Back to Guides

Split tunneling with Mullvad VPN

Split tunneling is when you want some of your programs to use the VPN and the rest will go out via your regular Internet connection. You will use the SOCKS5 proxies for your programs that you want to go out via the VPN.

 

Linux using Mullvad client

  1. Edit /usr/lib/python2.7/dist-packages/mullvad/client.conf.linux and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255

    Disable Incoming UDP block in the client by clicking on Settings -> Advanced
  2. Change Block_incoming_udp = True to Block_incoming_udp = False and then click on OK
  3. Reconnect
  4. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

Linux using OpenVPN

  1. Edit Mullvad_xx,ovpn / mullvad_linux.conf  and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255
  2. Reconnect
  3. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

 

Windows using Mullvad client

  1. Copy client.conf.windows found in C:\program files(x86)\mullvad  (if you are running 64bit Windows) to the desktop
  2. Edit client.conf.windows located on the desktop with wordpad and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255

    Save it, and then copy it back to C:\program files(x86)\mullvad
  3. Click Yes on the permission requester
  4. Disable Incoming UDP block in the client by clicking on Settings -> Advanced
    Change Block_incoming_udp = True to Block_incoming_udp = False and then click on OK
  5. Reconnect
  6. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.

Windows using OpenVPN

  1. Copy mullvad_windows.conf.ovpn to the desktop and edit it with wordpad and add
    route-nopull
    route 10.8.0.1 255.255.255.255
    route 193.138.219.228 255.255.255.255
    Save it, and then copy it back to C:\program files\openvpn\config\ or C:\program files(x86)\openvpn\config\

  2. Click Yes on the permission requester
  3. Reconnect
  4. Follow the SOCKS5 guide for how to configure your clients that should go out via the VPN.