common method for defining split tunnels. It operates at the network layer (IP addresses).

Example: Internal Network Access Only

You want users to only access internal corporate networks 10.50.0.0/16 and 10.60.10.0/24 via VPN. All other traffic (internet) should go direct.

Configuration:

  • Split Tunnel Tab > Access Route (Include List):
  • 10.50.0.0/16
  • 10.60.10.0/24

Result: Traffic to 10.50.1.100 goes via VPN. Traffic to 8.8.8.8 (Google DNS) goes direct via local internet.

Empty Access Route List = Full Tunnel: If you configure split tunneling but leave the "Access Route" (Include List) completely empty, the GlobalProtect agent interprets this as **Full Tunnel mode**. It will typically modify the endpoint's default route (0.0.0.0/0 and/or ::/0) to point to the VPN tunnel interface, forcing all traffic through the VPN.
Crucial concept: The Access Route list defines what **IS** included in the tunnel. An empty include list means **everything** is included (Full Tunnel).

Method 2: Domain/Application Excludes & Includes (Layer 7)

These methods provide more granular control, operating based on destination domain names (FQDNs) or identified applications (App-ID), allowing overrides to the basic Access Route logic.

Using these features requires an active **App-ID subscription** (usually part of Threat Prevention) and up-to-date App-ID content on the firewall.

Exclude Domains/Applications from Tunnel

Example: Exclude Microsoft 365

Access Routes include 10.0.0.0/8 . You want M365 traffic to go direct even if some M365 IPs fall in the 10.x range (less common, but possible with ExpressRoute) or just to optimize performance regardless of Access Routes.

Configuration:

  • Split Tunnel Tab > Domain and Application > Exclude Domain/Application:
  • Add Application Filter: microsoft-office-365 (or more specific apps like microsoft-teams , sharepoint-online )
  • Alternatively, add Domains: *.office.com , *.office365.com , *.onmicrosoft.com , etc. (using App Filters is often easier to maintain).

Result: Traffic identified as M365 (or to those domains) goes direct. Other traffic to 10.x.x.x still uses the VPN.

Include Domains/Applications in Tunnel

Understand the difference: Excludes punch holes *out* of the tunnel (direct access), while Includes pull specific traffic *into* the tunnel when it otherwise wouldn't be. Excludes are far more common.

Method 3: Exclude Video Streaming Applications

This is a simplified convenience feature leveraging App-ID.

Using this feature requires an active **App-ID subscription** and up-to-date App-ID content on the firewall.

Example: Saving VPN Bandwidth

Your primary mode is Full Tunnel (empty Access Routes), but you don't want users' recreational video streaming to consume corporate resources.

Configuration:

  • Split Tunnel Tab > Access Route (Include List): Leave **empty**.
  • Split Tunnel Tab > Check the box: **Exclude Video Streaming Applications**.

Result: All traffic goes via VPN *except* for traffic identified as common video streaming apps (YouTube, Netflix, etc.), which goes direct.

Rule Precedence: How Decisions Are Made

When multiple split tunneling methods are configured, the GlobalProtect agent follows a specific order of operations to decide where to route traffic. Understanding this precedence is key for complex configurations:

Match?

No Match

Enabled & Match?

No Match / Disabled

Match?

No Match

Match?

No Match

Access Routes Defined?

Access Routes Empty?

User Traffic Generated

GP Agent Intercepts

Check Domain/App Excludes

Route via LOCAL Network

Check Video Exclude Setting

Check Domain/App Includes

Route via VPN TUNNEL

Check Access Route Includes

Default Action Based on empty/non-empty Access Routes

Simplified Split Tunnel Decision Logic Flowchart.

The general order of precedence is roughly:

  1. Domain/Application Exclusions & Video Exclusions: If traffic matches a specific domain/application exclusion rule OR the "Exclude Video Streaming" rule (if enabled), it is sent directly via the local network interface, **regardless** of any Access Route or Include rules. Exclusions take highest priority to bypass the tunnel.
  2. Domain/Application Inclusions: If traffic matches a specific domain/application inclusion rule, it is sent through the VPN tunnel, **regardless** of whether its destination IP matches an Access Route or not.
  3. Access Route (Include List) Match: If traffic hasn't matched an explicit include/exclude rule above, the agent checks if the destination IP address matches any network listed in the Access Routes. If it matches, the traffic is sent through the VPN tunnel.
  4. Default Action (No Match Above): If traffic hasn't matched any exclude, include, or Access Route rule:
    • If the Access Route list **is defined (not empty)**, the default action is to send the traffic via the **local network interface** (standard split tunnel behavior).
    • If the Access Route list **is empty**, the default action is to send the traffic via the **VPN tunnel** (Full Tunnel behavior).
The key takeaway is that specific Domain/Application Exclusions are the most powerful way to force traffic *out* of the tunnel, while specific Domain/Application Inclusions are the most powerful way to force traffic *into* the tunnel when it wouldn't normally go. Access Routes handle the bulk IP-based routing in between.
Understanding this precedence, especially that Exclusions override Access Routes, is important for predicting traffic flow in mixed configurations.

Client-Side Behavior & DNS

How Split Tunneling Works on the Client

When the GlobalProtect agent connects and receives its configuration (including split tunnel settings) from the Gateway, it performs several actions on the endpoint OS:

  1. Virtual Network Adapter: A virtual network adapter (e.g., `PanGpa`, `gpvpn`) is created and activated. This adapter gets an IP address assigned from the IP Pool defined in the matched Agent Configuration.
  2. Routing Table Modification: This is the core of split tunneling.
    • Access Routes Defined (Split Tunnel Mode):
      • The agent adds **specific routes** to the endpoint's OS routing table for each network listed in the "Access Route" (Include List).
      • These specific routes have the GlobalProtect virtual adapter's gateway as their next hop.
      • The endpoint's **default route** (0.0.0.0/0 or ::/0) typically remains unchanged, pointing to the user's physical network adapter's gateway (e.g., their home router).
    • Access Routes Empty (Full Tunnel Mode):
      • The agent typically **changes the endpoint's default route** (0.0.0.0/0 and/or ::/0) to point to the GlobalProtect virtual adapter's gateway.
      • This forces all traffic not matching a more specific local route to go through the VPN tunnel. More specific routes for the local subnet might still exist to allow local network communication if configured.
  3. DNS Configuration: The agent configures the endpoint's DNS settings (specifically for the virtual adapter or system-wide depending on OS and configuration) to use the DNS servers specified in the matched Agent Configuration.
  4. Traffic Interception/Steering: The GlobalProtect agent service actively monitors network traffic initiation (e.g., socket calls, DNS lookups). Based on the destination IP, domain name, or application identification, and comparing against the configured split tunnel rules (Access Routes, Includes, Excludes, Video), it directs the traffic to the appropriate network interface (Virtual VPN adapter or Physical local adapter).
VPN Internet Physical Adapter GP Virtual Adapter Endpoint OS Networking Stack GlobalProtect Agent Service Client Application VPN Internet Physical Adapter GP Virtual Adapter Endpoint OS Networking Stack GlobalProtect Agent Service Client Application alt [Access Routes were Defined (Split Mode Default)] [Access Routes were Empty (Full Mode Default)] alt [Destination X matches Exclude/Video Rule] [Destination X matches Include Rule] [Destination X matches Access Route Rule] [No Match (Default Action)] Initiate connection to Destination X Notify Agent of connection attempt (Intercept) Check Destination X against Split Tunnel Rules Instruct to route via Physical Adapter Send Traffic Traffic goes Direct Instruct to route via Virtual Adapter Send Traffic Traffic enters Tunnel Instruct to route via Virtual Adapter Send Traffic Traffic enters Tunnel Instruct to route via Physical Adapter Send Traffic Traffic goes Direct Instruct to route via Virtual Adapter Send Traffic Traffic enters Tunnel

Sequence diagram illustrating GP Agent's role in traffic steering based on rules.

This modification of the routing table and active traffic steering by the agent service are how split tunneling is implemented at the endpoint level.

DNS Considerations (Split DNS)

DNS resolution is a critical, and often tricky, aspect of split tunneling. Clients need to be able to resolve both internal corporate hostnames (for resources accessed via the tunnel) and external public hostnames (for resources accessed directly).

The Challenge (Split DNS):

Common Approaches & Configuration:

  1. Use Internal DNS Servers Exclusively (Simplest if they forward):
    • Configure the GlobalProtect Gateway Agent settings to push **only** your internal corporate DNS servers to the client.
    • **Requirement:** Your internal DNS servers must be configured to forward queries for external domains they don't recognize to public DNS resolvers (e.g., Google DNS, Cloudflare DNS, or ISP DNS).
    • **Pros:** Simple client configuration. All DNS queries go through the tunnel initially (which might be desired for logging/security).
    • **Cons:** Relies entirely on internal DNS availability and correct forwarding. Can add latency to external DNS resolution as it traverses the tunnel. Might fail if internal DNS servers go down.
  2. Use Internal DNS Servers + DNS Suffix Search List:
    • Push internal DNS servers via GlobalProtect.
    • Configure a **DNS Suffix Search List** in the Gateway Agent settings (e.g., corp.example.com ).
    • The client OS will try appending these suffixes to single-label hostnames (e.g., query for `fileserver` becomes `fileserver.corp.example.com`) before querying the assigned DNS servers.
    • Still relies on internal DNS forwarding for external names.
  3. "Split DNS" Configuration (More Complex, OS Dependent):
    • This involves configuring the client OS to use specific DNS servers for specific domains, often through features like Windows NRPT (Name Resolution Policy Table) or similar mechanisms pushed via endpoint management, or sometimes approximated by careful DNS suffix configuration.
    • GlobalProtect itself doesn't directly configure complex OS-level split DNS policies. It primarily pushes the main DNS servers for the VPN interface.
    • You might push internal DNS via GP, and users rely on their physical adapter's DNS settings for direct traffic, but the OS needs to be smart enough to choose the right interface/server for the query (which isn't always guaranteed or easily configured just via GP).
  4. Using Public DNS Servers Exclusively (Rare for Split Tunnel):
    • Push public DNS servers (e.g., 8.8.8.8) via GlobalProtect.
    • **Requirement:** Internal hostnames must somehow be resolvable publicly (e.g., split-horizon DNS setup externally) or users must use FQDNs that resolve publicly, or rely solely on IP addresses for internal access.
    • **Pros:** External resolution is fast.
    • **Cons:** Usually breaks internal hostname resolution unless specific external configurations are in place. Generally not suitable if internal name resolution is needed.
**Common Issue:** Users in split tunnel mode can access internal resources by IP address but not by hostname. This almost always points to a DNS configuration problem. The client isn't using or cannot reach the correct internal DNS server via the tunnel, or that server isn't responding correctly.
Understand that DNS is crucial for split tunneling. Know that pushing internal DNS servers (that forward external queries) is a common approach. Be aware of the potential resolution issues when split tunneling is enabled.

Config: Ideal OS Split DNS - Conceptual

Config: Internal DNS - Forwarding

Query 'internal.corp.com'

Query 'Unsupported markdown: link'

internal.corp.com

Unsupported markdown: link

internal.corp.com

Unsupported markdown: link

internal.corp.com

Unsupported markdown: link

GP Client

DNS Resolver Logic

Internal DNS via VPN

10.1.1.5

DNS Forwarder

Public DNS

Public IP

Internal DNS via VPN

Local DNS via Physical NIC

Internal IP

Public IP

Conceptual illustration of DNS resolution paths in different scenarios.

Best Practices & Exam Focus

Gotchas and Caveats

While split tunneling offers benefits, it introduces complexities and potential risks:

The security implication of bypassing corporate inspection for direct traffic is the primary trade-off against performance/bandwidth benefits. DNS issues are the most frequent technical problem encountered.

Best Practices for Split Tunneling

To implement split tunneling effectively and minimize risks:

PCNSE Exam Focus for Split Tunneling

Based on the PCNSE exam objectives and common question patterns, here's what you should focus on regarding GlobalProtect Split Tunneling:

Study Tip: Focus on the "why" and "how" of each configuration method. Draw diagrams of traffic flow for different scenarios (e.g., Access Routes only, Access Routes + O365 Exclude). Make sure you understand what an empty Access Route list signifies.

GlobalProtect Split Tunneling - Interactive Quiz

Test your knowledge on GlobalProtect Split Tunnel configuration and concepts.

1. What is the primary function of Split Tunneling in GlobalProtect?

Correct Answer: B
Split tunneling's core purpose is to selectively route traffic either through the secure corporate tunnel or directly out via the user's local connection.

2. Compared to Full Tunnel mode, what is the main security trade-off when using Split Tunneling?

Correct Answer: D
Traffic that bypasses the tunnel in split mode also bypasses corporate security inspection (Threat Prevention, URL Filtering, etc.), which is the primary security risk.

3. Where in the PAN-OS GUI are Split Tunnel settings primarily configured for GlobalProtect agents?

Correct Answer: A
Split Tunnel configurations are part of the Agent Configuration (Client Settings) applied by a specific GlobalProtect Gateway.

4. What does the "Access Routes" list in the Split Tunnel configuration define?

Correct Answer: C
The Access Routes section acts as an "Include List" – traffic destined for networks listed here will be routed through the GlobalProtect tunnel.

5. If the "Access Routes" (Include List) in a Split Tunnel configuration is left completely empty, what mode does GlobalProtect typically operate in?

Correct Answer: B
An empty Access Route list is the standard way to configure Full Tunnel mode, where the agent routes all traffic via the VPN interface's default gateway.

6. What is the primary purpose of configuring "Exclude Domain/Application" rules in split tunneling?

Correct Answer: A
Exclusions are used to "punch holes" out of the tunnel, typically for trusted, high-bandwidth SaaS applications like M365 or video conferencing, allowing them direct internet access.

7. Which underlying Palo Alto Networks technology is required for reliable "Exclude/Include Application" and "Exclude Video Streaming" split tunneling?

Correct Answer: D
These features rely on the firewall's ability to identify applications using App-ID signatures. This requires an App-ID subscription and content updates.

8. What is a common use case for the "Include Domain/Application" split tunnel setting?

Correct Answer: C
Includes are less common but used to pull specific traffic *into* the tunnel that wouldn't normally be included based on Access Routes, often for inspection or source IP reasons.

9. Which type of split tunnel configuration requires an active App-ID (Threat Prevention) subscription?

Correct Answer: B
Any split tunneling method that relies on identifying the application (Exclude/Include Application, Exclude Video) requires the App-ID engine and its associated subscription. IP-based Access Routes do not.

10. How does the GlobalProtect agent typically modify the endpoint's routing table in Split Tunnel mode (when Access Routes are defined)?

Correct Answer: A
In split tunnel mode, the agent adds more specific routes for the tunneled destinations, while leaving the default route pointing to the local gateway for non-tunneled traffic.

11. What is "Split DNS" in the context of GlobalProtect split tunneling?

Correct Answer: D
Split DNS refers to the need for the client endpoint to correctly resolve names for both tunneled (internal) and non-tunneled (external) resources, which often requires careful configuration of the DNS servers pushed by GlobalProtect.

12. A common and often recommended way to handle DNS in a split tunnel scenario is to:

Correct Answer: C
Pushing internal DNS servers that are configured to forward requests for external domains they don't host is a common and relatively simple approach to handle split DNS requirements.

13. If a user in split tunnel mode can ping an internal server by its IP address (e.g., 10.1.1.5) but cannot access it using its hostname (e.g., fileserver.corp.local), what is the most likely cause?

Correct Answer: B
Successful IP connectivity but failed hostname connectivity almost always points to a DNS problem. The client either isn't using the right DNS server or the server isn't providing the correct internal record.

14. Consider a split tunnel configured with Access Route `192.168.0.0/16` and an Exclude rule for `*.zoom.us`. Where will traffic destined for a Zoom meeting server with IP `192.168.10.20` be routed?

Correct Answer: A
Domain/Application Exclusions take precedence over Access Routes. Even though the IP matches the Access Route, the domain exclusion for `*.zoom.us` forces the traffic to bypass the tunnel.

15. When troubleshooting split tunneling, besides firewall logs, what is essential to check?

Correct Answer: C
Split tunneling behavior is implemented on the client. Checking the client's actual routing table (`route print` or `ip route`) and DNS configuration (`ipconfig /all` or `cat /etc/resolv.conf`) is crucial for troubleshooting.

16. Which split tunneling method is generally preferred for optimizing access to dynamic SaaS applications like Microsoft 365?

Correct Answer: D
Excluding SaaS applications by domain or App-ID filter allows direct access, which is usually desired for performance. Including specific IPs is difficult as they change frequently.

17. What does checking the "Exclude Video Streaming Applications" box achieve?

Correct Answer: B
This checkbox is a convenience feature that uses App-ID to identify and exclude a predefined list of popular video streaming applications, sending their traffic direct.

18. If you configure an "Include Domain/Application" rule for `internal-tool.corp.cloud`, where will traffic to this destination go, assuming no matching Exclude rules exist?

Correct Answer: A
Include rules force the specified domain/application traffic into the tunnel, overriding the default behavior dictated by the presence or absence of matching Access Routes.

19. Which statement about routing table changes made by GlobalProtect is most accurate for Full Tunnel mode?

Correct Answer: D
In Full Tunnel mode (achieved with an empty Access Route list), the agent usually changes the system's default route to force all non-local traffic through the VPN tunnel.

20. A potential conflict can arise in split tunneling if:

Correct Answer: C
If the internal network range defined in the Access Routes (e.g., 192.168.1.0/24) is the same as the user's home network, the endpoint's OS may have difficulty routing traffic correctly.

21. True or False: Configuring Split Tunneling using only IP-based Access Routes requires an additional Palo Alto Networks license beyond the basic GlobalProtect subscription.

Correct Answer: B
False. Basic split tunneling defined solely by the Access Route (IP Include) list is a core feature and does not typically require licenses beyond the standard GlobalProtect gateway functionality.

22. To ensure traffic to `critical-partner.com` always goes through the VPN tunnel for inspection, even if your main configuration is split tunnel for internal IPs only, which method would you use?

Correct Answer: A
The "Include" list is used to force specific domains/apps into the tunnel when they wouldn't normally be included by Access Routes. Adding the IP might work but is less reliable if the IP changes.

23. Which component is primarily responsible for enforcing the split tunnel rules on the user's machine?

Correct Answer: C
The GlobalProtect Agent receives the configuration from the Gateway and then modifies the endpoint's routing table and intercepts/steers traffic locally based on the defined rules.

24. What is a primary benefit of using Application Filters (e.g., `microsoft-office-365`) instead of individual domains in Exclude rules?

Correct Answer: D
Application Filters group multiple related applications and domains. Palo Alto Networks maintains these definitions through content updates, simplifying administration compared to manually tracking all domains for a large service like M365.

25. If you configure split tunnel Access Routes to include `10.0.0.0/8` and also check "Exclude Video Streaming Applications", where does traffic to YouTube (identified by App-ID) go?

Correct Answer: A
Exclusions (including the video exclusion checkbox) take precedence. Even if YouTube used an IP in the 10.x range (unlikely), the video exclusion rule would force it to bypass the tunnel.

26. A user reports that since split tunneling was enabled (excluding Office 365), they can no longer access an internal web server `intranet.corp.local`. Accessing `office.com` works fine. What should be checked first?

Correct Answer: B
The issue relates to accessing an *internal* resource. The primary checks are whether its network is included in the tunnel (Access Routes) and whether its name can be resolved correctly by the DNS server assigned for the VPN connection.

27. Which configuration inherently provides the most comprehensive security inspection coverage for remote user traffic?

Correct Answer: C
Full Tunnel mode forces *all* traffic through the corporate firewall, allowing for consistent application of all security policies (Threat Prevention, URL Filtering, WildFire, etc.) to all user traffic.

28. You want to implement split tunneling but ensure traffic to your company's public website (`www.mycompany.com`), which resolves to a public IP, always goes direct via the user's local internet. How would you typically configure this?

Correct Answer: A
In standard split tunnel mode defined by Access Routes (include list), any traffic *not* matching the included internal routes (like traffic to a public website) will automatically go direct. No specific exclude rule is usually needed unless you started with full tunnel.

29. True or False: Changes made to the Split Tunnel configuration in the Gateway Agent Settings take effect immediately for all currently connected users without requiring them to reconnect.

Correct Answer: B
False. The agent typically retrieves its configuration, including split tunnel rules, upon connection. Changes made on the Gateway usually require the client to disconnect and reconnect to receive and apply the new settings.

30. Which factor is LEAST likely to be a primary reason for choosing Split Tunnel over Full Tunnel?

Correct Answer: B
Ensuring all traffic is subject to corporate policies (like DLP, Threat Prevention, etc.) is a primary reason for using *Full Tunnel*, not Split Tunnel, as split tunneling allows some traffic to bypass these controls.