Back to Guides

Split tunneling with Mullvad VPN

Split tunneling is when you want some of your programs to use the VPN and the rest will go out via your regular Internet connection. You will use the SOCKS5 proxies for your programs that you want to go out via the VPN.

 

Linux using Mullvad client

  1. Edit /usr/lib/python2.7/dist-packages/mullvad/client.conf.linux and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255

    Disable Incoming UDP block in the client by clicking on Settings -> Advanced
  2. Change Block_incoming_udp = True to Block_incoming_udp = False and then click on OK
  3. Disable Block internet on connection failure by unchecking the checkbox under settings
  4. Reconnect
  5. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

Linux using OpenVPN

  1. Edit Mullvad_xx,ovpn / mullvad_linux.conf  and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255
  2. Reconnect
  3. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

 

Windows using Mullvad client

  1. Copy client.conf.windows found in C:\program files(x86)\mullvad  (if you are running 64bit Windows) to the desktop
  2. Edit client.conf.windows located on the desktop with wordpad and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255

    Save it, and then copy it back to C:\program files(x86)\mullvad
  3. Click Yes on the permission requester
  4. Disable Incoming UDP block in the client by clicking on Settings -> Advanced Change Block_incoming_udp = True to Block_incoming_udp = False and then click on OK
  5. Disable Block internet on connection failure by unchecking the checkbox under settings.
  6. Reconnect
  7. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

Windows using OpenVPN

  1. Copy mullvad_windows.conf.ovpn to the desktop and edit it with wordpad and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255

    Save it, and then copy it back to C:\program files\openvpn\config\ or C:\program files(x86)\openvpn\config\

  2. Click Yes on the permission requester
  3. Reconnect
  4. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

 

MacOS using Tunnelblick

  1. Edit the file OSX/Mullvad.tblk/mullvad_osx.conf found inside the mullvadconfig_xx.zip 
  2. Add the following options to it:
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255
  3. Save the file, and then import this profile into Tunnelblick
  4. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

 

 

 

Troubleshooting:

  1. Are you able to ping 10.8.0.1 ?  If you get responses then the connection to the VPN server is working.
  2. Are you not able to get DNS lookups through? (issue "nslookup sunet.se" in a terminal / command prompt and check which server it tries to use as well.
  3. Either set your DNS to 10.8.0.1 or 193.138.219.228 to make sure the DNS requests goes via the VPN tunnel
  4. If your browser works with SOCKS5 enabled works but fails without, then it is most likely a DNS issue.