The internet speed decreases when using a VPN, but there may be ways to improve it.
The internet speed decreases when using a VPN, but there may be ways to improve it.
I've configured a VPN on my office server to reach drives and work remotely. The problem is that internet speed drops noticeably when the VPN is active. I think the issue might be with the server's settings rather than the VPN itself. Is there a way to let Windows use the regular connection for browsing while the VPN handles drive access?
Your device's local IP address is 192.168.1.9 and it's connected to a VPN at 192.168.1.105.
You have the client databases for both routers on different machines—one via VPN and one without. This setup implies you’re likely acting as a client at your office when using the VPN, seeing your home PC’s name appear. To block port 80 traffic through the VPN while keeping it active for your other connection, you can adjust firewall rules in Windows accordingly.
Using a VPN allows you to run either a full tunnel or split tunneling. In a full tunnel, every internet connection goes through the VPN. With split tunneling, only traffic meant for the VPN server travels through the tunnel while other data stays on direct routes to the internet (skipping the VPN). This matters because the encryption and routing added by the VPN can significantly affect latency and bandwidth based on various conditions. In a full tunnel, performance may drop overall. With split tunneling, most regular traffic should move quickly, only the VPN-specific requests slow down slightly. Usually, a VPN introduces some delay and reduces effective speed. Edit: Also check what routing devices you have installed.
Thanks! I've gathered the details and will look into it further.
The split tunneling approach doesn’t appear to function properly since the VPN client isn’t recognized by Windows as a secure connection. It seems this issue might be outside my control, and I may need to give up. Setting up required business infrastructure in such a short time without proper knowledge is really challenging.
Lol, definitely. If you're curious, a budget CISCO ASA 5506 works well with limited VPN options. The AnyConnect client also handles split tunneling. The price usually falls between $600 and $1000, though setting it up needs some expertise that’s hard to find online. Still, new Cisco gear often has restricted TAC support, but Cisco might handle installation and setup via phone or remote connection. Not pushing Cisco too hard—there are other options like Sonicwall, etc. I’ve personally found ASA devices quite reliable for VPN setups.
We operate as a small team at my desk, making the expense unfeasible. This was merely a fast method to get online so we could work remotely, but several issues arose. Our "server" is a 2010 Dell Vostro equipped with a C2D and 2GB of RAM, and we manage with a tight tech budget, haha.
You're asking about the actual components you're employing for remote connectivity. Typically, it involves a simple switch between split and full tunnels, and you need access to the RFC 1918 summary subnets to properly encapsulate them within the tunnel.