SoftEther VPN 報告者:蘇己盛 日期:2014/07/01.

Slides:



Advertisements
Similar presentations
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Advertisements

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
VPN construction with independence of client environment 25 January 25 January 2007 Shin Takeuchi (University of Tsukuba)
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
M2M Gateway Features Jari Lahti, CTO
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Sepehr Firewalls Sepehr Sadra Tehran Co. Ltd. Ali Shayan December 2008.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Virtual Private Networking with OpenVPN Wim Kerkhoff Fraser Valley Linux Users Group April 15, 2004.
THE BASICS. “ A free, open source customized distribution of FreeBSD tailored for use as a firewall and router ”
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 11: Remote Access Fundamentals
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
What’s New in Fireware v11.9.5
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Cooperative Education – Networking Fall 2009 Network Team Saigon Institute of Technology.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
OpenVPN Vs IPSec measure performance
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
WARCS (Wide Area Remote Control for SPring-8)‏ A. Yamashita and Y.Furukawa SPring-8, Japan Control System Cyber-Security Workshop (CS)2/HEP Oct
Windows 10 Common VPN Error Tech Support Number
Virtual Private Network Access for Remote Networks
Mobile equipment for vacuum control
Virtual Private Networks and IPSec
NAT、DHCP、Firewall、FTP、Proxy
Network Security Solution
Module 3: Enabling Access to Internet Resources
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 1: Networking Overview.
Virtual Private Networking with OpenVPN
Remote Access Lecture 2.
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Virtual Private Networks (VPN)
Implementing TMG Server Publishing
MICROSOFT Networking with Windows Server VCE
VPN-Implementation Using UBUNTU OS and OpenVPN and Hamachi in client-server environment. By Ruphin Byamungu, Kusinza United States International University-Nairobi.
Microsoft Dumps VCE
Dumps Free Questions Answers
On and Off Premise Secure Access
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Chapter 10: Advanced Cisco Adaptive Security Appliance
Cengage Learning: Computer Networking from LANs to WANs
Instructor: Mort Anvari
Web Servers (IIS and Apache)
WireGuard zswu.
Virtual Private Network zswu
Presentation transcript:

SoftEther VPN 報告者:蘇己盛 日期:2014/07/01

Outline Inroduction SoftEther VPN Features of SoftEther VPN Architecture of SoftEther VPN OpenVPN vs. SoftEther VPN Installation Benchmark

Introduction SoftEther VPN Project SoftEther VPN Develops and distributes SoftEther VPN An Open-Source Free Cross-platform Multi- protocol VPN Program An academic project form University of Tsukuba SoftEther VPN "SoftEther" means "Software Ethernet” any personal or commercial use for free charge

SoftEther VPN An alternative VPN server to existing VPN products OpenVPN IPsec MS-SSTP Original strong SSL-VPN protocol Ultra-optimized SSL-VPN Protocol very fast throughput low latency firewall resistance

Features of SoftEther VPN Free and open-source software. Easy to establish both remote-access and site-to-site VPN. SSL-VPN Tunneling on HTTPS to pass through NATs and firewalls. Revolutionary VPN over ICMP and VPN over DNS features. Resistance to highly-restricted firewall. Ethernet-bridging (L2) and IP-routing (L3) over VPN. Embedded dynamic-DNS and NAT- traversal so that no static nor fixed IP address is required. AES 256-bit and RSA 4096-bit encryptions. Sufficient security features such as logging and firewall inner VPN tunnel. 1Gbps-class high-speed throughput performance with low memory and CPU usage. Windows, Linux, Mac, Android, iPhone, iPad and Windows Mobile are supported. SSL-VPN (HTTPS) and 6 major VPN protocols (OpenVPN, IPsec, L2TP, MS-SSTP, L2TPv3 and EtherIP) are all supported as VPN tunneling underlay protocols. The OpenVPN clone function supports legacy OpenVPN clients. IPv4 / IPv6 dual-stack. The VPN server runs on Windows, Linux, FreeBSD, Solaris and Mac OS X. Configure All settings on GUI. Multi-languages (English, Japanese and Simplified-Chinese). No memory leaks. High quality stable codes, intended for long-term runs. We always verify that there are no memory or resource leaks before releasing the build. RADIUS / NT Domain user authentication function RSA certificate authentication function Deep-inspect packet logging function Source IP address control list function syslog transfer function

Architecture of SoftEther VPN

Architecture of SoftEther VPN

OpenVPN vs. SoftEther VPN

OpenVPN vs. SoftEther VPN

Implementation

Installation https://www.digitalocean.com/community/tutorials /how-to-setup-a-multi-protocol-vpn-server-using- softether

Performance

Benchmark

Future work Compare SSL-VPN with OpenVPN Compare SSL-VPN with VXLAN Compare SSL-VPN with GRE Pass through NATs and firewalls