
Making Sense of Cato’s New Flexible Traffic Routing – What It Means for Users, Admins, and the Business
🕓 September 2, 2025
The promise of Cato Networks has always been “one client, any resource, anywhere.”
With Windows Client v5.16, Cato extends that promise by letting you decide exactly which bits of traffic should—or should not—flow through the Cato Cloud. Until now you had an all-or-nothing choice: send everything down the tunnel (full tunnel) or carve out exclusions one CIDR block at a time. The new features flip that around: you can keep most traffic local and selectively steer only the flows that truly benefit from Cato’s security stack or global backbone.
For enterprises in the middle of a phased SASE rollout, that extra granularity is gold. It removes the “big-bang” barrier to adoption, reduces troubleshooting friction, and gives security teams confidence that critical controls remain in place even as legacy infrastructures coexist.
Split tunneling describes any deployment in which a VPN or ZTNA client carries some traffic to a secure gateway while leaving the rest to travel over the local (or “native”) network path.
Historically, administrators split traffic for three reasons:
But traditional split policies were static: if a subnet was excluded once, it stayed excluded no matter where the laptop travelled. That blunt approach breaks down in a hybrid world where the same user moves between a secure office, a home router, a coffee-shop hotspot and, perhaps, an untrusted client site—all in a single day.
Cato’s new release solves that by introducing four mutually reinforcing capabilities.
What it does
Daily impact
Example scenarios
Situation | Old work-around | New granular rule |
---|---|---|
Branch laptops must reach a legacy file server over MPLS, but everything else over the tunnel. | Static exclusion of 10.10.0.0/16; broke access when the laptop left the branch. | IF dest = 10.10.0.0/16 AND src network = Managed THEN Exclude Tunnel |
Field engineers need low-latency connection to industrial cameras (UDP/554) only while on factory Wi-Fi. | Forced full split at interface level; risked sending corporate traffic clear. | IF protocol = UDP AND port = 554 AND src network = Unmanaged THEN Exclude Tunnel |
What it does
Why it helps
End-user experience
Users generally won’t notice a thing—browser sessions load through Cato’s secure PoP (so phishing and malware filtering apply) while their YouTube video or Windows Update downloads at full speed from the local ISP cache.
The pain it solves
Classic full-tunnel VPNs break split-horizon DNS designs; employees on the road resolve any corp.local record but lose reachability to the corresponding internal IP, or they hammer the corporate resolvers with every Google query, adding latency.
How Cato fixes it
Benefits
Pro tip: Pair this with Cato’s DNS Security feature so that even local recursive queries benefit from threat intelligence via DoH/DoT upstream.
What changed
Real-world use cases
The name change seems cosmetic but signals a philosophical shift: trust is no longer binary or automatic; instead, a network is “managed” because you enforce controls there. This language reinforces zero-trust principles and avoids confusion for auditors reviewing policy sets.
1.Policy as code (sort of)
Granular rules with logical conditions mean fewer manual subnet listings and no hunt for duplicate entries. Policies resemble firewall rule bases most admins already know.
2.Change once, apply everywhere
Update a single Split Tunnel profile and every Windows Client ≥ v5.16 adopts it on next check-in. No registry edits, no packaging.
3.Reduced help-desk tickets
4. Incremental onboarding
Move a business unit to web-only first, verify, then expand to full tunnel without reinstalling or re-educating.
5. Audit & reporting clarity
Cato’s analytics now annotate traffic as Included/Excluded by rule-ID, so you can prove segmentation to compliance teams.
Daily friction point | Old experience | New experience |
---|---|---|
Slow SaaS logins from hotel Wi-Fi | All traffic hair-pinned to the nearest PoP hundreds of km away. | Web-Only policy sends SaaS over Cato’s backbone but streams and updates stay local → snappier browsing. |
Access to local smart printer or NAS | Printer unreachable → user disables VPN. | Granular rule excludes 192.168.0.0/24 only when the Wi-Fi SSID matches Home → seamless printing. |
In-office Wi-Fi congestion | Full tunnel doubles traffic exiting branch. | Managed-network exemption keeps in-office Microsoft Teams peer-to-peer. |
Battery drain on 5G hotspot | Encrypted tunnel for every packet. | Split DNS + TCP only via tunnel → fewer CPU cycles, less mobile data. |
In short, users feel faster, more stable connections without noticing the security controls behind the scenes.
Not if implemented correctly. Cato’s architecture still enforces identity, device posture, and application access controls at the first packet. Split tunneling simply dictates where the inspection happens. Key safeguards remain:
Tip | Why / How |
---|---|
Use URL categories rather than raw IPs** for SaaS—Microsoft ranges change weekly. | Cato’s cloud database auto-updates. |
Enable DoH for external DNS inside the tunnel** to keep privacy intact. | Reduces ISP-level spying on SaaS usage. |
Tag rules with version numbers (e.g., WebOnly_v1) to simplify rollback. | Easier change control audits. |
Leverage Cato’s API to update Managed-Network lists from DHCP scopes. | Automates M&A site onboarding. |
Monitor “Excluded Traffic” widget weekly**; spikes may reveal shadow-IT or mis-tagged apps. | Keeps the security surface tight. |
The Flexible Traffic Routing update turns Cato Client from a straightforward cloud-VPN into a context-aware traffic director. End users benefit from faster, battery-friendlier connections; administrators gain draggable policy controls; and the business enjoys smoother, phased SASE adoption without compromising security.
If you’re still running an “all or nothing” VPN (legacy or Cato), now is the moment to pilot Web-Only tunneling and DNS split on a subset of devices. You’ll likely find that support tickets drop, adoption accelerates, and leadership finally gets the “network agility” they’ve been promised for years—no forklift upgrade required.
Curious how Flexible Traffic Routing could reduce tickets in your environment? Book a Free Consultation with our Cato expert Today.
Flexible traffic routing allows IT teams to define granular split-tunneling policies. Instead of an all-or-nothing VPN tunnel, admins can decide which applications, ports, protocols, or domains flow through the Cato Cloud, and which stay on the local network.
Traditional split tunneling relied on static subnet exclusions, which often broke when users changed networks. Cato’s approach is context-aware: policies adapt based on location (managed vs. unmanaged networks), application type, or protocol, ensuring security and user experience remain consistent.
End users enjoy faster SaaS logins, seamless access to local resources like printers, improved battery life on mobile devices, and smoother video calls. They experience fewer disruptions since the client automatically routes traffic through the best path without requiring manual intervention.
The web-only tunnel routes only HTTP/HTTPS traffic through the Cato Cloud, while everything else (such as OS updates, file transfers, or VoIP) bypasses it locally. This ensures users still get web protection (SWG, CASB, phishing filtering) while reducing overhead and latency for non-web traffic.
No. Security remains intact because identity, device posture, and ZTNA policies still apply at the first packet. SaaS and web traffic continues to benefit from CASB, SWG, and threat detection. Local traffic that bypasses the tunnel can be protected by endpoint EDR or existing LAN firewalls, ensuring defense-in-depth.
DNS split tunneling ensures that private/internal DNS queries bypass the tunnel for faster local resolution, while public DNS queries remain protected by Cato’s SWG and threat intelligence. This reduces latency, improves compatibility with hybrid networks, and maintains security visibility.
With managed vs. unmanaged network rules, the same device can follow stricter policies on public Wi-Fi while enjoying optimized access on corporate LAN. For example, contractors or BYOD devices on office networks can run full tunnel policies, while on coffee-shop Wi-Fi only corporate apps route through Cato.
Admins gain centralized, firewall-like policy management. They no longer need to maintain long exclusion lists. Rules are easier to audit, apply globally, and update instantly across clients. Troubleshooting tickets also drop since local services like printers and video calls no longer break.
Yes. Enterprises can start small by enabling web-only or DNS split for a pilot group, then gradually expand policies to more users and applications. This reduces risk, lowers resistance to adoption, and avoids the need for disruptive “big-bang” migrations.
Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.
Share it with friends!
🕓 September 2, 2025
🕓 September 2, 2025
🕓 August 30, 2025
share your thoughts