209999561078
academy
Security
Privacy
Performance
English

What Is VPN Split Tunneling?

A VPN encrypts your internet traffic to keep it private, but what if you don’t want every app or connection routed through it? That’s where split tunneling comes in, letting you choose which apps use the VPN and which connect normally. In this guide, we’ll explore split tunneling in more detail, cover the pros and cons, and explain how you can use it with Avast SecureLine VPN on Android.

TIME_US-WBB2024_Logos_EN-14 (2)
2024
World's best
brands
academy-what-is-vpn-split-tunneling-hero
Written by

Reviewed by

Published on April 1, 2026
This Article Contains
This Article Contains

    Definition of VPN split tunnelling

    Split tunnelling is a feature available in some VPN apps that lets you set rules for which internet traffic passes through the VPN tunnel and which bypasses it. For example, you might like the privacy of a VPN for browsing but want to avoid the added latency that a VPN can introduce while gaming. Split tunnelling makes this possible.

    If you’re wondering whether a VPN is right for you and are held up on the potential downside of performance issues or limited access to certain services, split tunnelling could tip the balance. But remember, any data that bypasses the VPN doesn’t benefit from encryption or IP masking, meaning split tunnelling isn’t suitable for more sensitive use cases. You should weigh its advantages and limitations based on your specific needs at any given time.

    How split tunnelling works

    When you enable split tunneling, your internet traffic is divided into two paths. Some data goes through the VPN tunnel, where it’s encrypted and kept private, while the rest bypasses the VPN and travels over your regular internet connection. This allows you to protect sensitive activity while letting less critical apps or services connect directly for better speed or compatibility.

    An illustration showing how split tunnelling allows some internet traffic to bypass the encrypted VPN tunnel.

    Types of split tunnelling

    There are several types of split tunneling. The ones available to you will depend on your VPN provider and device, but these are the most common categories:

    • App-based split tunnelling: This is the most common and user-friendly option. It lets you choose which apps use the VPN and which connect directly to the internet. For example, you might route your browser through the VPN for privacy, while allowing a streaming app to use your regular connection for better speed.

    • Website/Domain-based split tunnelling: This type of split tunnel lets you decide how traffic is routed based on the website you’re visiting. For instance, a company might route all traffic to its internal domain (like examplecompany.com) through a VPN, while other websites are accessed normally.

    • Route-based split tunnelling: Route-based split tunneling uses IP address rules to decide which traffic goes through the VPN. A common example is maintaining direct access to devices on your local network (like a printer or smart home device) while still using a VPN for internet traffic.

    • Policy/Rule-based split tunnelling: This advanced type of split tunneling follows detailed rules based on factors like the user, app, time of day, or network you’re connected to. Because of its complexity, this approach is typically used in business or enterprise environments and managed by IT teams rather than individual users.

    Common use cases

    Depending on the specific type of split tunnelling that’s implemented, these features support a wide range of practical scenarios:

    • Remote work: Organizations can route sensitive business traffic through a secure VPN while allowing general internet use outside the tunnel.

    • Streaming: You might decide to route streaming traffic through a remote VPN server to access different content libraries — or bypass the VPN when connecting to a service that blocks VPN connections.

    • Gaming: Split tunnelling lets you stay protected while browsing but keep your gaming connection outside the VPN to reduce latency, avoid high ping, and maintain stable performance.

    • Accessing local resources: Split tunneling can enable continued access to local network devices like printers, smart home systems, or network-attached storage while connected to a VPN.

    Benefits of split tunnelling

    Split tunnelling offers several practical advantages, which is why many users prefer it over either routing all their traffic through a VPN or disabling their VPN entirely.

    Here’s a closer look at some of the key benefits:

    Improved bandwidth efficiency

    By allowing you to choose which traffic passes through the VPN, split tunnelling reduces unnecessary load on the VPN server. This helps prevent bottlenecks — especially when many users share the same server — and ensures bandwidth is used more efficiently. It also gives users or administrators control over which data needs encryption and which does not.

    Faster connection speeds for specific tasks

    VPN encryption and routing add processing overhead and can increase latency, resulting in a slow VPN connection. With split tunnelling, you can route latency-sensitive activities — such as online gaming — outside the VPN while keeping other traffic protected. This balance lets you maintain performance where it matters without giving up VPN benefits entirely.

    Access to local and remote resources simultaneously

    Split tunnelling allows you to use local network resources like printers, home media servers, or smart home devices while staying connected to a VPN. In many cases, this happens automatically: if your VPN lets you access local devices while encrypting outbound traffic, split tunnelling is already in effect, even if it’s not explicitly labeled as such.

    Risks of VPN split tunnelling

    The main risk with split tunneling is that — by design — any traffic that bypasses the VPN is unencrypted and exposed directly to your regular network. This means your online activity is associated with your real IP address, and the sites you visit will be visible to your internet service provider (ISP) or network operator if no additional encryption is in place.

    This may not seem like a concern, since split tunnelling is specifically designed to let non-sensitive activity run alongside a secure VPN connection. However, managing split tunnelling settings can be complex. If you lose track of which apps or websites bypass the VPN, it becomes easier to make mistakes that expose sensitive data.

    This risk is especially relevant when using split tunneling on public Wi-Fi or with a corporate VPN. If certain traffic streams are unintentionally routed outside the VPN, they could be intercepted, monitored, or expose sensitive systems, credentials, or internal communications to unnecessary risk.

    Full tunnel vs. split tunnelling: Which should you use?

    With a full-tunnel VPN, all your internet traffic is encrypted and routed through a secure VPN server, masking your identity and location. With split tunneling, only selected traffic goes through the VPN, while the rest uses your regular internet connection.

    The right choice depends on your network and how sensitive your activity is. If you’re on public Wi-Fi or handling confidential information, a full tunnel is the safer option. It ensures all traffic is protected and reduces the risk of accidental data leaks.

    If you’re on a trusted and secure network (like at home) and want better accessibility or performance — for example, while connecting to other local devices, or gaming or streaming — split tunneling can be more convenient.

    Ultimately, it comes down to balancing privacy and performance. A simple way to decide is to ask: Do any of my current activities involve sensitive data or require watertight privacy?

    • If yes, use a full tunnel to be on the safe side.

    • If no, split tunneling may be sufficient to balance basic privacy with practicality.

    Tips for using VPN split tunnelling securely

    To use split tunneling safely, start with a “secure by default” approach. Route all traffic through the VPN first, then selectively allow specific apps or services to bypass it based on your needs, trust level, and network environment.

    Then be sure to review your setup regularly — especially when connecting to new or unfamiliar networks. What’s safe on your home network may not be safe on public Wi-Fi.

    It’s also important to keep your VPN app fully updated to reduce the risk of bugs or security vulnerabilities. For added protection, consider using antivirus or endpoint security software alongside your VPN.

    Most importantly, use split tunneling intentionally. It shouldn’t be a “set it and forget it” configuration, but a flexible feature you implement with a clear understanding of the trade-offs and a good reason to use it.

    Protect your online privacy with Avast SecureLine VPN

    Split tunneling gives you more control over how your traffic is routed — and with Avast SecureLine VPN on Android, you can decide which apps use the VPN and which connect directly. On other platforms, you’ll still benefit from strong encryption, IP masking, and safer browsing on public Wi-Fi, helping keep your data more private wherever you connect.

    FAQs

    Is split tunnelling safe?

    Whether split tunnelling is safe depends on how carefully you manage your configuration. If you keep track of which apps bypass the VPN, and trust the rest to use the secure tunnel, split tunnelling can be safe. However, if you want stronger, simpler protection with less room for error, a full-tunnel VPN is the safer choice.

    When should you use VPN split tunnelling?

    Common split tunnel use cases include accessing local network resources, separating work-related VPN traffic from personal browsing, reducing latency for online gaming, and using streaming services. If you’re experiencing issues like buffering or network jitter, split tunnelling can help improve performance.

    Can split tunnelling expose my IP address?

    Split tunnelling can expose your IP address, but only for traffic that bypasses the VPN. If your browser or a specific app is configured to avoid the VPN tunnel, the services you access through it will see your real IP address. The same applies to any traffic routed outside the VPN.

    Should I turn off split tunnelling on public Wi-Fi?

    If your priority is maximum security on public Wi-Fi, it’s best to disable split tunnelling and use a full-tunnel VPN. Split tunnelling adds configuration complexity, increasing the risk of mistakes that could expose your data on less secure networks.

    More Privacy Articles

    What Is VPN Split Tunneling?

    VPN Kill Switch: What It Is and Why It Matters

    What Is a Replay Attack and How Does It Work?

    How to Fix The “Connected Without Internet” Wi-Fi Issue

    Understanding AES Encryption: What Is the Advanced Encryption Standard?

    Is Telegram Safe? A Guide to the Secure Messaging App

    How to Encrypt Email on Gmail, Outlook, iOS, Android, and Other Platforms

    VPN Protocols Explained and Compared

    How to Stream Your Favorite TV Shows With a VPN

    The Most Secure Messaging Apps in 2026

    How to Change the Location on Your iPhone

    Proxy vs VPN vs Tor: What Are the Differences?

    Connect privately on your Android with Avast SecureLine VPN

    Avast
    SecureLine VPN

    Free trial

    Connect privately on your iPhone with Avast SecureLine VPN

    Avast
    SecureLine VPN

    Free trial
    VPN
    Privacy
    Harrison Gough
    1-04-2026