O'Reilly logo

Windows Server 2012 Unified Remote Access Planning and Deployment by Bala Natarajan, Erez Ben-Ari

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Configuring forced tunneling

With most VPN technologies, once the user establishes the connection, the virtual network takes over everything, and all traffic flows through the tunnel. In such a case, even if the user needs to browse to a website that's on the public Internet, that traffic would still come through the VPN tunnel. This makes sense, because organizations are concerned that if traffic can go directly to or from the Internet, this essentially bridges the networks together without filtering, and this might expose the corporate network to attack. In the networking world, this type of thing is referred to as Forced Tunneling, because we force everything through the tunnel.

With URA, on the other hand, the default mode is split tunneling, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required