VPN Split-tunnels
    • 03 May 2024
    • 1 Minute to read
    • Dark
    • PDF

    VPN Split-tunnels

    • Dark
    • PDF

    Article summary

    Dialpad is not designed to function over a VPN. If your company uses a VPN, please utilize a split tunnel and direct Dialpad traffic outside of the VPN.

    VPNs are usually configured at the headquarters or the network branch levels. This is a security measure that keeps unwanted external access to your internal company data while allowing an encrypted connection from an external network with the correct permissions. 

    For example: an employee working from a remote site, remote office, or from their home can access applications available on the internal company network.

    Types of VPNS

    There are two types of VPNs: 

    1. Software
    2. Hardware

     The main difference is that hardware VPNs are physical stand-alone devices that handle VPN functions and which are typically installed in a data closet or networking center. Software VPNs are third-party applications that are much more widely utilized today versus hardware VPNs. You can install software VPNs on your devices to allow protected access to internal network systems and data, or to allow your network users access to applications on a third-party server.

    Split tunneling

    If you do use a VPN, Dialpad requests you utilize a split tunnel configuration.

    Split tunneling is a VPN feature that routes specific kinds of traffic through your local internet connection directly, and the rest of the traffic through the secure connection back to your company network. Split tunneling features in VPNs will typically let you choose which apps to send with VPN security and which can connect normally using the app's security tools. Dialpad has layers of substantial security best practices in use, and VPNs typically add substantial delays in data speeds that interfere with the smooth and orderly transmission of call traffic.

    There are typically two types of Split Tunneling VPN features available:

    • URL-based split tunneling lets you choose exactly which URLs you want to be encrypted through the VPN. This is usually done using a VPN browser extension.
    • App-based split tunneling works in a similar way, as it lets you choose which apps you want to be routed through your VPN, while the rest of your traffic travels through your regular network.

    FQDNs for Split Tunneling 

    Dialpad recommends you to allowlist traffic to/from each of the following FQDN in your VPN's split tunneling settings:

    • dialpad.com
    • www.obitalk.com
    • www1.obitalk.com
    • prov.obitalk.com
    • devpfs.obitalk.com
    • storage.googleapis.com
    • ubervoice.ubervoip.net
    • turn.ubervoip.net
    • stun.l.google.com
    • uvwss.ubervoip.net
    • legacy.dialpad.com
    • dialpadcdn.com
    • static.dialpadcdn.com
    • google-public-dns-a.google.com
    • google-public-dns-b.google.com
    • *pusher.com
    • *googleusercontent.com
    • prov*.dialpad.com

    Learn more about Dialpad's Network Recommendations

    Was this article helpful?

    What's Next