• Flatfire@lemmy.ca
    link
    fedilink
    English
    arrow-up
    6
    ·
    10 hours ago

    Generally speaking, most VPNs used for business are a split tunnel, and aren’t forwarding all of your traffic, just the traffic relevant to your company resources that would otherwise be inaccessible unless you were on-site. So your internet traffic and regular browsing are still sent as if you had no VPN connection at all.

    • Aceticon@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      4 hours ago

      They can do that, but in my experience they do not, if only because it would be a vector for external attackers (who could control that machine via those connections routed directly to the Internet) to get into the company’s intranet without actually having to go through the company’s firewalls.

      • Flatfire@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 hours ago

        This is what strong endpoint security is for. EDR software is also common. Routing everyone’s internet traffic is pretty strenuous.

    • neclimdul@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      ·
      9 hours ago

      I don’t think that’s actually true. Most route traffic through malware/protection software which would be bypassed by split vpns.

      There are also a number of attacks that target this sort of VPN setup so it’s my understanding it’s generally not a good idea.

    • cmhe@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      ·
      edit-2
      10 hours ago

      Routing is something you can control client-side. Well at least you can configure that all traffic should be routed over the VPN. If your company provides an exit to the internet over VPN is another issue, but I suppose most do.