1.1. Firewall, Proxy and NAT Transparency
One of the key features of SoftEther VPN is the transparency for firewalls, proxy servers and NATs (Network Address Translators). NATs are sometimes implemented on broadband router products.
Backgrounds
Generally, in a company networks of nowadays, there are such a devices attached in order to separate between the inside network and outside for ensuring security. Not only for purpose of security, but also companies use firewalls, proxies and NATs in order to share the precious IP addresses with many computer users in the office. So such devices are indispensable today.
Tunnels of legacy VPN protocols, such as IPsec, L2TP and PPTP, cannot often be established through firewalls, proxy servers and NATs. There protocols were developed in the era before NATs were widely spread. For example, IPsec and L2TP use ESP (Encapsulating Security Payload) packets, and PPTP uses GRE (Generic Routing Encapsulation) packets. These packets are special forms of IP packets. Therefore generally firewalls, proxies and NATs are unable to pass these legacy VPN packets. Recently some venders of VPN products with IPsec, L2TP and PPTP tried to invent the extend method to pass through these wall devices, and some of VPN products are implemented with that extensions. But such extensions of legacy VPN protocols still have a problem of compatibles. In many cases, a user tries to establish a VPN connection by either L2TP or PPTP on the network which is with firewalls, proxy servers and NATs, but he will fail. You might have an experience that you stayed in the hotel room and tried to connect to your company's network by remote access VPN with either L2TP or PPTP but failed. The reason why it failed is that firewalls, proxy servers and NATs on the network were incompatible with either L2TP or PPTP.
Hence, it can be said that today's network administrators have a headache for a problem of incompatibles between VPN connections and security devices.
SoftEther VPN's Solution: Using HTTPS Protocol to Establish VPN Tunnels
SoftEther VPN uses HTTPS protocol in order to establish a VPN tunnel. HTTPS (HTTP over SSL) protocol uses the 443 of TCP/IP port as destination. This port is well-know and almost all firewalls, proxy servers and NATs can pass the packet which are consisted in HTTPS protocol.
HTTPS protocol is widely used on the Internet. When you open a web browser and access to the web site with security communications, HTTPS is used automatically. Thanks to HTTPS, you can transmit secret information such as credit card numbers via the Internet. Today's society activities are depending on HTTPS. Without HTTPS, you can no longer to use the Internet as a tool for electrical commercial transactions.
Thus, SoftEther VPN adopted HTTPS as the protocol for stabilizing and tunneling mechanism for VPN. SoftEther VPN can be used within almost all network environments, such as enterprise LAN, hotel room and airport free Wi-Fi access, differ to any other legacy VPNs such as IPsec, PPTP and L2TP.
Due to this feature of SoftEther VPN, you can easily design your own VPN topology which is suitable for your demands with a minimal effort of modifying the existing current your network security devices. If you want to use SoftEther VPN on your network, you need few efforts of modifying the current configuration and policy on your network thanks to SoftEther VPN's feature of good connectivity.
On the other hand, if you want to use legacy VPNs on your network, you have to modify the current network policies on the security devices such as firewall to allow passing the special IP protocol such as ESP and GRE. You also have to modify the configuration file on the firewall. Such works needs your extra effort and might cause some troublesome side effects on your stable and precious network. Not only bothering you by requirements of your efforts, you will have a risk to make the network dangerous because you have to change the setting of the firewall to punch a hold on it in order to allow passing the packet of legacy VPNs. If you use SoftEther VPN, you don't need either of these efforts and risks.
Some networks such as airport Wi-Fi and hotel-room Internets are restricting of using any other VPN else HTTP and HTTPS, due to security reason. In such a highly restricted network, the only single way to use VPN is to use HTTPS-packet-tunneling VPN such as SoftEther VPN.
Conclusions: SoftEther VPN is not just a VPN, but also very good VPN for an aspect of compatibility for Firewalls, Proxies and NATs.
