VPN Split-tunnels

Dialpad is not designed to function over a VPN. If your company uses a VPN, please utilize a split tunnel and direct Dialpad traffic outside of the VPN.

VPNs are usually configured at the headquarters or the network branch levels. This is a security measure that keeps unwanted external access to your internal company data while allowing an encrypted connection from an external network with the correct permissions. For example: an employee working from a remote site, remote office, or from their home can access applications available on the internal company network.

There are two types of VPNs: software and hardware. The main difference is that hardware VPNs are physical stand-alone devices that handle VPN functions and which are typically installed in a data closet or networking center. Software VPNs are third-party applications that are much more widely utilized today versus hardware VPNs. You can install software VPNs on your devices to allow protected access to internal network systems and data, or to allow from your network users access to applications on a third-party server.

We say that Dialpad is not designed to function over a VPN, and here is why we request you utilize a split tunnel configuration if you do have a VPN set up:

Split tunneling is a VPN feature that routes specific kinds of traffic through your local internet connection directly, and the rest of the traffic through the secure connection back to your company network. Split tunneling features in VPNs will typically let you choose which apps to send with VPN security and which can connect normally using the app's security tools. Dialpad has layers of substantial security best practices in use, and VPNs typically add substantial delays in data speeds that interfere with the smooth and orderly transmission of call traffic.

There are typically two types of Split Tunneling VPN features available:

  • URL-based split tunneling lets you choose exactly which URLs you want to be encrypted through the VPN. This is usually done using a VPN browser extension.
  • App-based split tunneling works in a similar way, as it lets you choose which apps you want to be routed through your VPN, while the rest of your traffic travels through your regular network.

Dialpad recommendation as a best practice to allowlist traffic to/from each of the following FQDN in your VPN's split tunneling settings:

  • dialpad.com
  • www.obitalk.com
  • www1.obitalk.com
  • prov.obitalk.com
  • devpfs.obitalk.com
  • storage.googleapis.com
  • ubervoice.ubervoip.net
  • turn.ubervoip.net
  • stun.l.google.com
  • uvwss.ubervoip.net
  • legacy.dialpad.com
  • dialpadcdn.com
  • static.dialpadcdn.com
  • prov*.dialpad.com

Learn more about Dialpad's Network Recommendations

Was this article helpful?

/