1.1 What is SoftEther VPN?

    Table of contents
    You are currently comparing two old versions - only when you are comparing against the latest version can you revert. Return to version archive.

    Combined revision comparison

    Comparing version 10:07, 21 Jan 2019 by Admin with version 05:04, 12 Mar 2019 by seoss.

    ...

    Using this tunnellingWith this tunneling technology, multiple computers and LANs deployed in several remote locations can be securely connected together over the avaialbe, insecure, WAN and Internetat remote bases, computers, computer network, by connecting using VPN, a safe virtual network built by VPN can theoretically be made independent of WAN lines such as the Internet with security problems.

    ...

    Many home and business privateWith many business networks as some home networks, company networks are separated from the Internet by a network gateway device such as a NAT (IP masquerading),measures such as NAT (IP masquerade) proxy servers and firewalls.  These gateway devices may be a dedicated device (appliance) or a high performance computer running Linux etc.  The gateway device performs both security functions as well as limiting the number of actual Internet addresses needed to connect the private network to the Internet, number of IP addresses is limited and security is bolstered. Devices that conduct this processing are called network gateway devices. In some cases network gateway device is a dedicated device (appliance) and in some cases is a high-performance computer on which Linux, etc., is installed.

    However many older VPN protocols cannot communicate via this network gateway device. One reason for this is many VPN protocols use special headers when encapsulating communications packets that are not part ofheadersof special protocol that is not ordinary TCP/IP protocol may be added when encapsulating communications packets. For example a VPN protocol called PPTP uses an extremely minor protocol called Generic Routing Encapsulation (GRE). A VPN protocol called L2TP furthermore requires use of IPSec, whereby a header is added because it is an IPSec packet.

    The result of using non-standard TCP/IP such as mentioned in the examples is that traditional VPN communications are prevented by, or at least impose the need for configuration changes to, most network gateway devices (NAT, proxy majority of conventional VPN protocols such as in these examples, because VPN communications is realized by an approach unlike ordinary TCP/IP connection-oriented communication model, it cannot carry out VPN communications transcending in many network gateway devices, especially NAT (IP masquerade), almost all proxy servers and firewalls. server, firewalls).  In may also become necessary to allocate global IP addresses to each endTherefore when used, the majority of conventional VPN protocols require a global IP address will be allotted to both of the VPN connection .source client computer and connection destination VPN server computer. Or  installation of network gateway devices can be customized so special packets can be processed.

    ...

     

    Along with solving the various previouslyvarious limitations of old VPN solutions that has been described earlier, SoftEther VPN is the VPN software that many have been waiting for, incorporating many new andinnovative functionshavebeenwaited for which have many new innovative functions with.

    ...

    The great advantage of SoftEther VPN is that By just using SoftEther VPN, many of the matters such as those it overcomes the limitations of older VPN solutions very simplyproblems in the past could not be solved (unless you combined multiple network security products or software, and programming or developed original tools) can be realized by a simple operation.

    SoftEther VPN carries out encapsulation and tunnelling atis set to, encapsulated and tunneling communications and layer 2, in other words , to Ethernet. When SoftEther VPN is used, network devices such as conventional network adaptersadapter switching HUB and layer 3 switchingswitch are realized by software.  Using SoftEther VPN, the user creates a highly flexible, secure tunnel based on the widely available and easy TCP/IP protocol, and by connecting the tunnel called SoftEther VPN protocol based on TCP/IP protocol among them, the user can construct highly flexible VPN that was never possible with products up to now.

    ...

    Unlike the many oldoldmany VPN protocols, SoftEther VPN targets the layer 2 (Ethernet) for VPN communications. In other words, with VPN which have targeted old layer 3, encapsulated IP packets flowed through the tunnel. But with SoftEther VPN, it will encapsulated Ethernet packets flow though the tunnel.

    ...

    Version from 10:07, 21 Jan 2019

    This revision modified by Admin (Ban)

    ...

    With this tunneling technology, multiple computers at remote bases, computers, computer network, by connecting using VPN, a safe virtual network built by VPN can theoretically be made independent of WAN lines such as the Internet with security problems.

    ...

    With many business networks as some home networks, company networks are separated from the Internet by measures such as NAT (IP masquerade) proxy servers and firewalls, number of IP addresses is limited and security is bolstered. Devices that conduct this processing are called network gateway devices. In some cases network gateway device is a dedicated device (appliance) and in some cases is a high-performance computer on which Linux, etc., is installed.

    However many older VPN protocols cannot communicate via this network gateway device. One reason for this is many VPN protocols headers of special protocol that is not ordinary TCP/IP protocol may be added when encapsulating communications packets. For example a VPN protocol called PPTP uses an extremely minor protocol called Generic Routing Encapsulation (GRE). A VPN protocol called L2TP furthermore requires use of IPSec, whereby a header is added because it is an IPSec packet.

    The majority of conventional VPN protocols such as in these examples, because VPN communications is realized by an approach unlike ordinary TCP/IP connection-oriented communication model, it cannot carry out VPN communications transcending in many network gateway devices, especially NAT (IP masquerade), almost all proxy servers and firewalls.

    Therefore when used, the majority of conventional VPN protocols require a global IP address will be allotted to both of the VPN connection source client computer and connection destination VPN server computer. Or  installation of network gateway devices can be customized so special packets can be processed.

    ...

    Along with solving various limitations of old VPN solutions that has been described earlier, SoftEther VPN is the VPN software that have been waited for which have many new innovative functions with.

    ...

    By just using SoftEther VPN, many of the matters such as those problems in the past could not be solved (unless you combined multiple network security products or software, and programming or developed original tools) can be realized by a simple operation.

    SoftEther VPN is set to, encapsulated and tunneling communications and layer 2, in other words, to Ethernet. When SoftEther VPN is used, network devices such as conventional network adapter switching HUB and layer 3 switch are realized by software, and by connecting the tunnel called SoftEther VPN protocol based on TCP/IP protocol among them, the user can construct highly flexible VPN that was never possible with products up to now.

    ...

    Unlike the oldmany VPN protocols, SoftEther VPN targets the layer 2 (Ethernet) for VPN communications. In other words, with VPN which have targeted old layer 3, encapsulated IP packets flowed through the tunnel. But with SoftEther VPN, it will encapsulated Ethernet packets flow though the tunnel.

    ...

    Version as of 05:04, 12 Mar 2019

    This revision modified by seoss (Ban)

    ...

    Using this tunnelling technology, multiple computers and LANs deployed in several remote locations can be securely connected together over the avaialbe, insecure, WAN and Internet.

    ...

    Many home and business private networks are separated from the Internet by a network gateway device such as a NAT (IP masquerading), proxy servers and firewalls.  These gateway devices may be a dedicated device (appliance) or a high performance computer running Linux etc.  The gateway device performs both security functions as well as limiting the number of actual Internet addresses needed to connect the private network to the Internet.

    However many older VPN protocols cannot communicate via this network gateway device. One reason for this is many VPN protocols use special headers when encapsulating communications packets that are not part of ordinary TCP/IP protocol. For example a VPN protocol called PPTP uses an extremely minor protocol called Generic Routing Encapsulation (GRE). A VPN protocol called L2TP furthermore requires use of IPSec, whereby a header is added because it is an IPSec packet.

    The result of using non-standard TCP/IP such as mentioned in the examples is that traditional VPN communications are prevented by, or at least impose the need for configuration changes to, most network gateway devices (NAT, proxy server, firewalls).  In may also become necessary to allocate global IP addresses to each end of the VPN connection.

    ...

    Along with solving the various previously limitations of old VPN solutions, SoftEther VPN is the VPN software that many have been waiting for, incorporating many new andinnovative functions.

    ...

    The great advantage of SoftEther VPN is that it overcomes the limitations of older VPN solutions very simply.

    SoftEther VPN carries out encapsulation and tunnelling at layer 2, in other words Ethernet. When SoftEther VPN is used, network devices such as conventional network adapters switching HUB and layer 3 switching are realized by software.  Using SoftEther VPN, the user creates a highly flexible, secure tunnel based on the widely available and easy TCP/IP protocol.

    ...

    Unlike the many old VPN protocols, SoftEther VPN targets the layer 2 (Ethernet) for VPN communications. In other words, with VPN which have targeted old layer 3, encapsulated IP packets flowed through the tunnel. But with SoftEther VPN, it will encapsulated Ethernet packets flow though the tunnel.

    ...