• Top
  • Why SoftEther VPN
    • Introductions
    • Screenshots
    • Specification
  • Documents
    • Reference Manual
    • Tutorials
    • FAQs and KBs
    • Research Works
  • Download
    • Download SoftEther VPN
    • Version History
    • Source Code
    • GitHub Repository
  • Support
  • About Project

SoftEther VPN Project
Documents
SoftEther VPN Manual
0. Introduction
1. SoftEther VPN Overview
2. SoftEther VPN Essential Architecture
3. SoftEther VPN Server Manual
4. SoftEther VPN Client Manual
5. SoftEther VPN Bridge Manual
6. Command Line Management Utility Manual
7. Installing SoftEther VPN Server
8. Installing SoftEther VPN Client
9. Installing SoftEther VPN Bridge
10. Examples of Building VPN Networks
10.1 Types of VPNs
10.2 Common Concepts and Knowledge
10.3 Build a PC-to-PC VPN
10.4 Build a PC-to-LAN Remote Access VPN
10.5 Build a LAN-to-LAN VPN (Using L2 Bridge)
10.6 Build a LAN-to-LAN VPN (Using L3 IP Routing)
10.7 Mixture of LAN-to-LAN VPN and Remote Access VPN
10.8 Build a Large Scale Remote Access VPN Service
10.9 Build a Large Scale Virtual Hub Hosting Service
10.10 Your Home PC as VPN Relay for Protect WiFi Using
10.11 Exploit SecureNAT for Remote Access into Firewall without Any Permission
11. Troubleshooting and Supplemental Guide
Table of contents
No headers

10. Examples of Building VPN Networks

    Table of contents
    No headers

    Version as of 19:55, 25 Aug 2025

    to this version.

    Return to Version archive.

    View current version

    This page has no content. Enrich SoftEther.org by contributing.

     

    • 10.1 Types of VPNs
    • 10.2 Common Concepts and Knowledge
    • 10.3 Build a PC-to-PC VPN
    • 10.4 Build a PC-to-LAN Remote Access VPN
    • 10.5 Build a LAN-to-LAN VPN (Using L2 Bridge)
    • 10.6 Build a LAN-to-LAN VPN (Using L3 IP Routing)
    • 10.7 Mixture of LAN-to-LAN VPN and Remote Access VPN
    • 10.8 Build a Large Scale Remote Access VPN Service
    • 10.9 Build a Large Scale Virtual Hub Hosting Service
    • 10.10 Your Home PC as VPN Relay for Protect WiFi Using
    • 10.11 Exploit SecureNAT for Remote Access into Firewall without Any Permission

    Japanese (日本語) | Support | About Us | University of Tsukuba
    Copyright © SoftEther Project.
    • Log in
     
    • Templates
    • Users
    • Popular pages
    • Desktop Suite
     
     
    • Edit page
    • New page
    • Save as PDF
    • Restrict access
    • Attach file
    • Email link
    • Move page
    • Delete page
    • Tag
    • Set page properties
    • View source
    • Watch page
     
     
    Table of contents
    No headers
     
    • dismiss message
    • view details
    Message will close by itself in seconds Message timer has been stopped

    Viewing Details: