Here's your guide reformatted for Confluence:
OpenVPN Split Tunneling
Overview
This guide outlines the process of enabling split tunneling in the OpenVPN client configuration file.
By default, the OpenVPN client configuration directs all inbound and outbound traffic between a customer’s local device and the internet through the VPN tunnel. This is undesirable because it unnecessarily increases traffic on the StarFront local area network.
The desired behavior is that only traffic between a customer's local device and their remote device transits the StarFront network. To achieve this, customers must modify their OpenVPN configuration file.
Prerequisites
- Ensure you have administrative access to edit the .ovpn configuration file.
- Use a plain text editor like Notepad or WordPad (avoid rich text editors).
- Backup your configuration file before making any changes.
Steps to Enable Split Tunneling
-
Backup your .ovpn configuration file
- Create a copy of your .ovpn file and store it in a safe location.
-
Open the .ovpn file
- Use a text editor such as Notepad or WordPad to edit the file.
-
Remove the default gateway redirection
- Locate the following line and delete it:
redirect-gateway defl
- Locate the following line and delete it:
-
Disable forced gateway redirection
- Add the following line to the configuration file:
pull-filter ignore redirect-gateway
- Add the following line to the configuration file:
-
Save the file
- Ensure the file retains the .ovpn extension when saving.
-
Apply the configuration
- Start your OpenVPN client.
- Load the modified .ovpn configuration file.
- Connect to the VPN.
Expected Behavior
After applying these changes, only traffic destined for the StarFront local area network will travel through the VPN. All other internet traffic will bypass the VPN, improving network efficiency.
If you encounter issues, restore the backup copy of your configuration file and retry the process.