Split Tunnel Failures
How to Troubleshoot Split Tunnel Issues
Split Tunneling and Local Subnet Collisions
By default, Twingate uses split tunneling: it only captures and routes traffic destined for the private Resources you have explicitly defined. All other traffic - such as to public websites like Google, or to local network devices like a printer - is ignored by Twingate and follows the device’s normal network path. Problems arise when a Twingate Resource definition accidentally overlaps with a user’s local network, causing Twingate to mistakenly capture local traffic.
Common Symptoms:
- A user reports, “I can’t print to my home printer at
192.168.1.50when Twingate is turned on.” - A user cannot access a local file server or NAS on their home network.
- Another VPN client that the user needs for a different purpose will not function when Twingate is active.
How to Identify and Troubleshoot:
- Identify the IP Address Overlap: This is the cause in nearly all cases of local network conflict.
- Ask the user to find their local IP address and subnet. On Windows, they can run
ipconfig; on macOS or Linux,ifconfigorip addr. For example, their computer’s IP address might be192.168.1.100on a255.255.255.0subnet, meaning their local network is192.168.1.0/24. - In the Twingate Admin Console, carefully review all your Resource definitions. If you have defined a corporate Resource with the address
192.168.1.0/24, you have created a collision. The Twingate Client on the user’s machine will see this rule and attempt to route all traffic for their local network - including their printer - to your corporate Connector, where it will fail. The same collision issue occurs if you have defined a Resource with a specific address within the192.168.1.0/24range and a device on the local network has the same IP address.
- Ask the user to find their local IP address and subnet. On Windows, they can run
- Refine Your Resource Definitions: The best practice is to be as specific as possible when defining Resources to minimize the chance of collision.
- Instead of defining a broad CIDR range like
10.0.0.0/16, define Resources using their specific IP addresses (e.g.,10.0.5.23) or smaller, more precise CIDR blocks (e.g.,10.0.5.0/24) whenever possible.
- Instead of defining a broad CIDR range like
- Understand and Use Exit Networks for Full Tunneling: If your goal is to prevent split tunneling and force all of a user’s traffic through a secure gateway (for example, when they are on an untrusted public Wi-Fi network), the correct feature to use is an Exit Network.
- An Exit Network is a special type of Remote Network where you deploy Connectors to act as secure Internet exit points. When a user selects an Exit Network in their Client, all of their traffic is routed through that exit Connector. This is an intentional, user-selectable, full-tunnel mode, and is not the default behavior.
- Handle .local Domains with Care: If your internal network uses the
.localtop-level domain, be aware that this is also used by the mDNS (Bonjour) protocol for local device discovery. You must define your internal.localdomain as a Resource in Twingate for it to be resolved correctly, but this can create conflicts with local device discovery. Refer to Twingate’s specific knowledge base article on this topic for best practices.
If you have systematically worked through all of these categories and are still unable to resolve the issue, it is time to gather comprehensive logs and consult additional resources.
Last updated 2 months ago