Many thanks for the answer to my query. Steve backed up my theory. As I am not a professional hacker, it would be great to know how I could piggy back or hijack a VPN session from the Internet so that I can prove to our network guy that split tunneling is indeed a risk.
I don't know how I could describe for you how to do this without giving out sources and methods to those that could be hackers. Ethically, I really can't do that. However, I can point you to some other sources so that perhaps having the overwhelming evidence will convince your network guy.
From the SANS Institute: Telecommuting safely -- remote node or remote session?, by Mark Levine
From CSOonline: Addressing teleworker network security risks, by Chad Robinson of Robert Frances Group
From SearchNetworking.com: Know your split-tunnel "gotchas", by Tom Lancaster
From Security Management Online: Tunnel of Secure Transmission, by Christopher J. Carlson
Finally, by allowing split tunneling, you are in effect dual-homing your remote client on both your internal network and the Internet at the same time. Since you likely cannot control how your remote client is configured, that is the same as opening up your corporate network to whatever bad things can happen to that remote client. Is the antivirus up-to-date on that remote client? I hope so, because if a virus gets on it, it can easily spread to the corporate network, bypassing any antivirus at your corporate firewall. Does your remote user have a wireless network at home? If so, can his neighbor hack into that network and then use the tunnel that has been set up because the shared permissions of the home network are setup wrong? Probably.
I really cannot emphasize enough that split-tunneling is a really bad idea.
Dig deeper on SSL and TLS VPN Security
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.