2.1 VPN Communication Protocol

    Table of contents
    You are currently comparing two old versions - only when you are comparing against the latest version can you revert. Return to version archive.

    Combined revision comparison

    Comparing version 20:37, 17 Mar 2014 by yamame with version 18:01, 21 Apr 2014 by yamame.

    ...

    • If physical IP networks that conduct VPN communications are limited to physically secure LAN and it is physically difficult for a malicious third party to eavesdrop on and/or tamper with packets on the line.
    • If communications are conducted by dedicated frame relay offered by communications provider or on a network with high reliability whereby eavesdropping by other users is difficult such as wide area Ethernet and the service provided by the communications provider is sufficiently reliable.
    • If SoftEther VPN protocol is combined with other software (SSH port transmission tool, etc.) and encryption has been carried out theis carried out lower layer.
    • If the same computer is operating between VPN connection source software and SoftEther VPN Server (case where connected to localhost). TheA connection configuration such as this results when cascade connection, etc., is conducted among Virtual Hubs of the same VPN Server.

    ...

    SoftEther VPN protocol can compress sent and receivedall Ethernet framesall Ethernet framessent and received internally and transmit them. The deflate algorithm developed by Jean-loup Gailly and Mark Adler is used as the data compression algorithm. The compression parameter is set so processing is executed at the fastest speed.

    ...

    RC4-MD5 is the fastest algorithm that offers a certain degree of security. There is no need  for you to select another algorithm without a special reason. In a service environment where only a certain algorithm such as AES can be used due to regulations or an administrator that is strictedstrict about encryption, you can use a more secure encryption algorithm such as AES.

    ...

    Version from 20:37, 17 Mar 2014

    This revision modified by yamame (Ban)

    ...

    • If physical IP networks that conduct VPN communications are limited to physically secure LAN and it is physically difficult for a malicious third party to eavesdrop on and/or tamper with packets on the line.
    • If communications are conducted by dedicated frame relay offered by communications provider or on a network with high reliability whereby eavesdropping by other users is difficult such as wide area Ethernet and the service provided by the communications provider is sufficiently reliable.
    • If SoftEther VPN protocol is combined with other software (SSH port transmission tool, etc.) and encryption is carried out lower layer.
    • If the same computer is operating between VPN connection source software and SoftEther VPN Server (case where connected to localhost). A connection configuration such as this results when cascade connection, etc., is conducted among Virtual Hubs of the same VPN Server.

    ...

    SoftEther VPN protocol can compress all Ethernet framessent and received internally and transmit them. The deflate algorithm developed by Jean-loup Gailly and Mark Adler is used as the data compression algorithm. The compression parameter is set so processing is executed at the fastest speed.

    ...

    RC4-MD5 is the fastest algorithm that offers a certain degree of security. There is no need to select another algorithm without a special reason. In a service environment where only a certain algorithm such as AES can be used due to regulations or an administrator that is strict about encryption, you can use a more secure encryption algorithm such as AES.

    ...

    Version as of 18:01, 21 Apr 2014

    This revision modified by yamame (Ban)

    ...

    • If physical IP networks that conduct VPN communications are limited to physically secure LAN and it is physically difficult for a malicious third party to eavesdrop on and/or tamper with packets on the line.
    • If communications are conducted by dedicated frame relay offered by communications provider or on a network with high reliability whereby eavesdropping by other users is difficult such as wide area Ethernet and the service provided by the communications provider is sufficiently reliable.
    • If SoftEther VPN protocol is combined with other software (SSH port transmission tool, etc.) and encryption has been carried out the lower layer.
    • If the same computer is operating between VPN connection source software and SoftEther VPN Server (case where connected to localhost). The connection configuration such as this results when cascade connection, etc., is conducted among Virtual Hubs of the same VPN Server.

    ...

    SoftEther VPN protocol can compress sent and receivedall Ethernet frames internally and transmit them. The deflate algorithm developed by Jean-loup Gailly and Mark Adler is used as the data compression algorithm. The compression parameter is set so processing is executed at the fastest speed.

    ...

    RC4-MD5 is the fastest algorithm that offers a certain degree of security. There is no need  for you to select another algorithm without a special reason. In a service environment where only a certain algorithm such as AES can be used due to regulations or an administrator that is stricted about encryption, you can use a more secure encryption algorithm such as AES.

    ...