In certain circumstances, a VPN service may not encrypt all traffic, and depending on how the VPN client is configured, we could tunnel certain traffic through the VPN and other traffic through our Internet operator or via WiFi, this last bypassing the VPN server. Due to these settings, it is possible that if you use a VPN, confidential data about us may be leaked. If we connect via VPN and it is not correctly configured, we could, inadvertently, provide confidential data that we would not give in other circumstances (on a public WiFi network). techwadia
There are times that parts of the traffic can escape the
private tunnel that the VPN generates, depending on our needs, this can be a
serious security flaw, or a characteristic of the VPN. We must remember
the concept of « Split-VPN «, a
Split-VPN or a divided tunnel consists in that
certain traffic will go through the VPN server from the client, but other
traffic will not go through said server, but will go directly through our
operator, without providing us with data confidentiality and authentication. In
the event that you have configured the VPN to redirect all network traffic
through the server, and you find that you have a divided tunnel, then that is
when the problems really come, because it is not the configuration that you
have made technologyify.
Closely related to VPNs when we tunnel all traffic, we
have another feature of VPNs is the « Kill-switch «, this
functionality will allow us to block the traffic that leaves our computer in
case the VPN goes down, that is, if The VPN goes down, the routes of the PC,
smartphone or the device we are using are not modified, we will simply stop
having an Internet connection, but no data will be filtered worldbeautytips.
How to make sure all
traffic goes through the VPN
A quick way to ensure that all network traffic is going
through the VPN server is to use any service to check the public IP address of
our connection. If we are redirecting all traffic, that means we should
see the public IP address of the VPN server we have connected to, and we will
not see the public IP address of our actual connection technologyford.
Another way to check that all traffic goes through the
VPN is by checking the routes of our PC, server or device. On Windows
computers you must open the command prompt, and type the following:
In the routing table for IPv4 or IPv6 networks, when we
are connected to our home router, the default gateway should appear with the
corresponding route to the entire local network and the different subnets of
the different network interfaces that we have. As you can see, what the
first route does is forward all the traffic to the default gateway: network
destination 0.0.0.0 (any), mask 0.0.0.0 (any), and the gateway is 10.11. 1.1
which is our router, and interface 10.11.1.2 is our IP techiesin.
In the routing table for IPv4 or IPv6 networks, when we
are connected to a VPN server with traffic redirection, the default gateway
should appear with the corresponding route to the entire local network and the
different subnets of the different network interfaces that let's have. As
you can see, what the first route does is forward all the traffic to the
default gateway: network destination 0.0.0.0 (any), mask 0.0.0.0 (any), and the
gateway is 10.11. 1.1 which is our router, and interface 10.11.1.2 is our IP.
And in the second route we will see that, with any
destination and mask 128.0.0.0, it is forwarded through the IP 10.8.0.5 which
is that of the VPN tunnel, we will need both routes to correctly reach the
Internet with any service.
In other operating systems you can also check the
routing table and verify that the routes are correct, for example, in Linux
systems you can put: