{
	"id": "cf7070de-7f5f-4da8-813d-7f850b4964ae",
	"created_at": "2026-04-06T00:09:51.084331Z",
	"updated_at": "2026-04-10T13:12:40.142885Z",
	"deleted_at": null,
	"sha1_hash": "58bf51abbb819f1b994817afa524acc2d4bde2cd",
	"title": "SoftEther VPN Project - SoftEther VPN Project",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1176677,
	"plain_text": "SoftEther VPN Project - SoftEther VPN Project\r\nArchived: 2026-04-05 17:05:16 UTC\r\nSoftEther VPN Project develops and distributes SoftEther VPN,\r\nAn Open-Source Free Cross-platform Multi-protocol VPN Program,\r\nas an academic project from University of Tsukuba, under the Apache License 2.0.\r\nWhat is SoftEther VPN\r\nSoftEther VPN\r\n(\"SoftEther\" means \"Software Ethernet\") is one of the world's most powerful and easy-to-use multi-protocol VPN\r\nsoftware. It runs on Windows, Linux, Mac, FreeBSD and Solaris.\r\nSoftEther VPN is open source. You can use SoftEther for any personal or commercial use for free charge.\r\nSoftEther VPN is an optimum alternative to OpenVPN and Microsoft's VPN servers. SoftEther VPN has a clone-function of OpenVPN Server. You can integrate from OpenVPN to SoftEther VPN smoothly. SoftEther VPN is\r\nfaster than OpenVPN. SoftEther VPN also supports Microsoft SSTP VPN for Windows Vista / 7 / 8. No more\r\nneed to pay expensive charges for Windows Server license for Remote-Access VPN function.\r\nhttps://www.softether.org/\r\nPage 1 of 13\n\nSoftEther VPN can be used to realize BYOD (Bring your own device) on your business. If you have smartphones,\r\ntablets or laptop PCs, SoftEther VPN's L2TP/IPsec server function will help you to establish a remote-access VPN\r\nfrom your local network. SoftEther VPN's L2TP VPN Server has strong compatible with Windows, Mac, iOS and\r\nAndroid.\r\nSoftEther VPN\r\nis not only an alternative VPN server to existing VPN products (OpenVPN, IPsec and MS-SSTP). SoftEther VPN\r\nhas also original strong SSL-VPN protocol to penetrate any kinds of firewalls. Ultra-optimized SSL-VPN Protocol\r\nof SoftEther VPN has very fast throughput, low latency and firewall resistance.\r\nSoftEther VPN has strong resistance against firewalls than ever. Built-in NAT-traversal penetrates your network\r\nadmin's troublesome firewall for overprotection. You can setup your own VPN server behind the firewall or NAT\r\nin your company, and you can reach to that VPN server in the corporate private network from your home or\r\nmobile place, without any modification of firewall settings. Any deep-packet inspection firewalls cannot detect\r\nSoftEther VPN's transport packets as a VPN tunnel, because SoftEther VPN uses Ethernet over HTTPS for\r\ncamouflage.\r\nhttps://www.softether.org/\r\nPage 2 of 13\n\nEasy to imagine, design and implement\r\nyour VPN topology with SoftEther VPN. It virtualizes Ethernet by software-enumeration. SoftEther VPN Client\r\nimplements Virtual Network Adapter, and SoftEther VPN Server implements Virtual Ethernet Switch. You can\r\neasily build both Remote-Access VPN and Site-to-Site VPN, as expansion of Ethernet-based L2 VPN. Of course,\r\ntraditional IP-routing L3 based VPN can be built by SoftEther VPN.\r\nSoftEther VPN has strong compatibility to today's most popular VPN products among\r\nthe world. It has the interoperability with OpenVPN, L2TP, IPsec, EtherIP, L2TPv3, Cisco VPN Routers and MS-SSTP VPN Clients. SoftEther VPN is the world's only VPN software which supports SSL-VPN, OpenVPN, L2TP,\r\nEtherIP, L2TPv3 and IPsec, as a single VPN software.\r\nSoftEther VPN is free software because it was developed as Daiyuu Nobori's Master Thesis research in the\r\nUniversity. You can download and use it from today. The source-code of SoftEther VPN is available under the\r\nApache License 2.0.\r\nFeatures of SoftEther VPN\r\nhttps://www.softether.org/\r\nPage 3 of 13\n\nFree\r\nand open-source software.\r\nEasy to establish both remote-access and site-to-site VPN.\r\nSSL-VPN Tunneling on HTTPS to pass through NATs and firewalls.\r\nRevolutionary VPN over ICMP and VPN over DNS features.\r\nResistance to highly-restricted firewall.\r\nEthernet-bridging (L2) and IP-routing (L3) over VPN.\r\nEmbedded dynamic-DNS and NAT-traversal so that no static nor fixed IP address is required.\r\nAES 256-bit and RSA 4096-bit encryptions.\r\nSufficient security features such as logging and firewall inner VPN tunnel.\r\n1Gbps-class high-speed throughput performance with low memory and CPU usage.\r\nWindows, Linux, Mac, Android, iPhone, iPad and Windows Mobile are supported.\r\nSSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP)\r\nare all supported as VPN tunneling underlay protocols.\r\nThe OpenVPN clone function supports legacy OpenVPN clients.\r\nIPv4 / IPv6 dual-stack.\r\nThe VPN server runs on Windows, Linux, FreeBSD, Solaris and Mac OS X.\r\nConfigure All settings on GUI.\r\nMulti-languages (English, Japanese and Simplified-Chinese).\r\nhttps://www.softether.org/\r\nPage 4 of 13\n\nNo memory leaks. High quality stable codes, intended for long-term runs. We always verify that there are\r\nno memory or resource leaks before releasing the build.\r\nRADIUS / NT Domain user authentication function\r\nRSA certificate authentication function\r\nDeep-inspect packet logging function\r\nSource IP address control list function\r\nsyslog transfer function\r\nMore details at Specification.\r\nArchitecture of SoftEther VPN\r\nVirtualization of Ethernet devices is the key of the SoftEther VPN architecture. SoftEther VPN virtualizes\r\nEthernet devices in order to realize a flexible virtual private network for both remote-access VPN and site-to-site\r\nVPN. SoftEther VPN implements the Virtual Network Adapter program as a software-emulated traditional\r\nEthernet network adapter. SoftEther VPN implements the Virtual Ethernet Switch program (called Virtual Hub) as\r\na software-emulated traditional Ethernet switch. SoftEther VPN implements VPN Session as a software-emulated\r\nEthernet cable between the network adapter and the switch.\r\nYou can create one or many Virtual Hub with SoftEther VPN on your server computer. This server computer will\r\nbecome a VPN server, which accepts VPN connection requests from VPN client computers.\r\nYou can create one or many Virtual Network Adapter with SoftEther VPN on your client computer. This client\r\ncomputer will become a VPN client, which establishes a VPN connections to the Virtual Hub on the VPN server.\r\nYou can establish VPN sessions, as called 'VPN tunnels', between VPN clients and VPN servers. A VPN session is\r\nthe virtualized network cable. A VPN session is realized over a TCP/IP connection. The signals through the VPN\r\nhttps://www.softether.org/\r\nPage 5 of 13\n\nsession is encrypted by SSL. Therefore, you can safely establish a VPN session beyond the Internet. A VPN\r\nsession is established by SoftEther VPN's \"VPN over HTTPS\" technology. It means that SoftEther VPN can create\r\na VPN connection beyond any kinds of firewalls and NATs.\r\nThe Virtual Hub exchanges all Ethernet packets from each connected VPN session to other connected sessions.\r\nThe behavior is same to traditional Ethernet switches. The Virtual Hub has a FDB (forwarding database) to\r\noptimize the transmission of Ethernet frames.\r\nYou can define a local bridge between the Virtual Hub and the existing physical Ethernet segment by using the\r\nLocal Bridge function. The Local Bridge exchanges packets between the physical Ethernet adapter and the Virtual\r\nHub. You can realize a remote-access VPN from home or mobile to the company network by using the Local\r\nBridge function.\r\nYou can define a cascading connection between two or more remote Virtual Hubs. With cascading, you can\r\nintegrate two or more remote Ethernet segments to a single Ethernet segment. For example, after you establish\r\ncascading connections between the site A, B and C, then any computers in the site A will be able to communicate\r\nwith the computers in the site B and the site C. This is a site-to-site VPN.\r\nSoftEther VPN can also establish a VPN session over UDP. The UDP-mode of SoftEther VPN supports NAT\r\ntraversal. The NAT traversal function allows the VPN server behind existing NATs or firewalls to accept incoming\r\nVPN sessions. You need no network administrator's special permission before setting up a VPN server on the\r\ncompany network behind firewalls or NATs. Additionally, SoftEther VPN Server may be placed on the dynamic IP\r\naddress environment since SoftEther VPN has built-in Dynamic DNS (DDNS) function.\r\nSoftEther VPN Server supports additional VPN protocols, including L2TP/IPsec, OpenVPN, Microsoft SSTP,\r\nL2TPv3 and EtherIP. These realizes the interoperability with built-in L2TP/IPsec VPN clients on iPhone, iPad,\r\nAndroid, Windows and Mac OS X, and also with Cisco's VPN routers and other vendors VPN products.\r\nhttps://www.softether.org/\r\nPage 6 of 13\n\nHow to Use SoftEther VPN ?\r\nSoftEther VPN is an essential infrastructure to build-up IT systems on enterprises and small-businesses.\r\nAd-hoc VPN\r\nMake an ad-hoc VPN consists of the small-number\r\ncomputers with SoftEther VPN. Despite long-distance,\r\nit is easy to communicate mutually with any kinds of\r\nLAN-oriented protocols.\r\nLAN to LAN Bridge\r\nGeologically distributed branches are isolated as\r\nnetworks by default. SoftEther VPN lays virtual\r\nEthernet cables between your all branches. Then all\r\ncomputers of all branches are connected to the single\r\nLAN.\r\nRemote Access to LAN\r\nDoes employees need to connect to the company\r\nLAN from outside or home? Remote Access VPN\r\nwill realizes virtual network cable from a Client\r\nPC to the LAN from anywhere and anytime.\r\nSoftEther VPN can build-up flexible and dependable virtual network around Clouds. Amazon EC2, Windows\r\nAzure and most of other Clouds are supporting SoftEther VPN.\r\nhttps://www.softether.org/\r\nPage 7 of 13\n\nJoin a Local PC into Cloud\r\nYour desktop or laptop PC can join\r\ninto the Cloud VM network. You can make use\r\nof Cloud VM as if it is on your own local\r\nnetwork easily.\r\nJoin a Cloud VM into LAN\r\nYour Cloud VM can join to your company\r\nLAN with SoftEther VPN. Anyone on your company can\r\naccess to the Cloud VM without any settings.\r\nCloud to LAN Bridge VPN\r\nSoftEther VPN keeps a virtual\r\ndedicate Ethernet line from the Cloud to the\r\nLAN 24h/365d. You can consider remote\r\nCloud private network as a part of your\r\ncorporate network.\r\nCloud to Cloud Bridge VPN\r\nAre you using Amazon EC2 and Windows\r\nAzure, or using two or more remote datacenters of a Cloud\r\nservice? SoftEther VPN can make a single united network\r\nbetween all Cloud VMs despite differences of physical\r\nlocations.\r\nSoftEther VPN supports several mobile devices including iPhone and Android. Your smartphone is now a part of\r\nyour on-premise or Cloud network by using SoftEther VPN.\r\niPhone and Android\r\niPhone and Android has a built-in\r\nVPN client but originally they need Cisco, Juniper or\r\nother expensive hardware-based VPNs for remote-access. SoftEther VPN has a same function to Cisco, and\r\nsupports your iPhone and Android easily.\r\nWindows and Mac Laptops\r\nYour mobile PCs with Windows or\r\nMac can be easily connected to SoftEther VPN\r\nanywhere and anytime, despite firewalls or\r\npacket filters on Wi-Fi or overseas ISP. Windows\r\nRT is also supported.\r\nhttps://www.softether.org/\r\nPage 8 of 13\n\nSoftEther VPN is also an ultra-convenient tool for effective system management by IT professionals on\r\nenterprises and system integrators.\r\nRemote Management\r\nAre you having problem with\r\nmany servers, clients and printers of your client\r\ncompanies are distributed around the state?\r\nSoftEther VPN will help you a network\r\nadministrator as a handy tool just from your desk.\r\nYou can reach to any networks by only installing\r\nSoftEther VPN.\r\nBuilding Your Own Cloud\r\nDo you want to build and provide your\r\nown Cloud service which can beat Amazon EC2 or\r\nWindows Azure? SoftEther VPN can help you to\r\nbuild an inter-VMs network and remote-bridging\r\nnetwork between your Cloud and your customer's\r\non-premise.\r\nVPN for Network Testing, Simulation\r\nand Debugging\r\nSoftEther VPN is not a program only for\r\nbuilding remote network. It can be used for network\r\ndesign, test, and simulation by IT professionals. For\r\nexample, delay, jitter and packet loss generator is\r\nimplemented on SoftEther VPN. So network designer\r\ncan test VoIP phones under the bad-condition IP\r\nnetwork.\r\nSoftEther VPN is also convenient for home users. You can be proud of using enterprise-class VPN for your home-use.\r\nhttps://www.softether.org/\r\nPage 9 of 13\n\nRemote Access\r\nDo you want to access to your home\r\nserver or digital appliance from outside? Set up\r\nSoftEther VPN Server on your home PC and\r\ngain access to your server or HDTV recorder\r\nfrom anywhere even the opposite side of the\r\nearth, through the Internet.\r\nComfortable Network Anywhere\r\nAre you a business man and running around\r\nthe world? Most of Wi-Fi and local ISPs of several\r\ncountries are discomfort to use because of packet\r\nfiltering or censorship. So set up your private relay server\r\non your own home PC and use it from fields to gain ease.\r\nDoes your network administrator hesitates to assign you a global IP address? Or Does your company has a\r\nfirewall on the border between the private network and the Internet? No problem! SoftEther VPN has a strong\r\nfunction to penetrate troublesome corporate firewalls.\r\nDynamic DNS and NAT Traversal\r\nUnlike legacy IPsec-based VPN, even if\r\nyour corporate network doesn't have any static global IP\r\naddress you can set up your stable SoftEther VPN Server\r\non your corporate network.\r\nVPN Azure\r\nIf the corporate firewall is more\r\nrestricted and the NAT Traversal of SoftEther\r\nVPN doesn't work correctly, use VPN Azure to\r\npenetrate such a firewall.\r\nIPsec-based VPN protocols which are developed on 1990's are now obsoleted. IPsec-based VPN are not familiar\r\nwith most of firewalls, NATs or proxies. Unlike IPsec-based VPN, SoftEther VPN is familiar with any kind of\r\nhttps://www.softether.org/\r\nPage 10 of 13\n\nfirewalls. Additionally SoftEther VPN requires no expensive Cisco or other hardware devices. You can replace\r\nyour Cisco or OpenVPN to SoftEther VPN today.\r\nPenetrates Firewall by SSL-VPN\r\nAre you having trouble with\r\nIPsec-based legacy VPN products? Replace it to\r\nSoftEther VPN. SoftEther VPN Protocol is based on\r\nHTTPS so almost all kinds of firewalls will permits\r\nSoftEther VPN's packets.\r\nReplacements of Cisco or other\r\nhardware-based VPNs\r\nCisco, Juniper or other\r\nhardware-based IPsec VPNs are expensive for set-up\r\nand management. They are also lack of usability and\r\ncompatibility with Firewalls. Replace them to\r\nSoftEther VPN. You can very easily replace because\r\nSoftEther VPN also has the L2TP/IPsec VPN\r\nfunction which is same to Cisco's.\r\nReplacements of OpenVPN\r\nAre you still using\r\nOpenVPN? SoftEther VPN has more ability, better\r\nperformance and easy-configurable GUI-based\r\nmanagement tools. SoftEther VPN has also the\r\nOpenVPN Server Clone Function so that any\r\nOpenVPN clients, including iPhone and Android,\r\ncan connect to SoftEther VPN easily.\r\nScreenshots\r\nSoftEther VPN consists of three software: VPN Client, VPN Server and VPN Bridge.\r\nhttps://www.softether.org/\r\nPage 11 of 13\n\nSoftEther VPN Client\r\nMore Screenshots...\r\nSoftEther VPN Server Admin Tool\r\nhttps://www.softether.org/\r\nPage 12 of 13\n\nMore Screenshots...\r\nSource: https://www.softether.org/\r\nhttps://www.softether.org/\r\nPage 13 of 13",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.softether.org/"
	],
	"report_names": [
		"www.softether.org"
	],
	"threat_actors": [],
	"ts_created_at": 1775434191,
	"ts_updated_at": 1775826760,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/58bf51abbb819f1b994817afa524acc2d4bde2cd.pdf",
		"text": "https://archive.orkl.eu/58bf51abbb819f1b994817afa524acc2d4bde2cd.txt",
		"img": "https://archive.orkl.eu/58bf51abbb819f1b994817afa524acc2d4bde2cd.jpg"
	}
}