Before Reading the Manual

    You should be aware of the following before reading the manual.

    Who should Read the Manual?

    The SoftEther VPN official manual contains an overview of and information on how to use the latest release of next-generation VPN communications software provided by SoftEther VPN Project, how to construct a VPN, and how to solve problems. The manual is designed for network administrators, system administrators, system instructors, IT professionals and end users with detailed knowledge of computers who require information about the specifications of SoftEther VPN software.

    If you want to get a detailed understanding of SoftEther VPN and peripheral technologies, you should carefully read the entire manual. If not, you may just read the required sections and skip the others.

    One of the most important features of SoftEther VPN is that, when utilizing the advanced and efficient VPN functions, the end user is able to use VPN communications without a detailed knowledge of VPN. In other words, the software is easy to use and sufficient security is maintained even when in the initial state.

    In order to use the various functions of SoftEther VPN properly, we recommend you to read the entire manual. If using VPN of ordinary scale, all you need is some knowledge of TCP/IP and VPN. In this case, you may not have to read the entire manual.

     

    Required Basic Knowledge

    The following knowledge is necessary to fully understand the contents of the manual. If you recognize that you would not have a sufficient understanding of the following, you should get the required technical information from books or from the Internet and use it in combination with the manual.

    • Ethernet, principle communication system features of communications devices (network adapter, switching hub, etc.) for Ethernet and specific method of constructing a network using Ethernet
    • Internet Protocol (IP), principle communication system features of communications devices (router, layer 3 switch, etc.) for IP and specific method of constructing a network using IP.
    • Knowledge of various types of gateways such as NAT proxy server firewall used together with IP.
    • How to use several important network tools used for TCP/IP (ping, telnet, etc.)
    • Basic way to use computer systems and operating systems that use SoftEther VPN and basic information on network implementation of system.
    • Basic knowledge of PKI and certificate RSA code for using certificate authentication function (PKI). 

    Although not required, in some cases software functions may be used more effectively by learning about the following items as well as those given above.

    • Concept of user mode and kernel mode for ordinary operating systems.
    • Information concerning technologies frequently used in computers these days such as hardware interrupt, software interrupt and system call.
    • Implementation and architecture of TCP/IP for ordinary operating systems.
    • Information concerning old VPN protocol (PPTP, IPSec, etc.)
    • Detailed knowledge of features and phenomena that occur when using TCP/IP protocol on an actual network.
    • Knowledge concerning communications protocol for commonly used applications.
    • Knowledge concerning computers and programming required for advanced IT professionals and developers.

    Getting such supplementary knowledge is not only enables you to master SoftEther VPN, but facilitates troubleshooting when problems occur, stable operation and constructing and efficient system in fields not related to VPN as well.

    Notes

    The specifications of SoftEther VPN software and the contents of the manual are subject to change without notification. If you find any inconsistencies in descriptions of software functions or limitations in this manual and other documents released by SoftEther VPN Project, those that appear most frequently generally apply. Unless otherwise specified, the names of companies, organizations, products, people, characters or data that appear in the manual as examples are fictitious and bear no resemblance to actual companies, organizations, products, people, characters or data.