A VPN client, done right


SoftEther VPN Project
It uses only standard, well-established cryptographic algorithms and makes sure that your communications are completely opaque to the outside world. Security matters Freelan was designed from the start with security as the main concern. Windows then configures access for the user accounts you chose—which can take a few seconds. Does employees need to connect to the company LAN from outside or home? The only limit, is your imagination. Your message has been reported and will be reviewed by our staff.


Being free software means you can use freelan's code in your own free project to create awesome stuff! Do whatever you want, and share it with others in turn! If you would like to integrate freelan into commercial apps, do not hesitate to contact us.

Depending on the nature of your project, this might be free as well: If your goal is the same, we might find an agreement!

The importance of communicating securely has never made more sense than today: Freelan was designed with security and your privacy as the main concern: Its protocol specification is clearly accessible and described: You have nothing to hide , but do you really want to give full disclosure?

December , Julien Kauffmann - Generated with Flask. Home Download Support F. You are in control Why would you trust a closed, proprietary software with your most-sensitive data? Choose your network topology Freelan allows you to create any kind of network topology you like: Security matters Freelan was designed from the start with security as the main concern.

Client-server Freelan can, of course, be configured to act according to the usual client-server pattern, like any other VPN software. Go to the configuration examples. Peer-to-peer The client-server pattern is nice, but it is also a bit fragile. Hybrid What if you would like to mix the benefits of both the client-server and peer-to-peer patterns?

Need 3 servers and peer-to-peer connection between hosts? Does that mean I can access the Internet anonymously? This is a known issue that has not yet been fixed through updates. While this is a pretty interesting feature, setting up a VPN server this way may not be the ideal choice for you.

It does have some limitations:. Next, select the user accounts that can connect remotely. To increase security, you may want to create a new, limited user account rather than allow VPN logins from your primary user account.

Next, you can select the networking protocols that should be enabled for incoming connections. You can setup your own VPN server behind the firewall or NAT in your company, and you can reach to that VPN server in the corporate private network from your home or mobile place, without any modification of firewall settings.

It virtualizes Ethernet by software-enumeration. A VPN session is the virtualized network cable. Therefore, you can safely establish a VPN session beyond the Internet. The behavior is same to traditional Ethernet switches. You can define a local bridge between the Virtual Hub and the existing physical Ethernet segment by using the Local Bridge function. You can realize a remote-access VPN from home or mobile to the company network by using the Local Bridge function.

You can define a cascading connection between two or more remote Virtual Hubs. With cascading, you can integrate two or more remote Ethernet segments to a single Ethernet segment. For example, after you establish cascading connections between the site A, B and C, then any computers in the site A will be able to communicate with the computers in the site B and the site C.

This is a site-to-site VPN. You need no network administrator's special permission before setting up a VPN server on the company network behind firewalls or NATs. Despite long-distance, it is easy to communicate mutually with any kinds of LAN-oriented protocols.

Geologically distributed branches are isolated as networks by default. Then all computers of all branches are connected to the single LAN. Does employees need to connect to the company LAN from outside or home? You can make use of Cloud VM as if it is on your own local network easily.

Anyone on your company can access to the Cloud VM without any settings.


Leave a Reply