How to Install and Configure SoftEther VPN on Ubuntu

Linux Topic

November 7, 2022 by Liosa F

Install SoftEther VPN on Ubuntu

SoftEther VPN is one of the most powerful free and open-source multi-protocol VPN software that provides a secure connection to a remote network. This VPN software was developed by the University of Tsukuba in Japan and is compatible with most major operating systems such as Windows, Linux, FreeBSD, macOS, and Solaris. SoftEther VPN is the best alternative to Microsoft VPN servers and Open VPN; it can even merge with Open VPN easily.

We have discussed the SoftEther VPN protocol in detail before, and we know that if you have chosen this article to read now, you are familiar with the SoftEther VPN protocol. Still, we wanted to give a brief explanation for users who are not familiar with it.

This article aims to teach how to install and configure SoftEther VPN on Ubuntu 22.04/20.04. We will explain the installation of SoftEther VPN step by step so that you can easily configure and run the desired VPN server.

What are the reasons for setting up a personal VPN server?

  1. For system administrators or VPN service providers, setting up a VPN server is the wisest way.
  2. You may not trust VPN service providers in terms of the possibility of intrusion and access to your personal information, so to increase the security of your personal data, your preference can be to set up a VPN server and take the self-host route.
  3. Another reason for setting up a VPN server can be implementing a network security policy. For example, if you manage your own email server, to protect your email data from hackers, you can add an IP address whitelist to the firewall and allow users to access email data only by entering The IP address of the VPN server. In this way, the security of your email server will be strengthened against hackers’ attempts.
  4. The last option can be because you want to gain experience in setting up a VPN server and benefit from its advantages.

Advantages of SoftEther VPN

  • Having RSA certificate authentication
  • Free and open source
  • Fast and light
  • Compatible with Windows, Linux, macOS, Solaris, and Android operating systems
  • Support for X86, AMD64, ARM, PowerPC, MIPS architecture
  • Support for multiple protocols such as OpenVPN, L2TP, IPSec, SSTP, and the in-house SoftEtherVPN protocol
  • Having NAT Traversal by default, which enables a SoftEther VPN server behind NAT without the need for port forwarding.
  • Having a modern management console based on HTML5
  • Having dynamic-DNS
  • RADIUS / NT domain user authentication function
  • Included dynamic DNS.
  • Enables SSL-VPN tunnel over HTTPS to bypass NAT and firewalls.
  • Even if a firewall or router blocks all TCP or UDP connections, VPN over ICMP / VPN using ICMP or DNS allows connections to be established.

Prerequisites for installing  SoftEther VPN on Ubuntu

To install and configure SoftEther VPN on an Ubuntu server, you need to buy a Linux VPS and configure it as a VPN server.

You must also have Root user permissions and configure a Root password for the server.

Also, if you plan to enable HTTPS for OpenConnect VPN, you will need to register a domain name.

Steps to install  and configure SoftEther VPN on Ubuntu Linux

Following the steps and instructions we will explain below, you can easily install and configure SoftEther VPN on Ubuntu 22.04/20.04. be with us.

Step 1: Installing Required Dependency

It is better to start your first step by upgrading the system’s package cache. For this purpose, enter the following command:

apt-get update –y

After you have updated your cache and system packages, use the following command to install the required dependencies:

apt-get install build-essential gnupg2 gcc make –y

Now that you have installed all the necessary dependencies, it is time to install the latest stable version of SoftEther VPN.

Step 2: Installing the latest stable version of SoftEther VPN on the server

Enter the following command to install the latest stable version of SoftEther VPN:

wget https://github.com/SoftEtherVPN/SoftEtherVPN_Stable/releases/download/v4.39-9772-beta/softether-vpnserver-v4.39-9772-beta-2022.04.26-linux-x64-64bit.tar.gz

Sample output:

HTTP request sent, awaiting response... 200 OK

Length: 7529219 (7.2M) [application/x-gzip]

Saving to: ‘softether-vpnserver-v4.38-9760-rtm-2021.08.17-linux-x64-64bit.tar.gz’

softether-vpnserver-v4.38-9760-rtm- 100%[==================================================================>]   7.18M  1.01MB/s    in 10s

2021-10-15 08:36:37 (704 KB/s) - ‘softether-vpnserver-v4.38-9760-rtm-2021.08.17-linux-x64-64bit.tar.gz’ saved [7529219/7529219]

After downloading the latest stable version of SoftEther VPN, use the following command to extract the content of the downloaded file:

tar xvf softether-vpnserver-*.tar.gz

Run the following command to change the path to the VPN server directory:

cd vpnserver/

Use the following command to install dependency packages:

sudo apt install gcc binutils gzip libreadline-dev libssl-dev libncurses5-dev libncursesw5-dev libpthread-stubs0-dev

Then, referring to the extracted directory, start the SoftEther VPN creation process by entering the following commands:

make

After completing the process of building and downloading SoftEther VPN, you will receive the following output:

*** PacketiX VPN Server HTML5 Web Administration Console (NEW) ***

This VPN Server / Bridge has the built-in HTML5 Web Administration Console.

After you start the server daemon, you can open the HTML5 Web Administration Console is available at

https://127.0.0.1:5555/

or

https://ip_address_of_the_vpn_server:5555/

This HTML5 page is obviously under construction, and your HTML5 development contribution is very appreciated.

--------------------------------------------------------------------

make[1]: Leaving directory '/root/vpnserver'

The make command creates two binaries, vpnserver (server binary)and vpncmd (SoftEther VPN terminal management tool), from the source code.

In addition, the make command checks the server environment to run the EtherVPN server, and if it confirms the server environment to run the EtherVPN, you can see the pass option.

 Install and Configure SoftEther VPN on Ubuntu

We suggest that if you want the file system to be organized, move the VPN server directory to /opt/. For this purpose, enter the following command:

cd ..

sudo mv vpnserver /opt/softether

Step 3: Creating Systemd Service Unit for SoftEther VPN

Enter the following command to run the VPN server:

sudo /opt/softether/vpnserver start

To stop running the VPN server, enter the following command:

sudo /opt/softether/vpnserver stop

By creating the systemd service unit, the SoftEther VPN server will automatically run at boot time. Enter the following command to build the systemd service unit:

sudo nano /etc/systemd/system/softether-vpnserver.service

At this stage, you should add the following lines to the file we created to manage the SoftEther VPN service.

[Unit]

Description=SoftEther VPN server

After=network-online.target

After=dbus.service

[Service]

Type=forking

ExecStart=/opt/softether/vpnserver start

ExecReload=/bin/kill -HUP $MAINPID

[Install]

WantedBy=multi-user.target

Save the changes and exit the file. Then start the VPN server:

sudo systemctl start softether-vpnserver

Set auto-start at boot time using the following command:

sudo systemctl enable softether-vpnserver

After completing the above process, you can check the status of the service by typing the following command:

systemctl status softether-vpnserver

Sample output:

  • softether-vpnserver.service - SoftEther VPN server
    
    Loaded: loaded (/etc/systemd/system/softether-vpnserver.service; enabled; vendor preset: enabled)
    
    Active: <span style="color: #00ff00;">active (running)</span> since Sat 2022-09-17 11:39:15 UTC; 20s ago
    
    Main PID: 2944053 (vpnserver)
    
    Tasks: 32 (limit: 629145)
    
    Memory: 19.9M
    
    CPU: 603ms
    
    CGroup: /system.slice/softether-vpnserver.service
    
    ├─2944053 /opt/softether/vpnserver execsvc
    
    └─2944054 /opt/softether/vpnserver execsvc

Note: If the output above gives you a chance to do something before quitting, you can take control of the terminal management by pressing the Q button.

As you can see in our sample output, the active (running) view is green, indicating that the service is active. If you notice that your service is not running, you can find the root of the problem by checking the journal. For this purpose, use the following command :

sudo journalctl -eu softether-vpnserver

You can also check the listening ports by using the following command:

sudo  ss -lnptu | grep vpnserver

Sample output:

udp   UNCONN 0      0            127.0.0.1:1194       0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=62))

udp   UNCONN 0      0       12.234.224.168:1194       0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=58))

udp   UNCONN 0      0              0.0.0.0:51612      0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=5))

udp   UNCONN 0      0              0.0.0.0:53400      0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=11))

udp   UNCONN 0      0              0.0.0.0:56452      0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=53))

udp   UNCONN 0      0              0.0.0.0:40085      0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=16))

tcp   LISTEN 0      128            0.0.0.0:992        0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=40))

tcp   LISTEN 0      128            0.0.0.0:1194       0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=44))

tcp   LISTEN 0      128            0.0.0.0:5555       0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=48))

tcp   LISTEN 0      128            0.0.0.0:443        0.0.0.0:*    users:(("vpnserver",pid=2952110,fd=36))

 

Since SoftEther VPN activates different ports (L2TP, IPsec, SSTP, OpenVPN, and SoftEther’s internal VPN protocol) simultaneously, you will notice in the output that the SoftEther VPN server is listening to several ports.

HTML5 management console uses port 5555 and SSTP, and SoftEtherVPN protocols use TCP port 443. But note that you can connect to the SoftEtherVPN server from TCP port 443 if you have not connected to Apache or Nginx web servers through this port before.

Step 4: Opening the ports in the firewall

In the systems where the firewall is running, it is necessary to open some ports to configure the SoftEtherVPN server.

For users who use the UFW firewall, the following command is executed to issue permission to specific ports (usually ports 443, 5555, 992, and 1194) from the firewall:

sudo ufw allow 80,443,992,1194,555/tcp

sudo ufw allow 1194,51612,53400,56452,40085/udp

After adding new rules to the UFW firewall, you can reload it with the following command:

ufw reload

Step 5: Configuring the SoftEther VPN server

At this stage, we start configuring the SoftEther VPN server using the vpncmd command:

/opt/softether/vpncmd

In the output you receive, select option 1 to continue the SoftEther VPN server configuration process:

Install and Configure SoftEther VPN on Ubuntu

Since the management console listens on port 5555, you must type 127.0.0.1:5555 to access the management console.

Then, skip through the Virtual Hub selection stage by pressing the Enter button.

At this point, you need to specify a password for the management console because it does not have a password by default, so you will use the ServerPasswordSet command to set the management console password:

Install and Configure SoftEther VPN on Ubuntu

You cannot complete the SoftEtherVPN configuration steps without setting the virtual hub, so you need to configure the virtual hub for your VPN server, and it is better to use the default virtual hub named DEFAULT.

Hub DEFAULT

Install and Configure SoftEther VPN on Ubuntu

Then create an account with the desired username for the VPN:

UserCreate username

Tip: Replace your desired username instead of the username in the above command.

Also, if you wish, you can complete the user description, full name, and group name for your VPN account (optional).

Then press the Enter button.

Install and Configure SoftEther VPN on Ubuntu

To set your VPN account password with the username you specified in the previous step, enter the following command:

UserPasswordSet username

Install and Configure SoftEther VPN on Ubuntu

For VPN clients to obtain IP addresses from the VPN server, you must enable NAT and DHCP virtual server functions. For this purpose, run the following command:

SecureNatEnable

Then we will configure NAT using the DhcpSet command for VPN users:

DhcpSet

In the output, you will come across a list of questions that we will guide you to answer in the following:

  • Start Point for Distributed Address Band: 192.168.30.10
  • Start Point for Distributed Address Band: 192.168.30.10
  • End Point for Distributed Address Band: 192.168.30.200
  • Subnet Mask: 255.255.255.0
  • Lease Limit (Seconds): 7200
  • Default Gateway: 192.168.30.1
  • DNS Server 1: 192.168.30.1
  • DNS server 2: 1.0.0.1
  • Domain Name: Press Enter and skip this part.
  • Save Log: yes

Install and Configure SoftEther VPN on Ubuntu

After applying the settings, you can leave the management console; the following command is used to exit the management console:

exit

Step 6: Installing DNS Resolver on the server

Installing the DNS Resolver on the server is for the purpose that we choose the VPN server as the DNS server for the clients. So we install the bind9 DNS server:

sudo apt install bind9

After BIND is installed, it will run automatically, and to check its status, use the following command:

systemctl status named

Sample output:

service - BIND Domain Name Server

Loaded: loaded (/lib/systemd/system/named.service; enabled; vendor preset: enabled)

Active: active (running) since Sun 2020-05-17 08:11:26 UTC; 37s ago

Docs: man:named(8)

Main PID: 13820 (named)

Tasks: 5 (limit: 1074)

Memory: 14.3M

CGroup: /system.slice/named.service

└─13820 /usr/sbin/named -f -u bind

If you find out that the service is not running, run it by typing the following command:

sudo systemctl start named

Run the following command to edit the BIND DNS server configuration file:

sudo nano /etc/bind/named.conf.options

To receive recursive DNS queries from VPN clients, put the following line in the file:

allow-recursion { 127.0.0.1; 192.168.30.0/24; };

After applying the changes, save and exit the file and modify the /etc/default/named file:

sudo nano /etc/default/named

To ensure that BIND has permission to query root DNS servers, add -4 to OPTIONS:

OPTIONS="-u bind -4"

Then save the changes and close the file.

By default, DNSSEC is enabled by BIND to guarantee the correctness of DNS responses, but due to trust anchor rollover and other issues, it will not be enabled out of the box. To make sure that it works properly, we can rebuild the managed key database by typing the following command:

sudo rndc managed-keys destroy

sudo rndc reconfig

After making the changes, restart BIND9:

sudo systemctl restart named

To allow VPN clients to connect to port 53, you need to enter the following command:

sudo ufw insert 1 allow in from 192.168.30.0/24

Step 7: Getting a TLS certificate from Let’s Encrypt

Well, you may have a question about that when the SoftEtherVPN server creates a TLS certificate with its own signature during the installation process, why should we use the Let’s Encrypt certificate? The answer is simple, Let’s Encrypt certificate is reliable, free, and easy to set up.

So, from the default Ubuntu repository, install Let’s Encrypt Client (certbot) via the following command:

sudo apt install certbot

Then check the version number by entering the following command:

certbot –version

Tip: The best way is to use the Standalone or webroot plugin to get a TLS certificate.

  1. Using the Standalone plugin

If you want the SoftEther VPN server to use port 443 (while no web server is already running on your Ubuntu 22.04/20.04 system), to get a TLS certificate from Let’s Encrypt, we recommend using the Standalone plugin. So for this purpose, You must type the following command:

sudo certbot certonly --standalone --preferred-challenges http --agree-tos --email you@example.com -d vpn.example.com

Tip: Be sure to set a DNS record for your domain name.

  • certonly: after receiving the certificate, do not install it.
  • –standalone: Get the certificate through the standalone plugin.
  • –preferred-challenges http: Run http-01 challenge to validate your domain that uses port 80.
  • –agree-tos: Accept the Let’s Encrypt terms of service.
  • –email: Enter your email address to be able to register or recover your account.
  • -d: Specify the domain name in this field.

If you can get the SSL certificate successfully, the following output will be displayed:

Successfully received certificate.

Certificate is saved at: /etc/letsencrypt/live/vpn.example.com/fullchain.pem

Key is saved at:         /etc/letsencrypt/live/vpn.example.com/privkey.pem

This certificate expires on 2022-12-16.

These files will be updated when the certificate renews.

Certbot has set up a scheduled task to automatically renew this certificate in the background.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

If you like Certbot, please consider supporting our work by:

* Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate

* Donating to EFF:                    https://eff.org/donate-le
  1. Using the webroot plugin

But what should you do if you are in a situation where you already have a web server running on your Ubuntu 22.04/20.04 server listening on ports 80 and 443? In this situation, the best suggestion to get a certificate is to use the webroot plugin because Webroot is compatible with all web servers, and there is no need to install a certificate on the web server when using Webroot.

First, you need to set up a virtual host for vpn.example.com.

  • Apache

If the web server running on your system is Apache, run the following command to create the virtual host:

sudo nano /etc/apache2/sites-available/vpn.example.com.conf

Then in the file, add the following lines:

<VirtualHost *:80>

ServerName vpn.example.com

DocumentRoot /var/www/html/

</VirtualHost>

Save the changes you made and exit the file. For web root, create a directory:

sudo mkdir /var/www/html

In this step, set the Apache user (www-data) as the web root owner:

sudo chown www-data:www-data /var/www/html –R

Activate the virtual host specified below:

sudo a2ensite vpn.example.com

For the changes we made to take effect, you need to reload Apache:

sudo systemctl reload apache2

Now that you have successfully created and activated the virtual host, you are ready to receive the Let’s Encrypt certificate through the webroot plugin, so enter the following command for this purpose:

sudo certbot certonly --webroot --agree-tos --email you@exmaple.com -d vpn.example.com -w /var/www/html
  • Nginx

If the Nginx web server is running on your Ubuntu server, enter the following command:

sudo nano /etc/nginx/conf.d/vpn.example.com.conf

Then add the following lines to the file:

server {

listen 80;

server_name vpn.example.com;

root /var/www/html/;

location ~ /.well-known/acme-challenge {

allow all;

}

}

After saving the changes and closing the file, use the following command to create the web root directory:

sudo mkdir -p /var/www/html

To set the Nginx user(www-data) as the root web owner, enter the following command:

sudo chown www-data:www-data /var/www/html –R

Reload Nginx for your settings to take effect:

sudo systemctl reload nginx

After creating and activating the virtual host, you can get the Let’s Encrypt certificate through the webroot plugin by entering the following command:

sudo certbot certonly --webroot --agree-tos --email you@exmaple.com -d vpn.example.com -w /var/www/html

Step 8: Installing the Let’s Encrypt TLS certificate on the SoftEther VPN server

Log in to the VPN management console with Root user permission:

sudo /opt/softether/vpncmd 127.0.0.1:5555

Select option 1 in the output of the above command to manage the VPN server and enter the password you specified in the previous step.

Install and Configure SoftEther VPN on Ubuntu

To set the server’s private key and TLS certificate, type the following command:

ServerCertSet

Enter the following path to set up the certificate:

/etc/letsencrypt/live/vpn.yourdomain.com/fullchain.pem

Follow the steps below to set the private key:

/etc/letsencrypt/live/vpn.yourdomain.com/privkey.pem

Install and Configure SoftEther VPN on Ubuntu

Exit the management console by entering the following command:

exit

Restart the VPN server:

sudo systemctl restart softether-vpnserver

Step 9: Installing SoftEther VPN Client

This step includes installing and running the SoftEther VPN server as well as installing the SoftEther VPN client on the client device.

First, you need to install the necessary dependencies through the following command:

apt-get install build-essential gnupg2 gcc make –y

Then download the latest version of SoftEther VPN client using the following command:

wget http://www.softether-download.com/files/softether/v4.38-9760-rtm-2021.08.17-tree/Linux/SoftEther_VPN_Client/64bit_-_Intel_x64_or_AMD64/softether-vpnclient-v4.38-9760-rtm-2021.08.17-linux-x64-64bit.tar.gz

After the file is downloaded, extract the downloaded file with the following command:

tar -xvzf softether-vpnclient-v4.38-9760-rtm-2021.08.17-linux-x64-64bit.tar.gz

The content of the downloaded file is usually extracted in the vpclient directory, which is better to define a new directory to save the VPN client script:

mkdir /root/vpnscript

Then, in this step, download all the scripts from the VPN script download page using the following command:

cd /root/vpnscript
wget https://raw.githubusercontent.com/mfaizanse/intellexlab-files/main/softether-vpn-client/remove-client.sh

wget https://raw.githubusercontent.com/mfaizanse/intellexlab-files/main/softether-vpn-client/setup-client.sh

wget https://raw.githubusercontent.com/mfaizanse/intellexlab-files/main/softether-vpn-client/vpn-connect.sh

wget https://raw.githubusercontent.com/mfaizanse/intellexlab-files/main/softether-vpn-client/vpn-disconnect.sh

wget https://raw.githubusercontent.com/mfaizanse/intellexlab-files/main/softether-vpn-client/vpn_config

After downloading the scripts, define the appropriate permission for the downloaded scripts:

chmod 755 *

Then edit the vpn_config file by entering the VPN username, local gateway IP, VPN server IP, and VPN client directory.

nano vpn_config

Add the following lines to the configuration file:

CLIENT_DIR="/root/vpnclient"

NIC_NAME="opera1 "

ACCOUNT_NAME="vpnuser"

VPN_HOST_IPv4="vpn-server-ip"

LOCAL_GATEWAY="gateway-ip-of-client-machine"

After applying the changes, save the file and exit the file.

Then run the following command to start the VPN client:

./setup-client.sh

You should then enter your VPN server IP, port, hub name, VPN username, virtual adapter name, and password, as shown in the output below:

Connected to VPN Client "localhost".

VPN Client>AccountCreate vpnuser

AccountCreate command - Create New VPN Connection Setting

Destination VPN Server Host Name and Port Number: 69.28.88.203:443

Destination Virtual Hub Name: myhub

Connecting User Name: vpnuser

Used Virtual Network Adapter Name: opera1

The command completed successfully.

vpncmd command - SoftEther VPN Command Line Management Utility

SoftEther VPN Command Line Management Utility (vpncmd command)

Version 4.38 Build 9760   (English)

Compiled 2021/08/17 22:32:49 by buildsan at crosswin

Copyright (c) SoftEther VPN Project. All Rights Reserved.

Connected to VPN Client "localhost".

VPN Client>AccountPassword vpnuser

AccountPasswordSet command - Set User Authentication Type of VPN Connection Setting to Password Authentication

Please enter the password. To cancel press the Ctrl+D key.

Password: **********

Confirm input: **********

Specify standard or radius: radius

The command completed successfully.

Now it’s time to connect to the VPN server through the following script:

./vpn-connect.sh

If connected, you will see the following output:

Stopping the SoftEther VPN Client service ...

SoftEther VPN Client service has been stopped.

The SoftEther VPN Client service has been started.

vpncmd command - SoftEther VPN Command Line Management Utility

SoftEther VPN Command Line Management Utility (vpncmd command)

Version 4.38 Build 9760   (English)

Compiled 2021/08/17 22:32:49 by buildsan at crosswin

Copyright (c) SoftEther VPN Project. All Rights Reserved.

Connected to VPN Client "localhost".

VPN Client>AccountConnect vpnuser

AccountConnect command - Start Connection to VPN Server using VPN Connection Setting

The command completed successfully.

vpncmd command - SoftEther VPN Command Line Management Utility

SoftEther VPN Command Line Management Utility (vpncmd command)

Version 4.38 Build 9760   (English)

Compiled 2021/08/17 22:32:49 by buildsan at crosswin

Copyright (c) SoftEther VPN Project. All Rights Reserved.

Connected to VPN Client "localhost".

VPN Client>AccountList

AccountList command - Get List of VPN Connection Settings

Item                        |Value

----------------------------+-------------------------------------------

VPN Connection Setting Name |vpnuser

Status                      |Connected

VPN Server Hostname         |69.28.88.203:443 (Direct TCP/IP Connection)

Virtual Hub                 |myhub

Virtual Network Adapter Name|opera1

The command completed successfully.

And finally, you have successfully connected to the VPN server and created a new VPN interface named vpn_opera1. To check it, run the following command:

ifconfig

Output:

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500

inet 69.28.85.54  netmask 255.255.254.0  broadcast 69.28.85.255

inet6 fe80::200:45ff:fe1c:5536  prefixlen 64  scopeid 0x20<link>

ether 00:00:45:1c:55:36  txqueuelen 1000  (Ethernet)

RX packets 19867  bytes 74357003 (74.3 MB)

RX errors 0  dropped 0  overruns 0  frame 0

TX packets 8098  bytes 1085017 (1.0 MB)

TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536

inet 127.0.0.1  netmask 255.0.0.0

inet6 ::1  prefixlen 128  scopeid 0x10<host>

loop  txqueuelen 1000  (Local Loopback)

RX packets 854  bytes 648247 (648.2 KB)

RX errors 0  dropped 0  overruns 0  frame 0

TX packets 854  bytes 648247 (648.2 KB)

TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

vpn_opera1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500

inet 192.168.30.10  netmask 255.255.255.0  broadcast 192.168.30.255

inet6 fe80::5c86:a0ff:fe6a:a652  prefixlen 64  scopeid 0x20<link>

ether 5e:86:a0:6a:a6:52  txqueuelen 1000  (Ethernet)

RX packets 312  bytes 20440 (20.4 KB)

RX errors 0  dropped 0  overruns 0  frame 0

TX packets 292  bytes 22588 (22.5 KB)

TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

FAQ

SoftEther VPN uses TCP ports: 443, 992, and 5555 to listen by default.

SoftEther transfers its data based on TCP/IP protocol connection. Therefore, to create a SoftEther VPN, the steps must be performed through network devices and servers compatible with the TCP/IP protocol.

Summary

In this article, we comprehensively taught how to install and configure SoftEther VPN in Ubuntu and how to install the SoftEther VPN client and connect to the VPN server. We hope that this content will be helpful for you and that you will achieve your goal by going through the process that we explained. If you have a question needing guidance, let us know in the comments section, and we will solve your problem as soon as possible.

Thank you for being with us until the end of this tutorial.

 

​ ​ ​ ​

About the Author Liosa F

Love, life, peace and technology are all for the wise man

Leave a Reply

Your email address will not be published. Required fields are marked *