1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
2362
2363
2364
2365
2366
2367
2368
2369
2370
2371
2372
2373
2374
2375
2376
2377
2378
2379
2380
2381
2382
2383
2384
2385
2386
2387
2388
2389
2390
2391
2392
2393
2394
2395
2396
2397
2398
2399
2400
2401
2402
2403
2404
2405
2406
2407
2408
2409
2410
2411
2412
2413
2414
2415
2416
2417
2418
2419
2420
2421
2422
2423
2424
2425
2426
2427
2428
2429
2430
2431
2432
2433
2434
2435
2436
2437
2438
2439
2440
2441
2442
2443
2444
2445
2446
2447
2448
2449
2450
2451
2452
2453
2454
2455
2456
2457
2458
2459
2460
2461
2462
2463
2464
2465
2466
2467
2468
2469
2470
2471
2472
2473
2474
2475
2476
2477
2478
2479
2480
2481
2482
2483
2484
2485
2486
2487
2488
2489
2490
2491
2492
2493
2494
2495
2496
2497
2498
2499
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
2511
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
2522
2523
2524
2525
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
2541
2542
2543
2544
2545
2546
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
2557
2558
2559
2560
2561
2562
2563
2564
2565
2566
2567
2568
2569
2570
2571
2572
2573
2574
2575
2576
2577
2578
2579
2580
2581
2582
2583
2584
2585
2586
2587
2588
2589
2590
2591
2592
2593
2594
2595
2596
2597
2598
2599
2600
2601
2602
2603
2604
2605
2606
2607
2608
2609
2610
2611
2612
2613
2614
2615
2616
2617
2618
2619
2620
2621
2622
2623
2624
2625
2626
2627
2628
2629
2630
2631
2632
2633
2634
2635
2636
2637
2638
2639
2640
2641
2642
2643
2644
2645
2646
2647
2648
2649
2650
2651
2652
2653
2654
2655
2656
2657
2658
2659
2660
2661
2662
2663
2664
2665
2666
2667
2668
2669
2670
2671
2672
2673
2674
2675
2676
2677
2678
2679
2680
2681
2682
2683
2684
2685
2686
2687
2688
2689
2690
2691
2692
2693
2694
2695
2696
2697
2698
2699
2700
2701
2702
2703
2704
2705
2706
2707
2708
2709
2710
2711
2712
2713
2714
2715
2716
2717
2718
2719
2720
2721
2722
2723
2724
2725
2726
2727
2728
2729
2730
2731
2732
2733
2734
2735
2736
2737
2738
2739
2740
2741
2742
2743
2744
2745
2746
2747
2748
2749
2750
2751
2752
2753
2754
2755
2756
2757
2758
2759
2760
2761
2762
2763
2764
2765
2766
2767
2768
2769
2770
2771
2772
2773
2774
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
2790
2791
2792
2793
2794
2795
2796
2797
2798
2799
2800
2801
2802
2803
2804
2805
2806
2807
2808
2809
2810
2811
2812
2813
2814
2815
2816
2817
2818
2819
2820
2821
2822
2823
2824
2825
2826
2827
2828
2829
2830
2831
2832
2833
2834
2835
2836
2837
2838
2839
2840
2841
2842
2843
2844
2845
2846
2847
2848
2849
2850
2851
2852
2853
2854
2855
2856
2857
2858
2859
2860
2861
2862
2863
2864
2865
2866
2867
2868
2869
2870
2871
2872
2873
2874
2875
2876
2877
2878
2879
2880
2881
2882
2883
2884
2885
2886
2887
2888
2889
2890
2891
2892
2893
2894
2895
2896
2897
2898
2899
2900
2901
2902
2903
2904
2905
2906
2907
2908
2909
2910
2911
2912
2913
2914
2915
2916
2917
2918
2919
2920
2921
2922
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
2944
2945
2946
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
2965
2966
2967
2968
2969
2970
2971
2972
2973
2974
2975
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
2991
2992
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
3006
3007
3008
3009
3010
3011
3012
3013
3014
3015
3016
3017
3018
3019
3020
3021
3022
3023
3024
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
3035
3036
3037
3038
3039
3040
3041
3042
3043
3044
3045
3046
3047
3048
3049
3050
3051
3052
3053
3054
3055
3056
3057
3058
3059
3060
3061
3062
3063
3064
3065
3066
3067
3068
3069
3070
3071
3072
3073
3074
3075
3076
3077
3078
3079
3080
3081
3082
3083
3084
3085
3086
3087
3088
3089
3090
3091
3092
3093
3094
3095
3096
3097
3098
3099
3100
3101
3102
3103
3104
3105
3106
3107
3108
3109
3110
3111
3112
3113
3114
3115
3116
3117
3118
3119
3120
3121
3122
3123
3124
3125
3126
3127
3128
3129
3130
3131
3132
3133
3134
3135
3136
3137
3138
3139
3140
3141
3142
3143
3144
3145
3146
3147
3148
3149
3150
3151
3152
3153
3154
3155
3156
3157
3158
3159
3160
3161
3162
3163
3164
3165
3166
3167
3168
3169
3170
3171
3172
3173
3174
3175
3176
3177
3178
3179
3180
3181
3182
3183
3184
3185
3186
3187
3188
3189
3190
3191
3192
3193
3194
3195
3196
3197
3198
3199
3200
3201
3202
3203
3204
3205
3206
3207
3208
3209
3210
3211
3212
3213
3214
3215
3216
3217
3218
3219
3220
3221
3222
3223
3224
3225
3226
3227
3228
3229
3230
3231
3232
3233
3234
3235
3236
3237
3238
3239
3240
3241
3242
3243
3244
3245
3246
3247
3248
3249
3250
3251
3252
3253
3254
3255
3256
3257
3258
3259
3260
3261
3262
3263
3264
3265
3266
3267
3268
3269
3270
3271
3272
3273
3274
3275
3276
3277
3278
3279
3280
3281
3282
3283
3284
3285
3286
3287
3288
3289
3290
3291
3292
3293
3294
3295
3296
3297
3298
3299
3300
3301
3302
3303
3304
3305
3306
3307
3308
3309
3310
3311
3312
3313
3314
3315
3316
3317
3318
3319
3320
3321
3322
3323
3324
3325
3326
3327
3328
3329
3330
3331
3332
3333
3334
3335
3336
3337
3338
3339
3340
3341
3342
3343
3344
3345
3346
3347
3348
3349
3350
3351
3352
3353
3354
3355
3356
3357
3358
3359
3360
3361
3362
3363
3364
3365
3366
3367
3368
3369
3370
3371
3372
3373
3374
3375
3376
3377
3378
3379
3380
3381
3382
3383
3384
3385
3386
3387
3388
3389
3390
3391
3392
3393
3394
3395
3396
3397
3398
3399
3400
3401
3402
3403
3404
3405
3406
3407
3408
3409
3410
3411
3412
3413
3414
3415
3416
3417
3418
3419
3420
3421
3422
3423
3424
3425
3426
3427
3428
3429
3430
3431
3432
3433
3434
3435
3436
3437
3438
3439
3440
3441
3442
3443
3444
3445
3446
3447
3448
3449
3450
3451
3452
3453
3454
3455
3456
3457
3458
3459
3460
3461
3462
3463
3464
3465
3466
3467
3468
3469
3470
3471
3472
3473
3474
3475
3476
3477
3478
3479
3480
3481
3482
3483
3484
3485
3486
3487
3488
3489
3490
3491
3492
3493
3494
3495
3496
3497
3498
3499
3500
3501
3502
3503
3504
3505
3506
3507
3508
3509
3510
3511
3512
3513
3514
3515
3516
3517
3518
3519
3520
3521
3522
3523
3524
3525
3526
3527
3528
3529
3530
3531
3532
3533
3534
3535
3536
3537
3538
3539
3540
3541
3542
3543
3544
3545
3546
3547
3548
3549
3550
3551
3552
3553
3554
3555
3556
3557
3558
3559
3560
3561
3562
3563
3564
3565
3566
3567
3568
3569
3570
3571
3572
3573
3574
3575
3576
3577
3578
3579
3580
3581
3582
3583
3584
3585
3586
3587
3588
3589
3590
3591
3592
3593
3594
3595
3596
3597
3598
3599
3600
3601
3602
3603
3604
3605
3606
3607
3608
3609
3610
3611
3612
3613
3614
3615
3616
3617
3618
3619
3620
3621
3622
3623
3624
3625
3626
3627
3628
3629
3630
3631
3632
3633
3634
3635
3636
3637
3638
3639
3640
3641
3642
3643
3644
3645
3646
3647
3648
3649
3650
3651
3652
3653
3654
3655
3656
3657
3658
3659
3660
3661
3662
3663
3664
3665
3666
3667
3668
3669
3670
3671
3672
3673
3674
3675
3676
3677
3678
3679
3680
3681
3682
3683
3684
3685
3686
3687
3688
3689
3690
3691
3692
3693
3694
3695
3696
3697
3698
3699
3700
3701
3702
3703
3704
3705
3706
3707
3708
3709
3710
3711
3712
3713
3714
3715
3716
3717
3718
3719
3720
3721
3722
3723
3724
3725
3726
3727
3728
3729
3730
3731
3732
3733
3734
3735
3736
3737
3738
3739
3740
3741
3742
3743
3744
3745
3746
3747
3748
3749
3750
3751
3752
3753
3754
3755
3756
3757
3758
3759
3760
3761
3762
3763
3764
3765
3766
3767
3768
3769
3770
3771
3772
3773
3774
3775
3776
3777
3778
3779
3780
3781
3782
3783
3784
3785
3786
3787
3788
3789
3790
3791
3792
3793
3794
3795
3796
3797
3798
3799
3800
3801
3802
3803
3804
3805
3806
3807
3808
3809
3810
3811
3812
3813
3814
3815
3816
3817
3818
3819
3820
3821
3822
3823
3824
3825
3826
3827
3828
3829
3830
3831
3832
3833
3834
3835
3836
3837
3838
3839
3840
3841
3842
3843
3844
3845
3846
3847
3848
3849
3850
3851
3852
3853
3854
3855
3856
3857
3858
3859
3860
3861
3862
3863
3864
3865
3866
3867
3868
3869
3870
3871
3872
3873
3874
3875
3876
3877
3878
3879
3880
3881
3882
3883
3884
3885
3886
3887
3888
3889
3890
3891
3892
3893
3894
3895
3896
3897
3898
3899
3900
3901
3902
3903
3904
3905
3906
3907
3908
3909
3910
3911
3912
3913
3914
3915
3916
3917
3918
3919
3920
3921
3922
3923
3924
3925
3926
3927
3928
3929
3930
3931
3932
3933
3934
3935
3936
3937
3938
3939
3940
3941
3942
3943
3944
3945
3946
3947
3948
3949
3950
3951
3952
3953
3954
3955
3956
3957
3958
3959
3960
3961
3962
3963
3964
3965
3966
3967
3968
3969
3970
3971
3972
3973
3974
3975
3976
3977
3978
3979
3980
3981
3982
3983
3984
3985
3986
3987
3988
3989
3990
3991
3992
3993
3994
3995
3996
3997
3998
3999
4000
4001
4002
4003
4004
4005
4006
4007
4008
4009
4010
4011
4012
4013
4014
4015
4016
4017
4018
4019
4020
4021
4022
4023
4024
4025
4026
4027
4028
4029
4030
4031
4032
4033
4034
4035
4036
4037
4038
4039
4040
4041
4042
4043
4044
4045
4046
4047
4048
4049
4050
4051
4052
4053
4054
4055
4056
4057
4058
4059
4060
4061
4062
4063
4064
4065
4066
4067
4068
4069
4070
4071
4072
4073
4074
4075
4076
4077
4078
4079
4080
4081
4082
4083
4084
4085
4086
4087
4088
4089
4090
4091
4092
4093
4094
4095
4096
4097
4098
4099
4100
4101
4102
4103
4104
4105
4106
4107
4108
4109
4110
4111
4112
4113
4114
4115
4116
4117
4118
4119
4120
4121
4122
4123
4124
4125
4126
4127
4128
4129
4130
4131
4132
4133
4134
4135
4136
4137
4138
4139
4140
4141
4142
4143
4144
4145
4146
4147
4148
4149
4150
4151
4152
4153
4154
4155
4156
4157
4158
4159
4160
4161
4162
4163
4164
4165
4166
4167
4168
4169
4170
4171
4172
4173
4174
4175
4176
4177
4178
4179
4180
4181
4182
4183
4184
4185
4186
4187
4188
4189
4190
4191
4192
4193
4194
4195
4196
4197
4198
4199
4200
4201
4202
4203
4204
4205
4206
4207
4208
4209
4210
4211
4212
4213
4214
4215
4216
4217
4218
4219
4220
4221
4222
4223
4224
4225
4226
4227
4228
4229
4230
4231
4232
4233
4234
4235
4236
4237
4238
4239
4240
4241
4242
4243
4244
4245
4246
4247
4248
4249
4250
4251
4252
4253
4254
4255
4256
4257
4258
4259
4260
4261
4262
4263
4264
4265
4266
4267
4268
4269
4270
4271
4272
4273
4274
4275
4276
4277
4278
4279
4280
4281
4282
4283
4284
4285
4286
4287
4288
4289
4290
4291
4292
4293
4294
4295
4296
4297
4298
4299
4300
4301
4302
4303
4304
4305
4306
4307
4308
4309
4310
4311
4312
4313
4314
4315
4316
4317
4318
4319
4320
4321
4322
4323
4324
4325
4326
4327
4328
4329
4330
4331
4332
4333
4334
4335
4336
4337
4338
4339
4340
4341
4342
4343
4344
4345
4346
4347
4348
4349
4350
4351
4352
4353
4354
4355
4356
4357
4358
4359
4360
4361
4362
4363
4364
4365
4366
4367
4368
4369
4370
4371
4372
4373
4374
4375
4376
4377
4378
4379
4380
4381
4382
4383
4384
4385
4386
4387
4388
4389
4390
4391
4392
4393
4394
4395
4396
4397
4398
4399
4400
4401
4402
4403
4404
4405
4406
4407
4408
4409
4410
4411
4412
4413
4414
4415
4416
4417
4418
4419
4420
4421
4422
4423
4424
4425
4426
4427
4428
4429
4430
4431
4432
4433
4434
4435
4436
4437
4438
4439
4440
4441
4442
4443
4444
4445
4446
4447
4448
4449
4450
4451
4452
4453
4454
4455
4456
4457
4458
4459
4460
4461
4462
4463
4464
4465
4466
4467
4468
4469
4470
4471
4472
4473
4474
4475
4476
4477
4478
4479
4480
4481
4482
4483
4484
4485
4486
4487
4488
4489
4490
4491
4492
4493
4494
4495
4496
4497
4498
4499
4500
4501
4502
4503
4504
4505
4506
4507
4508
4509
4510
4511
4512
4513
4514
4515
4516
4517
4518
4519
4520
4521
4522
4523
4524
4525
4526
4527
4528
4529
4530
4531
4532
4533
4534
4535
4536
4537
4538
4539
4540
4541
4542
4543
4544
4545
4546
4547
4548
4549
4550
4551
4552
4553
4554
4555
4556
4557
4558
4559
4560
4561
4562
4563
4564
4565
4566
4567
4568
4569
4570
4571
4572
4573
4574
4575
4576
4577
4578
4579
4580
4581
4582
4583
4584
4585
4586
4587
4588
4589
4590
4591
4592
4593
4594
4595
4596
4597
4598
4599
4600
4601
4602
4603
4604
4605
4606
4607
4608
4609
4610
4611
4612
4613
4614
4615
4616
4617
4618
4619
4620
4621
4622
4623
4624
4625
4626
4627
4628
4629
4630
4631
4632
4633
4634
4635
4636
4637
4638
4639
4640
4641
4642
4643
4644
4645
4646
4647
4648
4649
4650
4651
4652
4653
4654
4655
4656
4657
4658
4659
4660
4661
4662
4663
4664
4665
4666
4667
4668
4669
4670
4671
4672
4673
4674
4675
4676
4677
4678
4679
4680
4681
4682
4683
4684
4685
4686
4687
4688
4689
4690
4691
4692
4693
4694
4695
4696
4697
4698
4699
4700
4701
4702
4703
4704
4705
4706
4707
4708
4709
4710
4711
4712
4713
4714
4715
4716
4717
4718
4719
4720
4721
4722
4723
4724
4725
4726
4727
4728
4729
4730
4731
4732
4733
4734
4735
4736
4737
4738
4739
4740
4741
4742
4743
4744
4745
4746
4747
4748
4749
4750
4751
4752
4753
4754
4755
4756
4757
4758
4759
4760
4761
4762
4763
4764
4765
4766
4767
4768
4769
4770
4771
4772
4773
4774
4775
4776
4777
4778
4779
4780
4781
4782
4783
4784
4785
4786
4787
4788
4789
4790
4791
4792
4793
4794
4795
4796
4797
4798
4799
4800
4801
4802
4803
4804
4805
4806
4807
4808
4809
4810
4811
4812
4813
4814
4815
4816
4817
4818
4819
4820
4821
4822
4823
4824
4825
4826
4827
4828
4829
4830
4831
4832
4833
4834
4835
4836
4837
4838
4839
4840
4841
4842
4843
4844
4845
4846
4847
4848
4849
4850
4851
4852
4853
4854
4855
4856
4857
4858
4859
4860
4861
4862
4863
4864
4865
4866
4867
4868
4869
4870
4871
4872
4873
4874
4875
4876
4877
4878
4879
4880
4881
4882
4883
4884
4885
4886
4887
4888
4889
4890
4891
4892
4893
4894
4895
4896
4897
4898
4899
4900
4901
4902
4903
4904
4905
4906
4907
4908
4909
4910
4911
4912
4913
4914
4915
4916
4917
4918
4919
4920
4921
4922
4923
4924
4925
4926
4927
4928
4929
4930
4931
4932
4933
4934
4935
4936
4937
4938
4939
4940
4941
4942
4943
4944
4945
4946
4947
4948
4949
4950
4951
4952
4953
4954
4955
4956
4957
4958
4959
4960
4961
4962
4963
4964
4965
4966
4967
4968
4969
4970
4971
4972
4973
4974
4975
4976
4977
4978
4979
4980
4981
4982
4983
4984
4985
4986
4987
4988
4989
4990
4991
4992
4993
4994
4995
4996
4997
4998
4999
5000
5001
5002
5003
5004
5005
5006
5007
5008
5009
5010
5011
5012
5013
5014
5015
5016
5017
5018
5019
5020
5021
5022
5023
5024
5025
5026
5027
5028
5029
5030
5031
5032
5033
5034
5035
5036
5037
5038
5039
5040
5041
5042
5043
5044
5045
5046
5047
5048
5049
5050
5051
5052
5053
5054
5055
5056
5057
5058
5059
5060
5061
5062
5063
5064
5065
5066
5067
5068
5069
5070
5071
5072
5073
5074
5075
5076
5077
5078
5079
5080
5081
5082
5083
5084
5085
5086
5087
5088
5089
5090
5091
5092
5093
5094
5095
5096
5097
5098
5099
5100
5101
5102
5103
5104
5105
5106
5107
5108
5109
5110
5111
5112
5113
5114
5115
5116
5117
5118
5119
5120
5121
5122
5123
5124
5125
5126
5127
5128
5129
5130
5131
5132
5133
5134
5135
5136
5137
5138
5139
5140
5141
5142
5143
5144
5145
5146
5147
5148
5149
5150
5151
5152
5153
5154
5155
5156
5157
5158
5159
5160
5161
5162
5163
5164
5165
5166
5167
5168
5169
5170
5171
5172
5173
5174
5175
5176
5177
5178
5179
5180
5181
5182
5183
5184
5185
5186
5187
5188
5189
5190
5191
5192
5193
5194
5195
5196
5197
5198
5199
5200
5201
5202
5203
5204
5205
5206
5207
5208
5209
5210
5211
5212
5213
5214
5215
5216
5217
5218
5219
5220
5221
5222
5223
5224
5225
5226
5227
5228
5229
5230
5231
5232
5233
5234
5235
5236
5237
5238
5239
5240
5241
5242
5243
5244
5245
5246
5247
5248
5249
5250
5251
5252
5253
5254
5255
5256
5257
5258
5259
5260
5261
5262
5263
5264
5265
5266
5267
5268
5269
5270
5271
5272
5273
5274
5275
5276
5277
5278
5279
5280
5281
5282
5283
5284
5285
5286
5287
5288
5289
5290
5291
5292
5293
5294
5295
5296
5297
5298
5299
5300
5301
5302
5303
5304
5305
5306
5307
5308
5309
5310
5311
5312
5313
5314
5315
5316
5317
5318
5319
5320
5321
5322
5323
5324
5325
5326
5327
5328
5329
5330
5331
5332
5333
5334
5335
5336
5337
5338
5339
5340
5341
5342
5343
5344
5345
5346
5347
5348
5349
5350
5351
5352
5353
5354
5355
5356
5357
5358
5359
5360
5361
5362
5363
5364
5365
5366
5367
5368
5369
5370
5371
5372
5373
5374
5375
5376
5377
5378
5379
5380
5381
5382
5383
5384
5385
5386
5387
5388
5389
5390
5391
5392
5393
5394
5395
5396
5397
5398
5399
5400
5401
5402
5403
5404
5405
5406
5407
5408
5409
5410
5411
5412
5413
5414
5415
5416
5417
5418
5419
5420
5421
5422
5423
5424
5425
5426
5427
5428
5429
5430
5431
5432
5433
5434
5435
5436
5437
5438
5439
5440
5441
5442
5443
5444
5445
5446
5447
5448
5449
5450
5451
5452
5453
5454
5455
5456
5457
5458
5459
5460
5461
5462
5463
5464
5465
5466
5467
5468
5469
5470
5471
5472
5473
5474
5475
5476
5477
5478
5479
5480
5481
5482
5483
5484
5485
5486
5487
5488
5489
5490
5491
5492
5493
5494
5495
5496
5497
5498
5499
5500
5501
5502
5503
5504
5505
5506
5507
5508
5509
5510
5511
5512
5513
5514
5515
5516
5517
5518
5519
5520
5521
5522
5523
5524
5525
5526
5527
5528
5529
5530
5531
5532
5533
5534
5535
5536
5537
5538
5539
5540
5541
5542
5543
5544
5545
5546
5547
5548
5549
5550
5551
5552
5553
5554
5555
5556
5557
5558
5559
5560
5561
5562
5563
5564
5565
5566
5567
5568
5569
5570
5571
5572
5573
5574
5575
5576
5577
5578
5579
5580
5581
5582
5583
5584
5585
5586
5587
5588
5589
5590
5591
5592
5593
5594
5595
5596
5597
5598
5599
5600
5601
5602
5603
5604
5605
5606
5607
5608
5609
5610
5611
5612
5613
5614
5615
5616
5617
5618
5619
5620
5621
5622
5623
5624
5625
5626
5627
5628
5629
5630
5631
5632
5633
5634
5635
5636
5637
5638
5639
5640
5641
5642
5643
5644
5645
5646
5647
5648
5649
5650
5651
5652
5653
5654
5655
5656
5657
5658
5659
5660
5661
5662
5663
5664
5665
5666
5667
5668
5669
5670
5671
5672
5673
5674
5675
5676
5677
5678
5679
5680
5681
5682
5683
5684
5685
5686
5687
5688
5689
5690
5691
5692
5693
5694
5695
5696
5697
5698
5699
5700
5701
5702
5703
5704
5705
5706
5707
5708
5709
5710
5711
5712
5713
5714
5715
5716
5717
5718
5719
5720
5721
5722
5723
5724
5725
5726
5727
5728
5729
5730
5731
5732
5733
5734
5735
5736
5737
5738
5739
5740
5741
5742
5743
5744
5745
5746
5747
5748
5749
5750
5751
5752
5753
5754
5755
5756
5757
5758
5759
5760
5761
5762
5763
5764
5765
5766
5767
5768
5769
5770
5771
5772
5773
5774
5775
5776
5777
5778
5779
5780
5781
5782
5783
5784
5785
5786
5787
5788
5789
5790
5791
5792
5793
5794
5795
5796
5797
5798
5799
5800
5801
5802
5803
5804
5805
5806
5807
5808
5809
5810
5811
5812
5813
5814
5815
5816
5817
5818
5819
5820
5821
5822
5823
5824
5825
5826
5827
5828
5829
5830
5831
5832
5833
5834
5835
5836
5837
5838
5839
5840
5841
5842
5843
5844
5845
5846
5847
5848
5849
5850
5851
5852
5853
5854
5855
5856
5857
5858
5859
5860
5861
5862
5863
5864
5865
5866
5867
5868
5869
5870
5871
5872
5873
5874
5875
5876
5877
5878
5879
5880
5881
5882
5883
5884
5885
5886
5887
5888
5889
5890
5891
5892
5893
5894
5895
5896
5897
5898
5899
5900
5901
5902
5903
5904
5905
5906
5907
5908
5909
5910
5911
5912
5913
5914
5915
5916
5917
5918
5919
5920
5921
5922
5923
5924
5925
5926
5927
5928
5929
5930
5931
5932
5933
5934
5935
5936
5937
5938
5939
5940
5941
5942
5943
5944
5945
5946
5947
5948
5949
5950
5951
5952
5953
5954
5955
5956
5957
5958
5959
5960
5961
5962
5963
5964
5965
5966
5967
5968
5969
5970
5971
5972
5973
5974
5975
5976
5977
5978
5979
5980
5981
5982
5983
5984
5985
5986
5987
5988
5989
5990
5991
5992
5993
5994
5995
5996
5997
5998
5999
6000
6001
6002
6003
6004
6005
6006
6007
6008
6009
6010
6011
6012
6013
6014
6015
6016
6017
6018
6019
6020
6021
6022
6023
6024
6025
6026
6027
6028
6029
6030
6031
6032
6033
6034
6035
6036
6037
6038
6039
6040
6041
6042
6043
6044
6045
6046
6047
6048
6049
6050
6051
6052
6053
6054
6055
6056
6057
6058
6059
6060
6061
6062
6063
6064
6065
6066
6067
6068
6069
6070
6071
6072
6073
6074
6075
6076
6077
6078
6079
6080
6081
6082
6083
6084
6085
6086
6087
6088
6089
6090
6091
6092
6093
6094
6095
6096
6097
6098
6099
6100
6101
6102
6103
6104
6105
6106
6107
6108
6109
6110
6111
6112
6113
6114
6115
6116
6117
6118
6119
6120
6121
6122
6123
6124
6125
6126
6127
6128
6129
6130
6131
6132
6133
6134
6135
6136
6137
6138
6139
6140
6141
6142
6143
6144
6145
6146
6147
6148
6149
6150
6151
6152
6153
6154
6155
6156
6157
6158
6159
6160
6161
6162
6163
6164
6165
6166
6167
6168
6169
6170
6171
6172
6173
6174
6175
6176
6177
6178
6179
6180
6181
6182
6183
6184
6185
6186
6187
6188
6189
6190
6191
6192
6193
6194
6195
6196
6197
6198
6199
6200
6201
6202
6203
6204
6205
6206
6207
6208
6209
6210
6211
6212
6213
6214
6215
6216
6217
6218
6219
6220
6221
6222
6223
6224
6225
6226
6227
6228
6229
6230
6231
6232
6233
6234
6235
6236
6237
6238
6239
6240
6241
6242
6243
6244
6245
6246
6247
6248
6249
6250
6251
6252
6253
6254
6255
6256
6257
6258
6259
6260
6261
6262
6263
6264
6265
6266
6267
6268
6269
6270
6271
6272
6273
6274
6275
6276
6277
6278
6279
6280
6281
6282
6283
6284
6285
6286
6287
6288
6289
6290
6291
6292
6293
6294
6295
6296
6297
6298
6299
6300
6301
6302
6303
6304
6305
6306
6307
6308
6309
6310
6311
6312
6313
6314
6315
6316
6317
6318
6319
6320
6321
6322
6323
6324
6325
6326
6327
6328
6329
6330
6331
6332
6333
6334
6335
6336
6337
6338
6339
6340
6341
6342
6343
6344
6345
6346
6347
6348
6349
6350
6351
6352
6353
6354
6355
6356
6357
6358
6359
6360
6361
6362
6363
6364
6365
6366
6367
6368
6369
6370
6371
6372
6373
6374
6375
6376
6377
6378
6379
6380
6381
6382
6383
6384
6385
6386
6387
6388
6389
6390
6391
6392
6393
6394
6395
6396
6397
6398
6399
6400
6401
6402
6403
6404
6405
6406
6407
6408
6409
6410
6411
6412
6413
6414
6415
6416
6417
6418
6419
6420
6421
6422
6423
6424
6425
6426
6427
6428
6429
6430
6431
6432
6433
6434
6435
6436
6437
6438
6439
6440
6441
6442
6443
6444
6445
6446
6447
6448
6449
6450
6451
6452
6453
6454
6455
6456
6457
6458
6459
6460
6461
6462
6463
6464
6465
6466
6467
6468
6469
6470
6471
6472
6473
6474
6475
6476
6477
6478
6479
6480
6481
6482
6483
6484
6485
6486
6487
6488
6489
6490
6491
6492
6493
6494
6495
6496
6497
6498
6499
6500
6501
6502
6503
6504
6505
6506
6507
6508
6509
6510
6511
6512
6513
6514
6515
6516
6517
6518
6519
6520
6521
6522
6523
6524
6525
6526
6527
6528
6529
6530
6531
6532
6533
6534
6535
6536
6537
6538
6539
6540
6541
6542
6543
6544
6545
6546
6547
6548
6549
6550
6551
6552
6553
6554
6555
6556
6557
6558
6559
6560
6561
6562
6563
6564
6565
6566
6567
6568
6569
6570
6571
6572
6573
6574
6575
6576
6577
6578
6579
6580
6581
6582
6583
6584
6585
6586
6587
6588
6589
6590
6591
6592
6593
6594
6595
6596
6597
6598
6599
6600
6601
6602
6603
6604
6605
6606
6607
6608
6609
6610
6611
6612
6613
6614
6615
6616
6617
6618
6619
6620
6621
6622
6623
6624
6625
6626
6627
6628
6629
6630
6631
6632
6633
6634
6635
6636
6637
6638
6639
6640
6641
6642
6643
6644
6645
6646
6647
6648
6649
6650
6651
6652
6653
6654
6655
6656
6657
6658
6659
6660
6661
6662
6663
6664
6665
6666
6667
6668
6669
6670
6671
6672
6673
6674
6675
6676
6677
6678
6679
6680
6681
6682
6683
6684
6685
6686
6687
6688
6689
6690
6691
6692
6693
6694
6695
6696
6697
6698
6699
6700
6701
6702
6703
6704
6705
6706
6707
6708
6709
6710
6711
6712
6713
6714
6715
6716
6717
6718
6719
6720
6721
6722
6723
6724
6725
6726
6727
6728
6729
6730
6731
6732
6733
6734
6735
6736
6737
6738
6739
6740
6741
6742
6743
6744
6745
6746
6747
6748
6749
6750
6751
6752
6753
6754
6755
6756
6757
6758
6759
6760
6761
6762
6763
6764
6765
6766
6767
6768
6769
6770
6771
6772
6773
6774
6775
6776
6777
6778
6779
6780
6781
6782
6783
6784
6785
6786
6787
6788
6789
6790
6791
6792
6793
6794
6795
6796
6797
6798
6799
6800
6801
6802
6803
6804
6805
6806
6807
6808
6809
6810
6811
6812
6813
6814
6815
6816
6817
6818
6819
6820
6821
6822
6823
6824
6825
6826
6827
6828
6829
6830
6831
6832
6833
6834
6835
6836
6837
6838
6839
6840
6841
6842
6843
6844
6845
6846
6847
6848
6849
6850
6851
6852
6853
6854
6855
6856
6857
6858
6859
6860
6861
6862
6863
6864
6865
6866
6867
6868
6869
6870
6871
6872
6873
6874
6875
6876
6877
6878
6879
6880
6881
6882
6883
6884
6885
6886
6887
6888
6889
6890
6891
6892
6893
6894
6895
6896
6897
6898
6899
6900
6901
6902
6903
6904
6905
6906
6907
6908
6909
6910
6911
6912
6913
6914
6915
6916
6917
6918
6919
6920
6921
6922
6923
6924
6925
6926
6927
6928
6929
6930
6931
6932
6933
6934
6935
6936
6937
6938
6939
6940
6941
6942
6943
6944
6945
6946
6947
6948
6949
6950
6951
6952
6953
6954
6955
6956
6957
6958
6959
6960
6961
6962
6963
6964
6965
6966
6967
6968
6969
6970
6971
6972
6973
6974
6975
6976
6977
6978
6979
6980
6981
6982
6983
6984
6985
6986
6987
6988
6989
6990
6991
6992
6993
6994
6995
6996
6997
6998
6999
7000
7001
7002
7003
7004
7005
7006
7007
7008
7009
7010
7011
7012
7013
7014
7015
7016
7017
7018
7019
7020
7021
7022
7023
7024
7025
7026
7027
7028
7029
7030
7031
7032
7033
7034
7035
7036
7037
7038
7039
7040
7041
7042
7043
7044
7045
7046
7047
7048
7049
7050
7051
7052
7053
7054
7055
7056
7057
7058
7059
7060
7061
7062
7063
7064
7065
7066
7067
7068
7069
7070
7071
7072
7073
7074
7075
7076
7077
7078
7079
7080
7081
7082
7083
7084
7085
7086
7087
7088
7089
7090
7091
7092
7093
7094
7095
7096
7097
7098
7099
7100
7101
7102
7103
7104
7105
7106
7107
7108
7109
7110
7111
7112
7113
7114
7115
7116
7117
7118
7119
7120
7121
7122
7123
7124
7125
7126
7127
7128
7129
7130
7131
7132
7133
7134
7135
7136
7137
7138
7139
7140
7141
7142
7143
7144
7145
7146
7147
7148
7149
7150
7151
7152
7153
7154
7155
7156
7157
7158
7159
7160
7161
7162
7163
7164
7165
7166
7167
7168
|
# SoftEther VPN String Table
# Copyright (c) SoftEther VPN Project. All Rights Reserved.
#
# http://www.softether.co.jp/
###########################################################################
# #
# String data such as messages in software #
# (Excludes dialog box resource strings) #
# #
###########################################################################
# Environment parameters
DEFAULT_FONT Tahoma
DEFAULT_FONT_WIN7 Segoe UI
DEFAULT_FONT_2 Tahoma
DEFAULT_FONT_SIZE 8
DEFAULE_LOCALE - - $ : : $ Sun Mon Tue Wed Thu Fri Sat : : : $ (None)
# 言語
# (0: 日本語, 1: 英語)
LANG 1
LANGSTR English
STRTABLE_ID SE_VPN_20121007
# Strings for Japanese version only (not required for other language versions.)
CM_JAPANESE_ONLY_OLD_STARTUP %s\\SoftEther VPN Client 2.0 タスクトレイ.lnk
# Software information
PRODUCT_NAME_VPN_CLI SoftEther VPN Client
PRODUCT_NAME_VPN_CMGR SoftEther VPN Client Manager
PRODUCT_NAME_VPN_SVR SoftEther VPN Server
PRODUCT_NAME_VPN_BRIDGE SoftEther VPN Bridge
PRODUCT_NAME_VPN_SMGR SoftEther VPN Server Manager
PRODUCT_NAME_ELOGSVC SoftEther EtherLogger Beta Edition
PRODUCT_NAME_ELOGMGR SoftEther EtherLogger Manager Beta Edition
# Branding String for Limited Connection
# BRANDED_C_TO_S Branded_VPN
# BRANDED_C_FROM_S Branded_VPN
# Client ID (sample)
# CLIENT_ID 123
# Family Name for Software Update Check
PRODUCT_FAMILY_NAME SoftEther
# Product information
SE_COMPANY_URL https://selinks.org/?se
SE_VPNAZURE_URL https://selinks.org/?vpnazure
# Common strings
COMMON_UNKNOWN (Unknown)
# Protocol error strings
ERR_UNKNOWN An unknown error occurred.
ERR_0 No error.
ERR_1 Connection to the server failed. Check network connection and make sure that address and port number of destination server are correct.
ERR_2 Protocol error occurred. Error was returned from the destination server.
ERR_3 Connection has been disconnected.
ERR_4 Protocol error occurred.
ERR_5 A client which is non-SoftEther VPN software has connected to the port.
ERR_6 The command has been canceled by user.
ERR_7 The server denied the specified auth type.
ERR_8 The specified Virtual Hub does not exist on the server.
ERR_9 User authentication failed.
ERR_10 The specified Virtual Hub is currently stopped. Wait for a while and then reconnect.
ERR_11 The VPN session has been deleted. It is possible that either the administrator disconnected the session or the connection from the client to the VPN Server has been disconnected.
ERR_12 Access has been denied.
ERR_13 Time-out occurred during VPN session communication. It is possible the connection from the client to the VPN Server has been disconnected.
ERR_14 Protocol number is invalid.
ERR_15 There are too many TCP/IP connections.
ERR_16 There are too many sessions connected to either the destination server or Virtual Hub.
ERR_17 Connection to proxy server failed.
ERR_18 An error occurred on the proxy server.
ERR_19 User authentication failed on the proxy server.
ERR_20 There are too many sessions by the same user. Other person might be connected to the Virtual Hub as the same user.
ERR_21 A license error occurred on the VPN Server. Contact the VPN Server's administrator.
ERR_22 Cannot access the Virtual Network Adapter device driver. Check the Virtual Network Adapter is installed and make sure that it has not been disabled.
ERR_23 An internal error occurred.
ERR_24 Access to either the smart card or USB hardware token device failed.
ERR_25 The PIN code is incorrect.
ERR_26 The specified certificate is not stored on either the smart card or the USB hardware token device.
ERR_27 The specified private key is not stored on either the smart card or the USB hardware token device.
ERR_28 Write operation to the smart card or USB hardware token device failed.
ERR_29 Object not found.
ERR_30 A Virtual Network Adapter with the specified name already exists. Specify a different name.
ERR_31 Installation of the Virtual Network Adapter device driver failed.
ERR_32 You cannot use the specified name for a Virtual Network Adapter device.
ERR_33 Unsupported.
ERR_34 VPN Connection Setting with the specified name already exists.
ERR_35 The specified VPN Connection Setting is currently connected.
ERR_36 The specified VPN Connection Setting does not exist.
ERR_37 The specified VPN Connection Setting is not connected.
ERR_38 Invalid parameter.
ERR_39 Error occurred on smart card or USB hardware token.
ERR_40 Although authentication of smart card or USB hardware token was selected, but the device to be used has not been selected. Select from the Smart Card menu of Connection Manager.
ERR_41 The specified Virtual Network Adapter is being used by at least one VPN Connection Setting. \r\nEither delete the VPN Connection Setting that is using this Virtual Network Adapter or change Virtual Network Adapter that this VPN Connection Setting is using.
ERR_42 Cannot find the Virtual Network Adapter that the specified VPN Connection Setting is using. \r\nMake sure this Virtual Network Adapter exists. Also make sure the Virtual Network Adapter device has not been disabled. \r\n\r\nIf you cannot resolve the problem, either change the Virtual Network Adapter being used by this VPN Connection Setting or create a new Virtual Network Adapter with the same name.
ERR_43 The Virtual Network Adapter used by the specified VPN Connection Setting is already being used by another VPN Connection Setting. \r\nIf there is another VPN Connection Setting that is using the same Virtual Network Adapter, disconnect that VPN Connection Setting.
ERR_44 The Virtual Network Adapter being used by the specified VPN Connection Setting has been disabled. \r\nBefore using this VPN Connection Setting, enable the Virtual Network Adapter.
ERR_45 The specified value is invalid.
ERR_46 The connection destination is not a cluster controller.
ERR_47 Trying to connect.
ERR_48 Connection to the cluster controller failed.
ERR_49 The cluster controller was unable to assign a new session on a cluster.
ERR_50 Unable to manage the Virtual Hub of the cluster member server.
ERR_51 The user's password used to connect was blank so the connection from remote is prohibited. Blank password can be allowed only to connections from the VPN Server's localhost (127.0.0.1).
ERR_52 Not enough privileges.
ERR_53 Specified listener not found.
ERR_54 The listener of the specified port number already exists.
ERR_55 This is not a cluster member server.
ERR_56 The specified encryption algorithm name is not supported.
ERR_57 The Virtual Hub with the specified name already exists on the server.
ERR_58 There are too many registered Virtual Hubs. No more can be created. Delete the old Virtual Hubs.
ERR_59 The Cascade Connection with the specified name already exists.
ERR_60 A Cascade Connection cannot be created on a server on a cluster.
ERR_61 The specified Cascade Connection is offline.
ERR_62 There are too many access lists.
ERR_63 There are too many users.
ERR_64 There are too many groups.
ERR_65 The specified group does not exist.
ERR_66 The user with the specified name already exists on the Virtual Hub.
ERR_67 The group with the specified name already exists on the Virtual Hub.
ERR_68 A user with the specified name exists on the server but the type of authentication is not password authentication. Unable to change the password.
ERR_69 The user name or old password you entered is incorrect. Note that the password is case-sensitive.
ERR_70 Saitama.
ERR_71 SoftEther has temporarily stopped the current distribution by order of the Japan Ministry of Economy Trade and Industry.
ERR_72 SoftEther has temporarily stopped the current distribution by order of the IPA.
ERR_73 Unable to disconnect the Cascade Connection's session. To delete the session, stop the Cascade Connection.
ERR_74 The VPN Connection Setting for connection with the VPN Server is incomplete. At first you have to complete the VPN Connection Setting for connection with the VPN Server.
ERR_75 VPN Connection to the VPN Server has already started.
ERR_76 Not connected to the VPN Server.
ERR_77 The specified X509 certificate file does not contain a RSA 1024 bit or 2048 bit public key. SoftEther VPN software supports only RSA 1024 bit or 2048 bit certificates.
ERR_78 Unable to disconnect the SecureNAT session. To delete the session, stop the SecureNAT function.
ERR_79 Cannot enable the SecureNAT in a clustering environment.
ERR_80 The SecureNAT is not operating.
ERR_81 This VPN Connection session to the VPN Server has been disconnected by the firewall device installed by the network administrator. Contact the network administrator.
ERR_82 Unable to disconnect the Local Bridge session. To delete the session, stop the Local Bridge.
ERR_83 The Local Bridge is not operating.
ERR_84 Local Bridge cannot be used by the destination VPN Server. Refer to online help or other documentation for the setting method when using Local Bridge on the VPN Server you are using.
ERR_85 Unable to trust the certificate provided by the destination server. The setting to always verify the server certificate is enabled in the VPN Connection Settings. Either register a root certificate that can be trusted or register a individual certificate.
ERR_86 The product code of the destination server is incorrect. It is not possible to connect from this client.
ERR_87 The client and server version is different. Update the software.
ERR_88 Failed to add a capture device. A same capture device might be already registered.
ERR_89 Unable to connect to the destination server from this client. A special client software is required.
ERR_90 The specified capture device is not registered.
ERR_91 Unable to disconnect the Virtual Layer 3 Switch session. To delete the session, stop the Virtual Layer 3 Switch.
ERR_92 A Virtual Layer 3 Switch with the specified name already exists. Specify a different name.
ERR_93 Specified Virtual Layer 3 Switch not found.
ERR_94 The specified name is invalid. Check if the name contains characters that cannot be used.
ERR_95 Failed to add the Virtual Layer 3 interface.
ERR_96 Failed to delete the Virtual Layer 3 interface.
ERR_97 The Virtual Layer 3 interface that is connecting to the destination Virtual Hub of the specified Virtual Layer 3 interface already exists in the Virtual Layer 3 Switch. No more than one Virtual Layer 3 interface that connects to the same Virtual Hub can be defined in a Virtual Layer 3 Switch.
ERR_98 Failed to add routing table entry.
ERR_99 Failed to delete routing table entry.
ERR_100 The specified routing table entry already exists.
ERR_101 The client clock and the server clock are not synchronized with each other. Check the time settings.
ERR_102 Unable to start this Virtual Layer 3 Switch. \r\n\r\nTo start the Virtual Layer 3 Switch, at least 1 virtual interface must be defined in the Virtual Layer 3 Switch.
ERR_103 Not enough Client Connection Licenses on the destination VPN Server. Contact the server administrator.
ERR_104 Not enough Bridge Connection Licenses on the destination VPN Server. Contact the server administrator.
ERR_105 Due to current technical difficulties, the destination VPN Server is not receiving the connection. Either wait a while, or contact the VPN Server administrator requesting that the server log file be checked.
ERR_106 The destination VPN Server's certificate has expired. Contact the VPN Server's administrator.
ERR_107 A connection has beens requested in Monitoring Mode. But the security policy for the connecting user does not permit Monitoring Mode.
ERR_108 A connection has been requested in Bridge / Router Mode. But the security policy for the connecting user forbids both bridge mode and router mode.
ERR_109 A connection from a client IP address has been denied by the Source IP Restriction List of the Virtual Hub.
ERR_110 There are too many items.
ERR_111 Out of memory.
ERR_112 The specified object already exists.
ERR_113 A fatal error occurred. It is possible that the program operation is unable to continue.
ERR_114 The destination VPN Server has detected a software license violation. Connection is refused. Contact the VPN Server's administrator.
ERR_115 The destination VPN Server has connected via the Internet to an important server provided by SoftEther VPN Project and cannot validate a license. Either wait a while, or contact the VPN Server administrator requesting that the server log file and the Internet connection status of the server itself be checked.
ERR_116 A software license violation has been detected on the client side. Connection is refused.
ERR_117 The command or file name is incorrect.
ERR_118 The license key is incorrect.
ERR_119 No valid product license is registered on the VPN Server. Contact the VPN Server's administrator.
ERR_120 The product license required for the VPN Server to operate as a cluster is not registered. Contact the VPN Server's administrator.
ERR_121 This VPN Connection Setting has been installed using the "Web Installer Creation Kit" or "Simple Installer Creation Kit". The destination server is not an edition that supports the SoftEther VPN 2.0 Administration Pack. Contact the system administrator or person who created the installer.
ERR_122 With the VPN Server SDK for .NET, it is only possible to connect to the SoftEther VPN Server edition that supports the SoftEther VPN 2.0 Administration Pack. The destination VPN Server is not an edition that supports the SoftEther VPN 2.0 Administration Pack. Contact the system administrator.
ERR_123 Beta Version Software on the destination server is expired. Contact to system administrator of the server to download a new beta version or full version from http://selinks.org/.
ERR_124 The VPN connection to VPN Server is refused at server side.
ERR_125 The VPN connection to VPN Server is refused at client side.
ERR_126 The security policy enforced the VPN session to disconnect automatically because the specific time has been elapsed. If you wish to continue please re-connect.
ERR_127 The VPN Server requires the special-version VPN Client software. Consult with the administrator.
ERR_128 The number of registered user objects exceeds the maximum number which is allowed the product license applied on the VPN Server. You cannot add user objects anymore unless you delete old one, or upgrade the edition of the product.
ERR_129 The subscription contract has already expired before the release-date of this version of VPN Server. The customer has been authorized to use VPN Server's builds only in the period of the subscription contract. The customer has to extend the period of the subscription. The customer also be able to 'downgrade' the version of VPN Server to older version which has released before the end of the subscription. If you want to downgrade the version, older versions might be available on http://selinks.org/.
ERR_130 We are afraid that the trial license keys cannot be obtained frequently by the same customer. Please consider to purchase the product version.
ERR_131 Several VPN Servers on the same IP address. You can specify the destination server's private IP or hostname concretely such as "Global IP address or host name/192.168.x.x". Or if a NAT is used on the server's side, configure the NAT to open, relay or transfer appropriate ports.
ERR_132 The key for Dynamic DNS Service duplicates to others. The key will be reset automatically.
ERR_133 The specified Dynamic DNS hostname is already used. Please change the hostname.
ERR_134 The specified Dynamic DNS hostname has an invalid characters. Please change the hostname.
ERR_135 The length of the specified Dynamic DNS hostname is too long. A hostname must be equal or shorter than 31 letters.
ERR_136 The Dynamic DNS hostname is not specified.
ERR_137 The length of the specified Dynamic DNS hostname is too long. A hostname must be equal of longer than 3 letters.
ERR_138 The password of the specified user in the Virtual Hub must be reset before using MS-CHAP v2 authentication. Please ask the administrator of the VPN Server to reset the password by the VPN Server Manager or vpncmd which internal version is 4.0 or greater. Or you can change the password with VPN Client by yourself.
ERR_139 The connection to the Dynamic DNS server has been disconnected.
ERR_140 Failed to initialize the ICMP (Ping) protocol. The process of the VPN Server might be running in a normal-user privileges. In such case, run the VPN Server as a system service. (in Linux / UNIX, run it in root privileges.)
ERR_141 Failed to open the DNS port 53. Make sure that there are no other DNS server program (for example, BIND or Microsoft DNS Server) on the same computer. If there are conflicting services stop them. Or run the VPN Server's process in root privileges on Linux / UNIX/
ERR_142 The OpenVPN Server function is not enabled.
ERR_143 The Certificate Authentication function and the External Server Authentication function have not been implemented on the open-source version of SoftEther VPN yet. Choose either Anonymous Authentication or Password Authentication instead.
ERR_144 Unacceptable operation. Use the VPN Gate Control Panel to change the VPN Gate Relay Server settings.
ERR_145 Unacceptable operation. Use the VPN Gate Utility to modify the connection setting for VPN Gate Public VPN Relay Servers.
ERR_146 The VPN Gate Service is running inside the VPN Client program. You cannot stop the VPN Gate Service on this screen. Use the VPN Client Manager to enable or disable the VPN Gate Service.
ERR_147 This feature is not supported. It hasn't been implemented yet on the open-source version of SoftEther VPN.
ERR_148 The VPN connection was disconnected because the system is being suspended.
# Concerning licenses
LICENSE_INFO_URL https://selinks.org/?new_license
LICENSE_SUPPORT_URL https://selinks.org/?q=license_info&id=%s
LICENSE_STATUS_OK Valid
LICENSE_STATUS_EXPIRED Expired
LICENSE_STATUS_ID_DIFF Server ID Mismatch
LICENSE_STATUS_DUP Duplication
LICENSE_STATUS_INSUFFICIENT Other Licenses are Required
LICENSE_STATUS_COMPETITION Competition with Other Licenses
LICENSE_STATUS_NONSENSE Meaningless for Current Edition
LICENSE_STATUS_CPU CPU Type is Incompatible
LICENSE_STATUS_OTHERERROR Unknown Error
# Concerning TCP optimization
TCPOPT_NOT_SUPPORTED The TCP Optimization Utility cannot be used on this operating system.
TCPOPT_NOT_ADMIN Users without administrator privileges cannot use the TCP Optimization Utility.
# Windows Vista / Windows 7 / Windows 8 Optimization
VISTA_MMCSS_MSG Do you wish to optimize Windows Vista / Windows 7 / Windows 8 / Windows 10 for playing multimedia files with VPN? (e.g. videos, audios and streaming)
VISTA_MMCSS_MSG_2 Optimization for Windows Vista / Windows 7 / Windows 8 / Windows 10 with VPN has already done.\r\nDo you wish to remove optimized configuration?
VISTA_MMCSS_MSG_3 You cannot use optimization in currently environment.
VISTA_MMCSS_MSG_4 You must have administrator privileges for this function.\r\nPlease note that in Windows Vista / Windows 7 / Windows 8 / Windows 10 you should use "Run as Administrators" to execute program.
VISTA_MMCSS_MSG_5 Optimization is finished.
VISTA_MMCSS_MSG_6 Optimization configuration is removed.
# Concerning PKCS utility
PKCS_UTIL_TITLE PKCS#12 Writing Utility
PKCS_UTIL_SAVEDLG_TITLE Select the PKCS#12 file that you want to write to the USB token.
PKCS_UTIL_READ_ERROR Unable to read the file: %s.
PKCS_UTIL_WRITE_OK_MSG The file %s has been written to the USB hardware token.
PKCS_UTIL_DELETE_OK_MSG The PKCS#12 certificate data has been deleted from the USB hardware token.
PKCS_UTIL_SECA_FILENAME seca_p12
PKCS_MAKE_SURE The PKCS#12 certificate data written to USB token will be deleted. \r\n Once data is deleted it cannot be restored. \r\r\n\r\r\nDo you wish to continue?
PKCS_UTIL_BAD_FILE The specified file could not be identified as a PKCS#12 file.
# Concerning common dialogs
DLG_ALL_FILES All Files (*.*)|*.*
DLG_CERT_FILES X509 Certificate Files (*.CER;*.CRT)|*.cer;*.crt|All Files (*.*)|*.*
DLG_KEY_FILTER Private Key Files (*.KEY;*.PEM)|*.key;*.pem|All Files (*.*)|*.*
DLG_PKCS12_FILTER PKCS#12 Files (*.P12;*.PFX)|*.p12;*.pfx|All Files (*.*)|*.*
DLG_CERT_OR_P12_FILTER X509 Certificate Files or PKCS#12 Files (*.CER;*.CRT;*.P12;*.PFX)|*.cer;*.crt;*.p12;*.pfx|X509 Certificate Files (*.CER;*.CRT)|*.cer;*.crt|PKCS#12 Files (*.P12;*.PFX)|*.p12;*.pfx|All Files (*.*)|*.*
DLG_CONFIG_FILES Setting Files (*.CONFIG)|*.config|All Files (*.*)|*.*
DLG_KEY_OR_P12_FILTER Private Key Files or PKCS#12 Files (*.KEY;*.PEM;*.P12;*.PFX)|*.key;*.pem;*.p12;*.pfx|Private Key Files (*.KEY;*.PEM)|*.key;*.pem|PKCS#12 Files (*.P12;*.PFX)|*.p12;*.pfx|All Files (*.*)|*.*
DLG_ZIP_FILER ZIP Files (*.ZIP)|*.zip|All Files (*.*)|*.*
DLG_OPEN_CERT Select the Certificate File
DLG_OPEN_KEY Select the Private Key File
DLG_OPEN_KEY_WITH_CERT Select the Corresponding Private Key file
DLG_OPEN_FILE_ERROR Unable to read the specified file: %S.
DLG_OPEN_FILE_ERROR_W Unable to read the specified file: %s.
DLG_BAD_P12 The file "%S" is not a valid PKCS#12 certificate file.
DLG_BAD_P12_W The file "%s" is not a valid PKCS#12 certificate file.
DLG_BAD_X509 The file "%S" is not a valid X509 certificate file.
DLG_BAD_X509_W The file "%s" is not a valid X509 certificate file.
DLG_BAD_KEY The file "%S" is not a valid RSA private key file.
DLG_BAD_KEY_W The file "%s" is not a valid RSA private key file.
DLG_BAD_SIGNATURE The private key does not correctly correspond with the public key contained in the specified certificate. \r\nA private key that corresponds to the certificate public key is required.
DLG_SAVE_CERT Specify a file name where you want to save the certificate
DLG_SAVE_KEY Specify a file name where you want to save the private key
DLG_SAVE_P12 Specify a file name where you want to save the certificate and private key
DLG_SAVE_FILE Specify a file name to save a file
DLG_SAVE_OPENVPN_CONFIG Specify a file name to save the ZIP file contains OpenVPN settings
DLG_CERT_SAVE_OK The certificate has been saved successfully.
DLG_CERT_SAVE_ERROR Unable to save certificate.
DLG_KEY_SAVE_OK The private key has been saved successfully.
DLG_KEY_SAVE_ERROR Unable to save private key.
DLG_KEY_PAIR_SAVE_OK The certificate and private key were saved successfully.
DLG_KEY_PAIR_SAVE_ERROR Unable to save the certificate and private key.
DLG_REBOOT_INFO The computer will restart after %u seconds.
DLG_REBOOT_INFO_2 Restarting the computer.
DLG_REBOOT_ERROR Failed to restart the computer. \r\n\r\nPlease manually restart the computer now.
DLG_SAVE_CONFIG Specify a File Name for Saving the Configuration
DLG_OPEN_CONFIG Specify the Configuration File to Import
DLG_STRING_DEFTITLE String Input
DLG_STRING_DEFINFO Enter strings.
DLG_ABOUT_LEGAL Legal Notices
DLG_ABOUT_AUTHORS List of Authors
DLG_UPDATE_DATE \ (Released on %S)
DLG_UPDATE_HINT Press OK to view the information of the latest update on the web browser.\r\n\r\nYou have to download and install updates manually. If you want to update software on the other computer you have to log in to the computer by Remote Desktop or SSH to perform the download and update.
# Concerning competing processes
BAD_PROCESS_TITLE Warning concerning %S
BAD_PROCESS_MESSAGE It is possible that the software "%S" is running on this computer, which could cause problems. \r\n\r\nThere is a possibility that problems in "%S" will cause instability in VPN communication and errors. \r\n\r\nIf, by using VPN together with the software "%S" VPN becomes unstable, either stop or uninstall "%S". (Note that in some cases, because of the nature of the software, there are cases that the problems will still remain on the computer where even if you stop the software.) \r\n
# Concerning hardware tokens
SEC_SMART_CARD Smart Card
SEC_USB_TOKEN USB Token
SEC_INIT_MSG_1 Insert the following smart card into the smart card reader and enter the PIN code.
SEC_INIT_MSG_2 Connect the following USB token hardware to the computer's USB port and enter the PIN code.
SEC_OPENING Opening Device...
SEC_CLOSING Closing Device...
SEC_OPEN_SESSION Opening Secure Session...
SEC_CLOSE_SESSION Closing Secure Session...
SEC_LOGIN Logging in to Token...
SEC_LOGOUT Logging out from Token...
SEC_INIT_BATCH Starting Batch Process...
SEC_READ_DATA Reading Data...
SEC_WRITE_DATA Writing Data...
SEC_READ_CERT Reading Certificate...
SEC_WRITE_CERT Writing Certificate...
SEC_DELETE Deleting Object...
SEC_SIGN Processing Digital Signature by Private Key...
SEC_WRITE_KEY Writing Private Key...
SEC_ENUM Enumerating Object...
SEC_FINISHED The operation is complete.
SEC_ERROR_INVALID_ID The specified security device (device %u) is invalid.
SEC_ERROR_OPEN_DEVICE Unable to open the device %S. Make sure the device is connected to the computer.
SEC_ERROR_OPEN_DEVICEEX Unable to open the device %S. Make sure the device is connected to the computer. \r\n\r\nIf using public key infrastructure (PKI) with special client software, it is necessary to select the smart card device in PKI Utility from the Start menu beforehand.
SEC_ERROR_OPEN_SESSION Unable to start security session in device: %S. Make sure the correct device is selected.
SEC_ERROR_LOGIN The entered PIN code is incorrect.
SEC_ERROR_NOT_FOUND_1 The specified object does not exist in smart card. Make sure the correct smart card is inserted.
SEC_ERROR_NOT_FOUND_2 The specified object does not exist in USB token hardware. Make sure the correct USB token hardware is connected.
SEC_ERROR_SIGN_1 Either private key does not exist in smart card or digital signature operation failed. Make sure the correct smart card is inserted.
SEC_ERROR_SIGN_2 Either private key does not exist in USB token hardware or digital signature operation failed. Make sure the correct USB token hardware is connected.
SEC_ERROR_WRITE_1 Unable to write object to smart card. There is a possibility that there is insufficient free memory available on smart card.
SEC_ERROR_WRITE_2 Unable to write object to USB token hardware. There is a possibility that is insufficient free memory available on the USB token.
SEC_ERROR_ENUM Enumeration of object stored in token failed.
SEC_ERROR_DELETE Deletion of specified object failed. It is possible the specified object does not exist in the memory.
SEC_COLUMN1 Device Name
SEC_COLUMN2 Type
SEC_COLUMN3 Manufacturer
SEC_COLUMN4 DLL Name
SEC_INVALID_ID The specified smart card device does not exist. Select the smart card type again.
SEC_MGR_COLUMN1 Name
SEC_MGR_COLUMN2 Type
SEC_MGR_COLUMN3 Private
SEC_TYPE_DATA Data
SEC_TYPE_CERT Certificate
SEC_TYPE_KEY Private Key
SEC_TYPE_PUB Public Key
SEC_YES Yes
SEC_NO No
SEC_NONE None
SEC_IMPORT_DATA Select the data you want to import.
SEC_IMPORT_CERT Select the certificate you want to import.
SEC_IMPORT_KEY Select the private key you want to import.
SEC_READ_FAILED Reading from specified file failed.
SEC_DATA_TOO_BIG The specified data size is too big. Data larger than %u bytes cannot be written to the smart card.
SEC_OBJECT_NAME_TITLE Name of object to insert
SEC_OBJECT_NAME_INFO Specify the name of the object to be written to the new smart card. You can specify alphanumeric characters excluding double-byte and special characters for the object name. \r\n\r\nCaution: If there is an object with the same name of the same type already written on the card, that object will be overwritten.
SEC_DELETE_MSG The selected object will be deleted from the smart card. \r\nDo you really want to do this?
SEC_OBJECT_IMPORT_OK Object has been written to smart card.
SEC_OBJECT_EXPORT_OK The data read from the smart card has been saved.
SEC_NEW_CERT_IMPORT_OK The newly created certificate has been written to the smart card.
SEC_CURRENT_DEVICE Currently the device %S is selected.
SEC_CURRENT_NO_DEVICE Select which smart card device to use.
SEC_NO_SECURE_DEVICE A SoftEther VPN-compatible smart card or hardware security token device is not installed on the system. \r\n\r\nTo use a smart card or hardware token using SoftEther VPN it is necessary to install a PKCS#11-compatible device driver on Windows. In addition, it is necessary that SoftEther VPN supports the device type. \r\n\r\nMake sure a system-compatible device driver has been installed. \r\nRefer to the SoftEther VPN Project website for the list of SoftEther VPN-compatible devices. Also, it may be possible to increase the compatible devices by updating to the most recent software version.
SEC_PIN_DEVICE_OPEN_ERR Unable to connect the device "%S". Make sure the hardware is correctly connected.
SEC_PIN_CURRENT_BAD Current PIN code is incorrect.
SEC_PIN_CHANGE_FAILED Changing of PIN code failed.
SEC_PIN_OK The PIN code has been changed.
# TCP Connecion Dialog
CONNECTDLG_CAPTION Connecting
CONNECTDLG_MESSAGE Connecting to the server "%S" (TCP port: %u)...
CONNECTDLG_CANCELING Aborting the connection. Please wait...
# NIC Info Dialog
NICINFO_1 Connected to the VPN Server.
NICINFO_1_1 Requesting an IP address to the DHCP server in the VPN...
NICINFO_1_2 Determining the IP address to use in the VPN...
NICINFO_2 The VPN Connection is Established.
NICINFO_2_1 Your assigned IP address is %S.
NICINFO_3 The VPN Connection is Established.
NICINFO_3_1 Your IP address %S is ready to use.
# Concerning password input dialogs during login
PW_RETRYCOUNT Automatic reconnection will be made after %u seconds with no input.
PW_LOGIN_DLG_TITLE Login
PW_TYPE_0 Anonymous Authentication
PW_TYPE_1 Standard Password Authentication
PW_TYPE_2 RADIUS or NT Domain Authentication
PW_TYPE_3 Client Certificate Authentication
PW_TYPE_4 Smart Card Authentication
PW_MSG_PROXY User authentication failed on the proxy server %S. Re-enter the correct user name and password.
PW_TYPE_PROXY Proxy Server Authentication
# Concerning VPN connection status
STATUS_1 Initializing...
STATUS_2 Connecting to VPN Server "%S" via Proxy Server %S...
STATUS_3 Authenticating User on Proxy Server %S...
STATUS_4 Connecting to VPN Server "%S"...
STATUS_5 Verifying Server Certificate...
STATUS_6 Authenticating User...
STATUS_7 Establishing VPN Session...
STATUS_8 Connecting to VPN Server on Cluster...
STATUS_9 VPN Session has been established.
# Concerning certificate dialogs
CERT_NOT_FOUND Unable to find the certificate of the certificate authority who issued this certificate on the list of trusted certificates.
CERT_ROOT This certificate is a root certificate (self-signed certificate).
CERT_LV_C1 Field
CERT_LV_C2 Value
CERT_SERIAL Serial Number
CERT_ISSUER Issuer
CERT_SUBJECT Subject
CERT_NOT_BEFORE Issued at
CERT_NOT_AFTER Expires at
CERT_BITS Bits
CERT_PUBLIC_KEY Public Key
CERT_DIGEST_MD5 Digest (MD5)
CERT_DIGEST_SHA1 Digest (SHA-1)
CERT_NO_SERIAL There is no serial number
CERT_BITS_FORMAT %u bits
# Concerning certificate confirmation dialogs
CC_DANGEROUS_MSG The server certificate that was saved on the previous VPN connection to this server (%S) does not match the current server certificate provided by the server. \r\n\r\nDigest Value (MD5) of Previous: %S\r\nDigest Value (SHA1) of Previous: %S\r\n\r\nDigest Value (MD5) of Current: %S\r\nDigest Value (SHA1) of Current: %S\r\n\r\nIt is possible the server administrator changed the certificate on the VPN Server side. However, it is also possible a man-in-the-middle attack such as spoofing is occurring. \r\nIt is strongly recommended that you ask for clarification from the administrator of VPN Server you want to connect to.
CC_WARNING_MSG Do you want the certificate of the VPN Server you are currently connecting to be automatically trusted next time you connect to %s?\r\n\r\nDigest Value (SHA1): %S\r\nDigest Value (MD5): %S\r\n\r\nIf there is doubt regarding the authenticity of this server's certificate, contact the server's owner, by a sure and safe method, and quote the above digest value to confirm the facts. \r\n\r\nClick Yes to automatically trust this certificate if this server provides the same certificate next time you connect to it. \r\nClick No to trust the certificate for this time only and to display this warning again next time you connect to this server. \r\nClick Cancel to return to the Security Warnings window. \r\n\r\nNote: This setting can be changed on an account-by-account basis. You can make this setting in Account Properties of VPN Client Manager.
# Errors about Windows Versions
WINVER_TITLE Warning about Windows versions
WINVER_ERROR_FORMAT The version and Service Pack of Windows on %s is "%S".\r\n\r\nThe latest supported version and Service Pack of Windows by %s is as follows:\r\n%S\r\nBecause of the version of Windows on %s is newer than the version of Windows which %s supports, unexpected troubles or compatible issues might occur.\r\nIn order to avoid problems, we will recommend you to obtain and install the latest update of %s.\r\n(It is possible to continue using the current version without updates although that is not what we recommend.)\r\n\r\nIf you are the administrator, you can download the latest update-patch of %s from the web site http://selinks.org/?se for free.\r\n\r\nIf you are not the administrator you should notify the VPN Server's administrator of this message.\r\n\r\n----- MSG%04u%02u -----\r\n\r\n
WINVER_ERROR_VPNSERVER the VPN Server on the destination computer
WINVER_ERROR_VPNBRIDGE the VPN Bridge on the destination computer
WINVER_ERROR_VPNCLIENT the VPN Client on this local computer
WINVER_ERROR_PC_LOCAL this local computer
WINVER_ERROR_PC_REMOTE the remote server
# Warning for Open-source Version
OSS_MSG Welcome to the SoftEther VPN Server Academic Version!\r\n\r\n\r\nThis VPN Server is open-source free software developed as academic research at University of Tsukuba, Japan, and distributed from the SoftEther VPN Project (http://www.softether.org/), for free of charge for the public interests.\r\n\r\nSoftEther VPN software is distributed to public as a part of the joint-research contract between University of Tsukuba and SoftEther VPN Project. SoftEther VPN software is developed and published for JUST AN ACADEMIC RESEARCH PURPOSE. Therefore no support service are provided about SoftEther VPN software even if it contains bugs or vulnerabilities. A user will be liable for the result of use SoftEther VPN. The developers and publishers of SoftEther VPN will never be liable for either any consequences or damages.\r\n\r\nEnjoy using VPN with SoftEther VPN Server.\r\n\r\nFor more details of SoftEther VPN, visit http://www.softether.org/.\r\n\r\n
NATT_MSG ** Connected with NAT traversal - might be unstable **\r\n\r\nThis VPN Client is connected to the VPN Server '%S' by using the NAT Traversal (UDP Hole Punching) technology.\r\n\r\nNAT Traversal allows the VPN Server behind the NAT-box to accept VPN connections from VPN Client without any port-forwarding setting on the NAT-box.\r\n\r\nHowever, NAT Traversal-based VPN sessions sometimes become unstable, because NAT Traversal uses UDP-based protocol. For example, the VPN tunnel disconnects every 5 minutes if there is a poor NAT-box between the VPN Server and the VPN Client. Some large-scale NAT gateways in cheap ISPs sometimes cause the same problem on NAT Traversal. This is a problem of routers or ISPs. This is not a problem of SoftEther VPN software.\r\n\r\nTo solve the unstable tunnel problem, you should connect to the VPN Server's TCP listener port directly, instead of using NAT Traversal. To connect to the VPN Server directly by using TCP, a listener port of the VPN Server must be exposed to the Internet by a port-forward setting on the NAT-box. Ask the administrator of the NAT-box, or refer to the manual of the NAT-box to add a port-forwarding setting on the NAT-box.\r\n\r\nIf this message still remains despite the VPN Server is exposing a TCP port to the Internet, check the "Disable NAT-T" checkbox on the VPN Client connection setting screen.\r\n\r\n
NATT_MSG2 ** Connected with NAT traversal - might be unstable **\r\n\r\nThis VPN Client is connected to the VPN Server '%S' by using the NAT Traversal (UDP Hole Punching) technology.\r\n\r\nNAT Traversal allows the VPN Server behind the NAT-box to accept VPN connections from VPN Client without any port-forwarding setting on the NAT-box.\r\n\r\nHowever, NAT Traversal-based VPN sessions sometimes become unstable, because NAT Traversal uses UDP-based protocol. For example, the VPN tunnel disconnects every 5 minutes if there is a poor NAT-box between the VPN Server and the VPN Client. Some large-scale NAT gateways in cheap ISPs sometimes cause the same problem on NAT Traversal. This is a problem of routers or ISPs. This is not a problem of SoftEther VPN software.\r\n\r\nTo solve the unstable tunnel problem, you should connect to the VPN Server's TCP listener port directly, instead of using NAT Traversal. To connect to the VPN Server directly by using TCP, a listener port of the VPN Server must be exposed to the Internet by a port-forward setting on the NAT-box. Ask the administrator of the NAT-box, or refer to the manual of the NAT-box to add a port-forwarding setting on the NAT-box.\r\n\r\nIf this message still remains despite the VPN Server is exposing a TCP port to the Internet, check the "Disable NAT-T" checkbox on the VPN Client connection setting screen after upgrading the VPN Client to Build 9428 or later.\r\n\r\n
# Virtual HUB Admin Options
HUB_AO_CLICK Select an item to view the description here.
HUB_AO_UNKNOWN The description of the item was not found. Refer to the documents, or speculate the meaning and purpose of the item from the name of the item.
HUB_AO_allow_hub_admin_change_option This is a special item. If you are enable (set to 1) this option, then not only the VPN Server's global administrator but also the Virtual Hub's administrator will be granted to modify the Virtual Hub Admin Options by himself.
HUB_AO_deny_hub_admin_change_ext_option If you are enable (set to 1) this option, the Virtual Hub's administrator will be forbidden to modify any values on the Virtual Hub Extended Options, then only the VPN Server's global administrator can modify them.
HUB_AO_no_delay_jitter_packet_loss If you set this option to non-zero value, then all parameters of delay, jitter and packet-loss on the access-list entry will be ignored even if these parameters are set when the administrator adds a new access list entry. Therefore, delay, jitter and packet-loss generating function will be virtually disabled. Because of the delay generating function sometimes make a high volume of load on the CPU and RAM, a Virtual Hub which is shared by several users should have this option enabled.
HUB_AO_max_users If you set this option to non-zero value, the maximum number of user objects registered on the Virtual Hub will be limited to this value, then greater number of user objects than this value cannot be added.
HUB_AO_max_multilogins_per_user If you set this option to non-zero value, the maximum number of VPN Sessions per an individual user object will be limited to this value, then greater number of VPN Sessions of individual user object than this value cannot be established.
HUB_AO_max_groups If you set this option to non-zero value, then the maximum number of group objects on the Virtual Hub will be limited to this value and any more groups will not be allowed to be registered.
HUB_AO_max_accesslists If you set this option to non-zero value, then the maximum number of access list entries on the Virtual Hub will be limited to this value and any more entries will not be allowed to be registered.
HUB_AO_max_sessions_client_bridge_apply Only when this value is set to non-zero value, the values max_sessions_client and max_sessions_bridge will be applied.
HUB_AO_max_sessions If you set this option to non-zero value, then the maximum number of VPN Sessions will be limited to this value.
HUB_AO_max_sessions_client If you set this option to non-zero value, then the maximum number of VPN Client sessions will be limited to this value. No more VPN Client sessions will be allowed to establish. This option is valid only when the max_sessions_client_bridge_apply option is set to non-zero value.
HUB_AO_max_sessions_bridge If you set this option to non-zero value, then the maximum number of VPN Bridge sessions will be limited to this value. No more VPN Bridge sessions will be allowed to establish. This option is valid only when the max_sessions_client_bridge_apply option is set to non-zero value.
HUB_AO_max_bitrates_download If you set this option to non-zero value, then all VPN Sessions on the Virtual Hub will be mandated to have a security policy setting which the "Download Bandwidth" value is set to this value. It will limit the downloading traffic speed of each VPN Session. For example, if this value is set to 1000000, then a downloading bandwidth of each VPN Session on the Virtual Hub will be limited to 1Mbps.
HUB_AO_max_bitrates_upload If you set this option to non-zero value, then all VPN Sessions on the Virtual Hub will be mandated to have a security policy setting which the "Download Bandwidth" value is set to this value. It will limit the uploading traffic speed of each VPN Session. For example, if this value is set to 1000000, then a uploading bandwidth of each VPN Session on the Virtual Hub will be limited to 1Mbps.
HUB_AO_deny_empty_password If you set this option to non-zero value, no user objects will be able to have an empty password. A user who has an empty password will be forbidden to connect a VPN Session. (Exception: a VPN connection from localhost will be permitted even if the password is empty.)
HUB_AO_deny_bridge If you set this option to non-zero value, then any VPN Sessions in Bridge Mode will not be granted to establish, regardless of the setting of existing security policy of the user. No one will be able to connect to the Virtual Hub for bridging purpose.
HUB_AO_deny_routing If you set this option to non-zero value, then any VPN Sessions in Routing Mode will not be granted to establish, regardless of the setting of existing security policy of the user. No one will be able to connect to the Virtual Hub for routing purpose.
HUB_AO_deny_qos If you set this option to non-zero value, then every VPN Sessions will be enforced to disable the QoS function regardless of the setting of existing security policy of the user.
HUB_AO_deny_change_user_password If you set this option to non-zero value, then any users on the Virtual Hub will be forbidden to change its password by VPN Client's password-changing function.
HUB_AO_no_change_users If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to add, edit or remove a user.
HUB_AO_no_change_groups If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to add, edit or remove a group.
HUB_AO_no_securenat If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to enable or disable the SecureNAT function.
HUB_AO_no_securenat_enablenat If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to enable or disable the Virtual NAT function in the SecureNAT function.
HUB_AO_no_securenat_enabledhcp If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to enable or disable the Virtual DHCP Server function in the SecureNAT function.
HUB_AO_no_cascade If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to add, edit, remove or change the online status of a cascade connection.
HUB_AO_no_online If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the offline Virtual Hub to the online state.
HUB_AO_no_offline If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the online Virtual Hub to the offline state.
HUB_AO_no_change_log_config If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the settings of logging function.
HUB_AO_no_disconnect_session If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to disconnect a specific VPN Session.
HUB_AO_no_delete_iptable If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to delete a specific IP address entry from the IP address table database.
HUB_AO_no_delete_mactable If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to delete a specific MAC address entry from the MAC address table database.
HUB_AO_no_enum_session If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to enumerate the sessions on the Virtual Hub.
HUB_AO_no_query_session If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to specify a session and get the information of the session.
HUB_AO_no_change_admin_password If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the administrator's password of the Virtual Hub.
HUB_AO_no_change_log_switch_type If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the Log Switching settings on the logging function settings of the Virtual Hub.
HUB_AO_no_change_access_list If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to modify the access list of the Virtual Hub.
HUB_AO_no_change_access_control_list If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to modify the source IP address limit list of the Virtual Hub.
HUB_AO_no_change_cert_list If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to modify the trusted certificate authority list of the Virtual Hub.
HUB_AO_no_change_crl_list If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to modify the certificate revoked list of the Virtual Hub.
HUB_AO_no_read_log_file If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to enumerate or download the log files of the Virtual Hub remotely.
HUB_AO_no_change_msg If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to change the message which should be displayed when a VPN Client connects to the Virtual Hub.
HUB_AO_no_access_list_include_file If you set this option to non-zero value, then the administrator of the Virtual HUB will be forbidden to specify "include:" or "exclude:" instruction as a source or a destination user field on a access list entry of the Virtual Hub.
# Virtual Hub Extended Options
HUB_AO_NoAddressPollingIPv4 If you set this option to non-zero value, then the Virtual Hub will not perform the maintenance of the IPv4 address table and the MAC address table on the hub with using sending ARP packets per 5 seconds in order to check keep-alive IPv4 devices. As a result, IPv4 devices might be deleted on the IPv4 address table and MAC address table after a particular period (from 1 to 10 minutes) will be elapsed in the case of no-communication activities via the Virtual Hub, even if it is still alive. This option can eliminate the amount of broadcast packets, however some IPv4-related security policies will not work effectively.
HUB_AO_NoAddressPollingIPv6 If you set this option to non-zero value, then the Virtual Hub will not perform the maintenance of the IPv6 address table and the MAC address table on the hub with using sending ICMPv6 packets per 5 seconds in order to check keep-alive IPv6 devices. As a result, IPv6 devices might be deleted on the IPv6 address table and MAC address table after a particular period (from 1 to 10 minutes) will be elapsed in the case of no-communication activities via the Virtual Hub, even if it is still alive. This option can eliminate the amount of broadcast packets, however some IPv6-related security policies will not work effectively.
HUB_AO_NoIpTable If you set this option to non-zero value, then the Virtual Hub will not construct and maintain the internal IP address table. This option can eliminate the amount of CPU and RAM usages, however some IP-related security policies will not work effectively.
HUB_AO_NoMacAddressLog If you set this option to non-zero value, then any logs which indicate the registration of a new MAC address to the MAC address table on the Virtual Hub will not be logged to the security log.
HUB_AO_ManageOnlyPrivateIP If you set this option to non-zero value, then the IPv4 address table of the Virtual Hub will contain only private IPv4 addresses. In this context, the private IPv4 addresses are: 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 and 169.254.0.0/16. Any other IPv4 addresses will not added on the table.
HUB_AO_ManageOnlyLocalUnicastIPv6 If you set this option to non-zero value, then the IPv6 address table of the Virtual Hub will contain only local unicast IPv6 addresses. In this context, the private IPv6 addresses are: fe80::/10. Any other IPv6 addresses will not added on the table.
HUB_AO_DisableIPParsing If you set this option to non-zero value, then the Virtual Hub will disable the internal parsing function of IP headers in all Ethernet packets. This option can eliminate the amount of CPU and RAM usages, however the Vitual Hub will not perform building and maintenance of the IP address table internally, and some IP-related security policies will not work effectively.
HUB_AO_YieldAfterStorePacket If you set this option to non-zero value, then the Virtual Hub sets the CPU to idle state after store-forward processing of a packet. This might results good effects to make the delay of packets shorter, however the counts of thread context switch will be increased and the performance might decline.
HUB_AO_FilterPPPoE If you set this option to non-zero value, then the Virtual Hub discards all PPPoE (PPP over Ethernet) packets. It is convenient to split each site's PPPoE segment when making a bridge between two or more local area networks.
HUB_AO_FilterOSPF If you set this option to non-zero value, then the Virtual Hub discards all OSPF (Open Shortest Path First) packets.
HUB_AO_FilterIPv4 If you set this option to non-zero value, then the Virtual Hub discards all IPv4 and ARP packets.
HUB_AO_FilterIPv6 If you set this option to non-zero value, then the Virtual Hub discards all IPv6 packets.
HUB_AO_FilterNonIP If you set this option to non-zero value, then the Virtual Hub discards all non-IP packets (non-IPv4, ARP or IPv6 packets). Incidentally, any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets.
HUB_AO_FilterBPDU If you set this option to non-zero value, then the Virtual Hub discards all BPDU (Bridge Protocol Data Unit) packets.
HUB_AO_NoIPv6DefaultRouterInRAWhenIPv6 If you set this option to non-zero value, then all VPN Sessions on the Virtual Hub will have the enabled "No Default-Router on IPv6 RA (physical IPv6)" security policy. When the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router.
HUB_AO_NoLookBPDUBridgeId If you set this option to non-zero value, then the Virtual Hub will ignore the source MAC field in a BPDU (Bridge Protocol Data Unit) packet. This value will be much more advanced. Do not modify it unless you are very ultra special expert of computer networking.
HUB_AO_NoManageVlanId If you set this option to non-zero value, then the Virtual Hub will not use VLAN ID on the MAC address table. Any VLAN ID in tagged-VLAN packets will be ignored.
HUB_AO_VlanTypeId Specify the Ethernet Type ID (TPID) of VLAN tags in decimal. The default value is 33024 (0x8100 in hex). This value will be much more advanced. Do not modify it unless you are very ultra special expert of computer networking.
HUB_AO_FixForDLinkBPDU If you set this option to non-zero value, then the FixForDLinkBPDU option will be enabled. This value will be much more advanced. Do not modify it unless you are very ultra special expert of computer networking.
HUB_AO_NoIPv4PacketLog If you set this option to non-zero value, then IPv4 packets via the Virtual Hub will not be logged.
HUB_AO_NoIPv6PacketLog If you set this option to non-zero value, then IPv6 packets via the Virtual Hub will not be logged.
HUB_AO_NoSpinLockForPacketDelay If you set this option to non-zero value, then the VPN Server will not use spin-lock mechanisms to simulate the delay of packets when the packet-delay generating function is applied to the packet. Instead, the timer interrupt by the operating system will be adopted. It will reduce the CPU time, however the resolution of generating delays will deteriorate.
HUB_AO_BroadcastStormDetectionThreshold Specify the threshold to detect the broadcast storm per a second. When the number of broadcast packets from a particular VPN Session exceeded this threshold, packets will be regarded as broadcast storm and become subjects to be filtered. The default value (zero-value) is 32.
HUB_AO_ClientMinimumRequiredBuild If you set this option to non-zero value, then the Virtual Hub will deny any access from VPN Client which has less build number than this value.
HUB_AO_RequiredClientId If you set this option to non-zero value, then the Virtual Hub will deny any access from VPN Client which doesn't have the embedded "Client ID" value in the software.
HUB_AO_AdjustTcpMssValue If you set this option to non-zero value, then the Virtual Hub will adjust MSS (Max Segment Size) values of headers of all TCP/IP packets not to exceed this value.
HUB_AO_DisableAdjustTcpMss If you set this option to non-zero value, then any MSS (Max Segment Size) options on the Virtual Hub will be disabled. Even if the AdjustTcpMssValue option is specified, or a VPN Session is made by IPsec / L2TP / EtherIP / L2TPv3 Server Function, the adjustment of MSS will be disabled.
HUB_AO_NoDhcpPacketLogOutsideHub If you set this option to non-zero value, then the Virtual Hub will not record non-related DHCP packets to the packet log. "Non-related DHCP packets" are DHCP packets which are not bound to any VPN Session on the Virtual Hub.
HUB_AO_DisableHttpParsing If you set this option to non-zero value, then the Virtual Hub will not perform parsing HTTP headers in all HTTP packets. It will reduce the usage of CPU and RAM, however the HTTP access logs will not be recorded.
HUB_AO_DisableUdpAcceleration If you set this option to non-zero value, then all UDP Acceleration Function will be disabled on the all VPN Sessions of the Virtual Hub.
HUB_AO_DisableUdpFilterForLocalBridgeNic If you set this option to non-zero value, then the Virtual Hub disables the trouble-preventing filtering function to filter DHCP packets which might causes of network unstable. By default, a local bridge interface sometimes try to acquire an IP address from remote-side DHCP server, however such a behavior should infinite loop in the routing table. The filtering function can avoid such problems. This option can disable the filtering function.
HUB_AO_ApplyIPv4AccessListOnArpPacket If you set this option to non-zero value, then the IPv4 access list entries will be applied on not only IPv4 packets but also ARP packets. It is convenient to filter unnecessary ARP packets which might cause troubles.
HUB_AO_RemoveDefGwOnDhcpForLocalhost If you set this option to non-zero value, when a VPN Client on the localhost connects to the Virtual Hub and try to acquire an IP address from the DHCP Server in the segment of the Virtual Hub, corresponding DHCP reply packets will be discarded. It can prevent unexpected infinite loop of packets routing.
HUB_AO_SecureNAT_MaxTcpSessionsPerIp If you set this option to non-zero value, then the number of TCP connections (which is not SYN_SENT) per IP state will be limited to this value.
HUB_AO_SecureNAT_MaxTcpSynSentPerIp If you set this option to non-zero value, then the number of TCP connections (which is SYN_SENT) per IP state will be limited to this value.
HUB_AO_SecureNAT_MaxUdpSessionsPerIp If you set this option to non-zero value, then the number of UDP sessions per IP state will be limited to this value.
HUB_AO_SecureNAT_MaxDnsSessionsPerIp If you set this option to non-zero value, then the number of DNS sessions per IP which is not SYN_SENT state will be limited to this value.
HUB_AO_SecureNAT_MaxIcmpSessionsPerIp If you set this option to non-zero value, then the number of ICMP sessions per IP which is not SYN_SENT state will be limited to this value.
HUB_AO_AccessListIncludeFileCacheLifetime Specify a period in seconds to hold the cache of external user-list files which is for an access list entry which has "include:" or "exclude:" formats as its username.
HUB_AO_DisableKernelModeSecureNAT If you set this option to non-zero value, then the Kernel-mode NAT function on the SecureNAT function will be disabled. Kernel-mode NAT is a function to accelerate the performance of the Virtual NAT function on SecureNAT. Kernel-mode NAT can work only when the VPN Server process is running with system privileges (i.e. root, SYSTEM or Administrators contexts.). If the Kernel-mode NAT causes something wrong operations, use this option to disable it.
HUB_AO_DisableUserModeSecureNAT If you set this option to non-zero value, then the User-mode NAT function on the SecureNAT function will be disabled. User-mode NAT is a function to make the NAT possible to run as normal-user privileges.
HUB_AO_DisableCheckMacOnLocalBridge If you set this option to non-zero value, the MAC address duplication check will be disabled on the Local Bridge function. There might be a case when some network adapters has a problem that reflects outgoing packets towards the Virtual Hub. A Virtual HUB detects such duplications automatically, and discards them. Enable this flag to disable the detection and discarding.
HUB_AO_DisableCorrectIpOffloadChecksum If you set this option to non-zero value, then the checking and correction of IP check-sum value on the Local Bridge function. Some network adapters, which have IP, TCP or UDP header check-sum offloading engines, transmit packets with incomplete check-sum values. Such packets cannot be treated correctly by receiver-side. So the Local Bridge detects such packets and corrects its check-sum fields. Enable this flag to disable such correction.
HUB_AO_BroadcastLimiterStrictMode If you set this option to non-zero value, then the broadcast-storm detection algorithm will compare either source or destination IP address of each packet. If any of the two fields matches, the packet will be recorded on the short-term history of broadcast-storm detection state machine.
HUB_AO_MaxLoggedPacketsPerMinute Maximum number of logging target packets per minute.
HUB_AO_DoNotSaveHeavySecurityLogs Do not take heavy security log.
HUB_AO_DropBroadcastsInPrivacyFilterMode Drop broadcasting packets if the both source and destination session is PrivacyFilter mode.
HUB_AO_DropArpInPrivacyFilterMode Drop ARP packets if the both source and destination session is PrivacyFilter mode.
HUB_AO_SuppressClientUpdateNotification Suppress the update notification screen on the VPN Client.
HUB_AO_FloodingSendQueueBufferQuota Specify the quota limitation value (in bytes) of the sending queue buffer size which the flooding operation on the Virtual Hub can consume. The quota value is applied on the total length of sending queues of all active VPN sessions. Specify '0' to disable the quota. This option is effective to solve the out-of-memory problem on the network where there are many flooding packets.
HUB_AO_AssignVLanIdByRadiusAttribute Enable the VLAN ID dynamic assignment function. Each VPN session will be assigned its own VLAN ID by the RADIUS attribute value when the user is authenticated by the external RADIUS server unless the user object has a VLAN ID security policy. The RADIUS attribute with the name "Tunnel-Pvt-Group-ID" (ID = 81) will be used as the VLAN ID. The data type must be STRING.
HUB_AO_DenyAllRadiusLoginWithNoVlanAssign If you set this option to non-zero value, then all users, which RADIUS server returns no "Tunnel-Pvt-Group-ID" (ID = 81) value, will be denied to connect to the Virtual Hub. (Only if the values of AssignVLanIdByRadiusAttribute is non-zero value.)
HUB_AO_SecureNAT_RandomizeAssignIp If you set this option to non-zero value, then the Virtual DHCP Server of the SecureNAT function will choose an unused IP address randomly from the DHCP pool while the default behavior is to choose the first unused IP address.
HUB_AO_DetectDormantSessionInterval If you set this option to non-zero value, then the Virtual Hub will treat the VPN sessions, which have transmitted no packets for the last specified intervals (in seconds), as Dormant Sessions. The Virtual Hub will not flood packets, which should be flood, to any Dormant Sessions.
HUB_AO_NoPhysicalIPOnPacketLog If you set this option to non-zero value, then the physical IP addresses of VPN clients of either the source VPN session or the destination VPN session will not be recorded on the packet log file.
HUB_AO_UseHubNameAsDhcpUserClassOption If you set this option to non-zero value, then the Virtual Hub Name will be added to a DHCP request to an external DHCP server as the "User-Class" option. This allows to use separate pools of IP addresses for each Virtual Hub. (For only L2TP/IPsec and OpenVPN sessions.)
HUB_AO_UseHubNameAsRadiusNasId If you set this option to non-zero value, then the NAS-Identidier RADIUS attribute will be set to a name of the Virtual Hub. This allows to determine on RADIUS server whether access to the Virtual Hub should be granted or denied.
# Concerning failed connection dialogs
ERRDLG_ERRMSG Error (Error Code %u):\r\n%s\r\n
ERRDLG_RETRYCOUNT An automatic reconnection will be made after %u seconds...
ERRDLG_INFORMATION Click Retry to start connecting again.
ERRDLG_RETRY_INFO_1 Do you wish to retry? (%u retries / %u total retries)
ERRDLG_RETRY_INFO_2 Do you wish to retry? (%u retries / total infinite retries)
ERRDLG_DISCONNECTED_MSG Connection to VPN Server "%S" has been disconnected.
ERRDLG_DEVICE_ERROR The connection with the VPN Server has been disconnected because the Virtual Network Adapter (device name: %S) has been stopped. \r\n\r\nError code %u: %s
# Concerning protocols
PROTO_DIRECT_TCP Direct TCP/IP Connection
PROTO_HTTP_PROXY Connection via HTTP Proxy
PROTO_SOCKS_PROXY Connection via SOCKS Proxy
PROTO_SSH Connection via SSH Server
PROTO_UNKNOWN Unknown Protocol
# Concerning caps
# (Control characters)
CAPS_YES Yes
CAPS_NO No
# (Title)
CT_i_max_packet_size Maximum Ethernet Packet Size
CT_i_max_hubs Maximum Virtual Hubs
CT_i_max_user_creation Maximum Users on Entire VPN Server
CT_i_max_sessions Maximum Total Sessions
CT_i_max_clients Maximum Client Sessions
CT_i_max_bridges Maximum Bridge Sessions
CT_i_max_users_per_hub Maximum Users per Virtual Hub
CT_i_max_groups_per_hub Maximum Groups per Virtual Hub
CT_i_max_access_lists Maximum Access Lists per Virtual Hub
CT_i_max_mac_tables Maximum MAC Address Entries per Virtual Hub
CT_i_max_ip_tables Maximum IP Address Entries per Virtual Hub
CT_i_max_secnat_tables Maximum SecureNAT Entries per Virtual Hub
CT_i_max_l3_sw Maximum Virtual Layer 3 Switches
CT_i_max_l3_if Maximum Virtual Interfaces per Layer 3 Switch
CT_i_max_l3_table Maximum Routing Tables per Layer 3 Switch
CT_b_bridge Works as VPN Bridge Software
CT_b_standalone Standalone Mode
CT_b_cluster_controller Cluster Controller Mode
CT_b_cluster_member Cluster Member Mode
CT_b_vpn_client_connect Accepting Connection from VPN Client / Bridge
CT_b_local_bridge Local Bridge is Supported
CT_b_must_install_pcap Packet Capture Driver is Not Installed
CT_b_tap_supported Tun/Tap Device is Supported (only in Linux)
CT_b_support_config_hub Changing Virtual Hub Settings is Supported
CT_b_support_securenat SecureNAT is Supported
CT_b_virtual_nat_disabled Virtual NAT is Disabled (only DHCP Enabled)
CT_b_support_cascade Cascade Connection is Supported
CT_b_support_cascade_cert Server Authentication for Cascade Connection is Supported
CT_b_support_config_log Changing Settings for Saving Log is Supported
CT_b_support_autodelete Automatic Deletion of Log Files is Supported
CT_b_support_radius External Authentication Server is Supported
CT_b_support_config_rw Remote Reading and Writing of Config File is Supported
CT_b_support_hub_admin_option Virtual Hub Administration Options is Supported
CT_b_support_cascade_client_cert Client Certificates for Cascade Connection is Supported
CT_b_support_hide_hub Virtual Hub Enumeration Setting is Supported
CT_b_support_cluster_admin Integrated Administration for All Cluster Nodes is Supported
CT_b_support_cluster Operation as Part of a Cluster is Supported
CT_b_support_cluster_controller Operating as a Cluster Controller
CT_b_support_layer3 The Virtual Layer 3 Switch is Supported
CT_b_support_crl Virtual Hub-Specific Certificate Revocation Lists is Supported
CT_b_support_ac Virtual Hub-Specific Source IP Address Limit Lists is Supported
CT_b_support_read_log Downloading of Log Files is Supported
CT_b_support_rename_cascade Renaming of Cascade Connection is Supported
CT_b_support_license Management of Licenses is Supported
CT_b_support_limit_multilogin Limits for Multiple Login by Same User is Supported
CT_b_support_qos VoIP / QoS Functions is Supported
CT_b_support_syslog Syslog Sending Functions is Supported
CT_b_cluster_hub_type_fixed The Virtual Hub Types in a Cluster are Fixed
CT_b_beta_version Beta Version (Pre-release build)
CT_b_support_check_mac Specifing MAC Address in Access Lists is Supported
CT_b_support_check_tcp_state Checking TCP Connection State Filtering is Supported
CT_b_support_network_connection_name Getting Network Friendly Name is Supported
CT_b_support_radius_retry_interval_and_several_servers Retry Interval and Multi server is Supported in RADIUS Auth
CT_b_support_vlan Tagged VLAN ID is Supported in MAC Address Table
CT_b_support_hub_ext_options Virtual Hub Extended Option is Supported
CT_b_support_policy_ver_3 Security Policy version 3 is Supported
CT_b_support_ipv6_acl IPv6 Access List is Supported
CT_b_support_ex_acl Delay, Jitter and Packet Loss is Supported in Access List
CT_b_support_acl_group Conditioning by Group name is Supported in Access List
CT_b_support_ipv6_ac IPv6 IP Access Control Lists is Supported
CT_b_support_eth_vlan Tagged VLAN Packet Transparency Support tool is Supported
CT_b_support_msg Message of Today function is Supported
CT_b_vpn3 Internal Version 3.0 functions are Supported
CT_b_vpn4 Internal Version 4.0 functions are Supported
CT_b_support_ipsec IPsec / L2TP / EtherIP / L2TPv3 Server Functions are Supported
CT_b_support_sstp MS-SSTP VPN Server Function is Supported
CT_b_support_udp_acceleration UDP Acceleration Function is Supported
CT_b_support_openvpn OpenVPN Server Function is Supported
CT_b_support_ddns Dynamic DNS Client Function is Supported
CT_b_support_ddns_proxy DDNS via Proxy Server is Supported
CT_b_support_special_listener VPN over ICMP and VPN over DNS is Supported
CT_b_support_redirect_url_acl HTTP URL Redirection in Access List is Supported
CT_b_is_in_vm Running on VM (Virtual Machine)
CT_b_support_azure VPN Azure is Supported
CT_b_support_intel_aes Intel CPU AES Acceleration (AES-NI) is Active
CT_b_using_selow_driver SoftEther Lightweight Kernel-mode Ethernet Driver is Active
CT_b_support_vgs VPN Gate Service Server Functions are Supported
CT_b_support_vgs_in_client VPN Gate Service Server Functions (VPN Client integrated)
CT_b_is_softether Either Free or Open-Source Version of SoftEther VPN
CT_b_suppport_push_route Static Routing Table Pushing Function
CT_b_suppport_push_route_config Static Routing Table Pushing Function (Configurable)
# Concerning policies
POL_TITLE_STR Policy Name
POL_VALUE_STR Current Value
POL_TYPE_BOOL ON / OFF
POL_TYPE_INT Integer
POL_BOOL_ENABLE Enabled
POL_BOOL_DISABLE -
POL_BOOL_DISABLE_EX -
POL_INT_ZERO -
POL_INT_COUNT %u
POL_INT_SEC %u seconds
POL_INT_BPS %u bps
POL_INT_VLAN %u
# Ver 2.0
POL_0 Allow Access
POL_EX_0 The users defined this policy have permission to make VPN connection to VPN Server.
POL_1 Filter DHCP Packets (IPv4)
POL_EX_1 All IPv4 DHCP packets in sessions defined this policy will be filtered.
POL_2 Disallow DHCP Server Operation (IPv4)
POL_EX_2 Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv4 addresses to DHCP clients.
POL_3 Enforce DHCP Allocated IP Addresses (IPv4)
POL_EX_3 Computers in sessions that have this policy setting will only be able to use IPv4 addresses allocated by a DHCP server on the virtual network side.
POL_4 Deny Bridge Operation
POL_EX_4 Bridge-mode connections are denied for user sessions that have this policy setting. Even in cases when the Ethernet Bridge is configured in the client side, communication will not be possible.
POL_5 Deny Routing Operation (IPv4)
POL_EX_5 IPv4 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible.
POL_6 Deny MAC Addresses Duplication
POL_EX_6 The use of duplicating MAC addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting.
POL_7 Deny IP Address Duplication (IPv4)
POL_EX_7 The use of duplicating IPv4 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting.
POL_8 Deny Non-ARP / Non-DHCP / Non-ICMPv6 broadcasts
POL_EX_8 The sending or receiving of broadcast packets that are not ARP protocol, DHCP protocol, nor ICMPv6 on the virtual network will not be allowed for sessions with this policy setting.
POL_9 Privacy Filter Mode
POL_EX_9 All direct communication between sessions with the privacy filter mode policy setting will be filtered.
POL_10 Deny Operation as TCP/IP Server (IPv4)
POL_EX_10 Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv4.
POL_11 Unlimited Number of Broadcasts
POL_EX_11 If a computer of a session with this policy setting sends broadcast packets of a number unusually larger than what would be considered normal on the virtual network, there will be no automatic limiting.
POL_12 Allow Monitoring Mode
POL_EX_12 Users with this policy setting will be granted to connect to the Virtual Hub in Monitoring Mode. Sessions in Monitoring Mode are able to monitor (tap) all packets flowing through the Virtual Hub.
POL_13 Maximum Number of TCP Connections
POL_EX_13 For sessions with this policy setting, this sets the maximum number of physical TCP connections consists in a physical VPN session.
POL_14 Time-out Period
POL_EX_14 For sessions with this policy setting, this sets, in seconds, the time-out period to wait before disconnecting a session when communication trouble occurs between the VPN Client / VPN Server.
POL_15 Maximum Number of MAC Addresses
POL_EX_15 For sessions with this policy setting, this limits the number of MAC addresses per session.
POL_16 Maximum Number of IP Addresses (IPv4)
POL_EX_16 For sessions with this policy setting, this specifies the number of IPv4 addresses that can be registered for a single session.
POL_17 Upload Bandwidth
POL_EX_17 For sessions with this policy setting, this limits the traffic bandwidth that is in the inwards direction from outside to inside the Virtual Hub.
POL_18 Download Bandwidth
POL_EX_18 For sessions with this policy setting, this limits the traffic bandwidth that is in the outwards direction from inside the Virtual Hub to outside the Virtual Hub.
POL_19 Deny Changing Password
POL_EX_19 The users which use password authentication with this policy setting are not allowed to change their own password from the VPN Client Manager or similar.
POL_20 Maximum Number of Multiple Logins
POL_EX_20 Users with this policy setting are unable to have more than this number of concurrent logins. Bridge Mode sessions are not subjects to this policy. This security policy is only available on VPN Server 3.0 or greater, or VPN Server 2.0 with the multi-login restriction function.
POL_21 Deny VoIP / QoS Function
POL_EX_21 Users with this security policy are unable to use VoIP / QoS functions in VPN connection sessions. This security policy is only available on VPN Server 3.0 or greater, or VPN Server 2.0 with the VoIP / QoS functions.
# Ver 3.0
POL_22 Filter RS / RA Packets (IPv6)
POL_EX_22 All ICMPv6 packets which the message-type is 133 (Router Solicitation) or 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, an IPv6 client will be unable to use IPv6 address prefix auto detection and IPv6 default gateway auto detection.
POL_23 Filter RA Packets (IPv6)
POL_EX_23 All ICMPv6 packets which the message-type is 134 (Router Advertisement) in sessions defined this policy will be filtered. As a result, a malicious users will be unable to spread illegal IPv6 prefix or default gateway advertisements on the network.
POL_24 Filter DHCP Packets (IPv6)
POL_EX_24 All IPv6 DHCP packets in sessions defined this policy will be filtered.
POL_25 Disallow DHCP Server Operation (IPv6)
POL_EX_25 Computers connected to sessions that have this policy setting will not be allowed to become a DHCP server and distribute IPv6 addresses to DHCP clients.
POL_26 Deny Routing Operation (IPv6)
POL_EX_26 IPv6 routing will be denied for sessions that have this policy setting. Even in the case where the IP router is operating on the user client side, communication will not be possible.
POL_27 Deny IP Address Duplication (IPv6)
POL_EX_27 The use of duplicating IPv6 addresses that are in use by computers of different sessions cannot be used by sessions with this policy setting.
POL_28 Deny Operation as TCP/IP Server (IPv6)
POL_EX_28 Computers of sessions with this policy setting can't listen and accept TCP/IP connections in IPv6.
POL_29 Maximum Number of IP Addresses (IPv6)
POL_EX_29 For sessions with this policy setting, this specifies the number of IPv6 addresses that can be registered for a single session.
POL_30 Disallow Password Save in VPN Client
POL_EX_30 For users with this policy setting, when the user is using *standard* password authentication, the user will be unable to save the password in VPN Client. The user will be required to input passwords for every time to connect a VPN. This will improve the security. If this policy is enabled, VPN Client Version 2.0 will be denied to access.
POL_31 VPN Client Automatic Disconnect
POL_EX_31 For users with this policy setting, a user's VPN session will be disconnected automatically after the specific period will elapse. In this case no automatic re-connection will be performed. This can prevent a lot of inactive VPN Sessions. If this policy is enabled, VPN Client Version 2.0 will be denied to access.
POL_32 Filter All IPv4 Packets
POL_EX_32 All IPv4 and ARP packets in sessions defined this policy will be filtered.
POL_33 Filter All IPv6 Packets
POL_EX_33 All IPv6 packets in sessions defined this policy will be filtered.
POL_34 Filter All Non-IP Packets
POL_EX_34 All non-IP packets in sessions defined this policy will be filtered. "Non-IP packet" mean a packet which is not IPv4, ARP nor IPv6. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets.
POL_35 No Default-Router on IPv6 RA
POL_EX_35 In all VPN Sessions defines this policy, any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router.
POL_36 No Default-Router on IPv6 RA (physical IPv6)
POL_EX_36 In all VPN Sessions defines this policy (only when the physical communication protocol between VPN Client / VPN Bridge and VPN Server is IPv6), any IPv6 RA (Router Advertisement) packet with non-zero value in the router-lifetime will set to zero-value. This is effective to avoid the horrible behavior from the IPv6 routing confusion which is caused by the VPN client's attempts to use the remote-side IPv6 router as its local IPv6 router.
POL_37 VLAN ID (IEEE802.1Q)
POL_EX_37 You can specify the VLAN ID on the security policy. All VPN Sessions defines this policy, all Ethernet packets toward the Virtual Hub from the user will be inserted a VLAN tag (IEEE 802.1Q) with the VLAN ID. The user can also receive only packets with a VLAN tag which has the same VLAN ID. (Receiving process removes the VLAN tag automatically.) Any Ethernet packets with any other VLAN IDs or non-VLAN packets will not be received. All VPN Sessions without this policy definition can send / receive any kinds of Ethernet packets regardless of VLAN tags, and VLAN tags are not inserted or removed automatically. Any tagged-VLAN packets via the Virtual Hub will be regarded as non-IP packets. Therefore, tagged-VLAN packets are not subjects for IPv4 / IPv6 security policies, access lists nor other IPv4 / IPv6 specific deep processing.
# Concerning remote connection dialog
REMOTE_DEF_CAPTION Remote Connection
REMOTE_DEF_TITLE Specify the computer you want to remotely connect to.
# Concerning client notification service
CN_TITLE SoftEther VPN Client
# Concerning Connection Manager
CM_TITLE SoftEther VPN Client Manager
CM_PW_LOCALMACHINE Local Computer
CM_NO_REMOTE The VPN Client service running on %s disallows remote connections.
CM_CONNECT_FAILED Unable to connect to the VPN Client service operating on %s. \r\nMake sure the VPN Client service has started and is running normally.
CM_BAD_PASSWORD The password is incorrect. Re-enter password. The password is case-sensitive so be sure to discern between upper and lower case letters.
CM_NUM_CONN_COUNT %u VPN Sessions
CM_CONN_NO Not Connected
CM_PRODUCT_NAME SoftEther VPN Client Build %u
CM_ACCOUNT_COLUMN_1 VPN Connection Setting Name
CM_ACCOUNT_COLUMN_2 Status
CM_ACCOUNT_COLUMN_3 VPN Server Hostname
CM_ACCOUNT_COLUMN_3_2 Virtual Hub
CM_ACCOUNT_COLUMN_4 Virtual Network Adapter Name
CM_VLAN_COLUMN_1 Virtual Network Adapter Name
CM_VLAN_COLUMN_2 Status
CM_VLAN_COLUMN_3 MAC Address
CM_VLAN_COLUMN_4 Version
CM_ACCOUNT_OFFLINE Offline
CM_ACCOUNT_ONLINE Connected
CM_ACCOUNT_CONNECTING Connecting
CM_VLAN_ENABLED Enabled
CM_VLAN_DISABLED Disabled
CM_DELETE_ACCOUNT_MSG This will delete the VPN Connection Setting "%s". Do you really want to do this?
CM_ST_ACCOUNT_NAME VPN Connection Setting Name
CM_ST_CONNECTED Session Status
CM_ST_CONNECTED_TRUE Connection Completed (Session Established)
CM_ST_CONNECTED_FALSE Trying to Connect
CM_ST_CONNECTING Connection to VPN Server Started
CM_ST_NEGOTIATION Negotiating
CM_ST_AUTH Authenticating User
CM_ST_ESTABLISHED Connection is Established
CM_ST_RETRY Retrying
CM_ST_IDLE Idle
CM_ST_SERVER_NAME Server Name
CM_ST_SERVER_PORT Port Number
CM_ST_PORT_TCP TCP Port %u
CM_ST_SERVER_P_NAME Server Product Name
CM_ST_SERVER_P_VER Server Version
CM_ST_SERVER_P_BUILD Server Build
CM_ST_START_TIME Connection Started at
CM_ST_FIRST_ESTAB_TIME First Session has been Established since
CM_ST_NONE -
CM_ST_CURR_ESTAB_TIME Current Session has been Established since
CM_ST_NUM_ESTABLISHED Number of Established Sessions
CM_ST_NUM_STR %u Times
CM_ST_HALF_CONNECTION Half Duplex TCP Connection Mode
CM_ST_HALF_TRUE Yes (Half Duplex Mode)
CM_ST_HALF_FALSE No (Full Duplex Mode)
CM_ST_QOS VoIP / QoS Function
CM_ST_QOS_TRUE Enabled
CM_ST_QOS_FALSE Disabled
CM_ST_NUM_TCP Number of TCP Connections
CM_ST_NUM_TCP_UPLOAD Number of Uplink TCP Connections
CM_ST_NUM_TCP_DOWNLOAD Number of Downlink TCP Connections
CM_ST_MAX_TCP Maximum Number of TCP Connections
CM_ST_VLAN_ID VLAN ID
CM_ST_NO_VLAN -
CM_ST_USE_ENCRYPT Encryption
CM_ST_USE_ENCRYPT_TRUE Enabled (Algorithm: %S)
CM_ST_USE_ENCRYPT_TRUE2 Enabled
CM_ST_USE_ENCRYPT_FALSE Disabled (No Encryption)
CM_ST_USE_COMPRESS Use of Compression
CM_ST_UDP_ACCEL_ENABLED UDP Acceleration is Supported
CM_ST_UDP_ACCEL_USING UDP Acceleration is Active
CM_ST_RUDP TCP over UDP (NAT Traversal)
CM_ST_UNDERLAY_PROTOCOL Physical Underlay Protocol
CM_ST_COMPRESS_TRUE Yes (%u %%)
CM_ST_COMPRESS_FALSE No (No Compression)
CM_ST_SESSION_NAME Session Name
CM_ST_CONNECTION_NAME Connection Name
CM_ST_SESSION_KEY Session Key (160 bit)
CM_ST_BRIDGE_MODE Bridge / Router Mode
CM_ST_MONITOR_MODE Monitoring Mode
CM_ST_YES Yes
CM_ST_NO No
CM_ST_SEND_SIZE Outgoing Data Size
CM_ST_RECV_SIZE Incoming Data Size
CM_ST_SEND_UCAST_NUM Outgoing Unicast Packets
CM_ST_SEND_UCAST_SIZE Outgoing Unicast Total Size
CM_ST_SEND_BCAST_NUM Outgoing Broadcast Packets
CM_ST_SEND_BCAST_SIZE Outgoing Broadcast Total Size
CM_ST_RECV_UCAST_NUM Incoming Unicast Packets
CM_ST_RECV_UCAST_SIZE Incoming Unicast Total Size
CM_ST_RECV_BCAST_NUM Incoming Broadcast Packets
CM_ST_RECV_BCAST_SIZE Incoming Broadcast Total Size
CM_ST_NUM_PACKET_STR %S packets
CM_ST_SIZE_BYTE_STR %S bytes
CM_NEW_ICON Add VPN Connection
CM_VGC_ICON VPN Gate Public VPN Relay Servers
CM_VGC_LINK VPN Gate Academic Web Site
CM_ST_TITLE Connection Status of %s
CM_ST_COLUMN_1 Item
CM_ST_COLUMN_2 Status
CM_NEW_ACCOUNT_NAME_1 New VPN Connection
CM_NEW_ACCOUNT_NAME_2 New VPN Connection (%u)
CM_ACCOUNT_TITLE_1 New VPN Connection Setting Properties
CM_ACCOUNT_TITLE_2 Properties of %s
CM_SERVER_CERT_1 &Specify Individual Cert
CM_SERVER_CERT_2 &Delete Certificate
CM_CLIENT_CERT_1 Specify Client &Certificate
CM_CLIENT_CERT_2 Delete &Client Certificate
CM_CERT_INFO Issued to: %s\r\nIssuer: %s\r\nExpiration: %s
CM_NO_CERT You must specify a client certificate to be used for user authentication.
CM_NO_SECURE Specify the client certificate and private key inside the smart card to be used for user authentication.
CM_CERT_SECURE_INFO Certificate: "%S"\r\nPrivate Key: "%S"
CM_SELECT_SECURE_DEVICE Select Smart Card
CM_SELECT_CERT_INCARD Specify Cert and Pri&vate Key
CM_VIEW_CLIENT_CERT &View Client Certificate
CM_NO_VLAN Before you can create a new VPN Connection Setting you need to create a Virtual Network Adapter. \r\n\r\nDo you want to create a Virtual Network Adapter?
CM_NO_VLAN_2 Before connecting to VPN Server you need to create a Virtual Network Adapter. \r\n\r\nDo you want to create a Virtual Network Adapter?
CM_VLAN_REMOTE_ERROR Unable to create a Virtual Network Adapter from a remote location. \r\n\rStart the VPN Client Manager on the local computer on which the VPN Client service is running and install a Virtual Network Adapter.
CM_9X_VLAN_INSTALL A new Virtual Network Adapter will now be created. \r\n\r\nAfter a Virtual Network Adapter is created, it is necessary to restart Windows directly afterwards. \r\nWhile the Virtual Network Adapter is being installed, you may be asked to insert the Windows installation CD-ROM. \r\n\r\nClose all currently running applications except the VPN Client Manager, have your Windows installation CD-ROM ready at hand, and click OK. \r\nClicking OK will start the installation of the Virtual Network Adapter. When this is finished, Windows will automatically restart.
CM_9X_VLAN_ME_MESSAGE A Virtual Network Adapter has been created. After you click OK, the computer will automatically restart. \r\n\r\nAfter the computer restarts, the Install New Device wizard might appear. \r\nIf the wizard does appear, click Next for each screen until the installation is completed.
CM_9X_VLAN_UNINSTALL To delete a Virtual Network Adapter, delete it from Network Properties. \r\n\r\nDo you want to display the Network Properties window?
CM_PORT_1 8888 (PX-VPN Port)
CM_PORT_2 443 (HTTPS Port)
CM_PORT_3 992 (TELNETS Port)
CM_PORT_4 5555 (SE-VPN Port)
CM_RETRY_INTERVAL_ERROR Set a re-connection interval (at least 5 seconds) when VPN connection has been disconnected.
CM_DELETE_CLIENT_CERT This will delete the client certificate that has been set. Do you really want to do this?
CM_DELETE_SERVER_CERT This will delete the server individual certificate that has been set. Do you really want to do this?
CM_SET_STARTUP The VPN Connection Setting "%s" is now set as a startup connection.\r\n\r\nThis account will be connected automatically next time the computer restarts.\r\n(If you are using Windows, the automatic connection will be started in the background mode before a user logs on to Windows.)
CM_REMOVE_STARTUP Do you wish to delete the startup connection property of VPN Connection Setting "%s"?
CM_NO_DISCONNECT_SPAN Please set the life of the TCP connection.
CM_HALF_MSG When using half-duplex mode, set at least 2 for the number of TCP connections.
CM_TOO_SMALL_INTERVAL Set at least 1 second for the interval to establish a TCP connection.
CM_DELETE_VLAN This will delete the Virtual Network Adapter "%s". Do you really want to do this?
CM_COPY_NAME_1 Copy of %s
CM_COPY_NAME_2 Copy (%u) of %s
CM_IMPORT_NAME_1 %s
CM_IMPORT_NAME_2 %s (%u)
CM_CERT_COLUMN_1 Issued to
CM_CERT_COLUMN_2 Issuer
CM_CERT_COLUMN_3 Expiration
CM_CERT_DELETE_MSG Delete this certificate from the list?
CM_PASSWORD_SET The password has been set.
CM_PASSWORD_REMOVE The password setting has been deleted.
CM_UNDER_CONSTRUCTION Incomplete.
CM_CURRENT_ACTIVE The settings of VPN Connection Setting "%s" were saved. But this VPN Connection Setting is currently online and the new settings will apply in the next connection.
CM_DISCONNECT_ALL This will disconnect all %u VPN Connection Settings that are currently connected. \r\nDo you really want to do this?
CM_HTTPS_MSG You have chosen to connect via an HTTP proxy server. \r\n\r\nUsual HTTP proxy servers do not allow access to a TCP port of your choice. \r\nWhen a VPN Client connects to a VPN Server via a HTTP proxy server, it is possible to connect by using HTTPS (HTTP over SSL) communication. \r\nIn this case it is recommended that you specify 443 (HTTPS Port) as the destination VPN Server port number. \r\n(If you specify a different port number, there are cases where it will not be possible to connect via an HTTP proxy server. \r\n Make sure that port 443 is enabled on the destination VPN Server.)\r\n\r\nFor detailed information contact either the system administrator or network administrator of the HTTP proxy server you plan to connect via. \r\n\r\nDo you want to change the port number specification of the destination VPN Server to 443 (HTTPS Port)?
CM_REMOTE_WARNING You are making changes to the remote management setting that will disallow remote management. \r\n\r\nCurrently the VPN Client Manager is connected to remote computer "%S" and is controlling the VPN Client service on that computer. \r\nIf remote connection is disabled, it will no longer be possible to remotely connect to and control the VPN Client service on computer "%S" using the VPN Client Manager. \r\n\r\nDo you want to disable remote management?
CM_KEEP_INTERVAL_MSG Set a period between %u and %u seconds in the Packet Send Interval.
CM_REMOTE_TITLE Using the VPN Client Manager, it is possible to connect to, and remotely manage a VPN Client service operating on another computer. \r\n(Note that the VPN Client service on the remote computer must allow remote management.)
CM_DESKTOP_LOCAL_PC Local Computer
CM_DESKTOP_REMOTE_PC Computer %S
CM_DESKTOP_MSG_LOCAL_TS Terminal Service (Remote Desktop) Function
CM_DESKTOP_MSG_LOCAL_SW Switch User Function
CM_DESKTOP_MSG_LOCAL_1 Currently %s is installed on this computer, providing an environment that permits multiple users to log on concurrently. In this case, the messages regarding progress status, error messages and other messages displayed by VPN Client will be displayed on a session called the "Console Session".
CM_DESKTOP_MSG_LOCAL_21 Currently "Session ID: 0, User %s" is assigned as the Console Session of this computer, however because you have started VPN Client Manager on session %u, it is not possible to display the message windows such as the progress status or errors that VPN Client displays.
CM_DESKTOP_MSG_LOCAL_22 Currently no one is logged into the Console Session "Session ID: 0" of this computer and because you have started VPN Client Manager on session %u, it is not possible to display the message windows such as the progress status or errors that VPN Client displays.
CM_DESKTOP_MSG_LOCAL_31 It is recommended that when this computer's Console Session (Session ID: 0, User %s) is displayed, start the VPN Client Manager in that session and start the connection to the VPN Connection Setting "%s". You will be able to start a connection process by doing what you are doing now. But it will be at the risk of being unable to check the progress status and error messages that may be displayed during the process.
CM_DESKTOP_MSG_LOCAL_32 It is recommended that you first log off and then after logging in locally, start the VPN Client Manager in that session and start the connection to VPN Connection Setting "%s". Although you will be able to start a connection process by doing what you are doing now, this will be at the risk of being unable to check the progress status and error messages that may be displayed during the process.
CM_DESKTOP_MSG_REMOTE_1 Because you are currently performing operation while remotely connected to VPN Client on computer %S, if the VPN Client displays any progress status or error messages during the VPN connection process to the VPN Connection Setting, you will not be able to check these messages from your current screen display.
CM_DESKTOP_MSG_REMOTE_2 To check all the progress status, error and other message windows that VPN Client displays, you must log in locally to computer %S and display the Control Session (desktop).
CM_DESKTOP_MSG_REMOTE_3 It is recommended that you first log in directly and locally to computer %S, and then start the VPN Client Manager in that session and start the connection to VPN Connection Setting "%s". Although you will be able to start a connection process by doing what you are doing now, this will be at the risk of being unable to check the progress status and error messages that may be displayed during the process.
CM_STOP_INST_VLAN_1 To install a Virtual Network Adapter on this computer you must start the VPN Client Manager within a "Console Session". \r\n\r\nCurrently, %s is installed on this computer and the current user is not logged into the Console Session but rather is logged in as the remote session (session ID: %u).\r\nTo install a Virtual Network Adapter, VPN Client Manager must be started in the Console Session (session ID: %u, user %s is logged on). \r\n\r\nFirst log on to the computer locally by using the user switching function, or the /console switch function that is on the remote desktop, or alternatively the computer's local console device and then start the VPN Client Manager and install the Virtual Network Adapter.
CM_STOP_INST_VLAN_2 To install a Virtual Network Adapter on this computer you must start the VPN Client Manager within a "Console Session". \r\n\r\nCurrently, %s is installed on this computer and the current user is not logged into the Console Session but rather is logged in as the remote session (session ID: %u).\r\nTo install a Virtual Network Adapter you must start the VPN Client Manager within a "Console Session". \r\n(Currently the user is not logged on to the Console Session (Session ID: 0).) \r\n\r\nFirst log on to the computer locally by using the user switching function, or the /console switch function that is on the remote desktop, or alternatively the computer's local console device and then start the VPN Client Manager and install the Virtual Network Adapter.
CM_SHORTCUT_DESKTOP_MSG To start a connection using the shortcut to the VPN Connection Setting, you must launch the shortcut file within the "Console Session". \r\n\r\nCurrently the user is logged on as the remote session (session ID: %u) and not as the Console Session.
CM_HTTP_PROXY_WARNING Connect via HTTP Proxy Server is selected. \r\n\r\nIn many cases, the HTTP proxy server will only allow 2 kinds of TCP port to be used for the connection to the destination server port number, HTTP protocol (TCP port number 80) and HTTPS protocol (TCP port number 443). \r\n(There are also cases when the proxy server does allow a wider choice of TCP port for connection.) \r\n\r\nWhen making a VPN connection via an HTTP proxy server that denies connections to server ports other than HTTP ports or HTTPS ports, you must specify 443 (HTTPS protocol) as the destination VPN Server port number. \r\n\r\nTo check whether the HTTP proxy server you are connecting via allows connection to ports other than port numbers 80 or 443, contact the administrator of the HTTP proxy server. \r\n\r\nCurrently, %d is specified as the destination VPN Server port number. Do you want to change the port number to 443 (HTTPS protocol)?\r\n(The port 443 of the VPN Servers you connect to must be set to listening status and ready for connection.) \r\nIf you are unsure, then contact the system administrator or the network administrator.
CM_PASSWORD_CHANGED The password has been changed.
CM_ACCOUNT_SETTING_FILE VPN Connection Setting Files (*.VPN)|*.vpn|All Files (*.*)|*.*
CM_ACCOUNT_SAVE_TITLE Enter a VPN Connection Setting File's File Name for the Export Destination
CM_ACCOUNT_OPEN_TITLE Select the VPN Connection Setting File to Import
CM_ACCOUNT_FILE_BANNER # VPN Client VPN Connection Setting File\r\n# \r\n# This file is exported using the VPN Client Manager.\r\n# The contents of this file can be edited using a text editor.\r\n# \r\n# When this file is imported to the Client Connection Manager\r\n# it can be used immediately.\r\n\r\n
CM_FAILED_TO_OPEN_FILE Unable to open file.
CM_FAILED_TO_SAVE_FILE Unable to save file.
CM_ACCOUNT_PARSE_FAILED Unable to load the VPN Connection Setting from the specified file. \r\nCheck the contents of the file.
CM_ACCOUNT_MSG_SENSITIVE This VPN Connection Setting has the username and the password.\r\nDo you want to remove these sensitive information from the exported setting file?\r\n\r\nClick Yes to remove sensitive information.\r\nIn that case a user will be required to input the username and the password when he is trying to connect to the VPN Server.\r\n\r\nClick No to stay the sensitive information remaining on the file.
CM_SHORTCUT_FILE Shortcut Files|*.lnk
CM_SHORTCUT_SAVE_TITLE Enter the Shortcut File Name.
CM_SHORTCUT_UNSUPPORTED The connection shortcut function is not supported by this version of VPN Client. \r\nUpdate to a new version.
CM_SHORTCUT_COMMENT Using the VPN Connection Setting "%s" to connect to the VPN Server.
CM_SHORTCUT_ERROR Failed to create a shortcut.
CM_VPN_FILE_CLICKED Do you want to import the VPN Connection File?
CM_VPN_FILE_IMPORT_NG Unable to import the VPN Connection Setting File. Because the VPN Client setting has been locked.
CM_VLAN_INSTALLING Please Wait a While
CM_SECURE_MUST_LOCAL It is currently not possible to configure smart card settings because you are connected to and managing a VPN Client on a remote computer.
CM_DETAIL_MODE_LINK_STR With a Cascade Connection, Connect by Bridge / Router mode is always enabled.
CM_TRAY_INITING SoftEther VPN Client Manager...
CM_TRAY_NOT_CONNECTED SoftEther VPN Client Manager\r\nNot connected.
CM_TRAY_CONNECTED_0 SoftEther VPN Client Manager\r\nActive connections to %u servers and is attempting to connect to %u servers
CM_TRAY_CONNECTED_1 SoftEther VPN Client Manager\r\nAttempting to connect to %u servers
CM_TRAY_CONNECTED_2 SoftEther VPN Client Manager\r\nActive connections to %u servers
CM_TRAY_MENU_1_SHOW &Show VPN Client Manager
CM_TRAY_MENU_1_HIDE Cl&ose VPN Client Manager
CM_TRAY_MENU_2_QUIT E&xit VPN Client Manager Program
CM_TRAY_MENU_CONNECT Start VPN &Connection
CM_TRAY_MENU_DISCONNECT &Disconnect VPN Connection
CM_TRAY_MENU_STATUS Show VPN Connec&tion Status
CM_TRAY_MENU_DISCONNECT_ALL Disconnect &All VPN Connections
CM_TRAY_MENU_NEW &New VPN Connection Setting...
CM_TRAY_MENU_RECENT Recent VPN Servers...
CM_TRAY_MENU_TRAFFIC Network &Traffic Speed Test Tool...
CM_TRAY_MENU_NETIF Show Network &Device Status...
CM_TRAY_MENU_ABOUT &About VPN Client Manager...
CM_TRAY_MENU_SETTING Change Operation &Mode...
CM_TRAY_MENU_CANCEL Close this menu
CM_EXIT_MESSAGE This will exit the VPN Client Manager program. \r\nDo you really want to do this?
CM_IMPORT_MESSAGE From file "%S", VPN Connection Setting "%s" has been installed.
CM_VLAN_CREATING Creating a new Virtual Network Adapter for Windows. \r\n\r\nThis process can take several seconds or over a minute. \r\nPlease wait...\r\n\r\n(Please do not perform other operations while the Virtual Network Adapter is being installed.)
CM_SETTING_PASSWORD The setting is locked. To remove the setting-locker, you must enter a password.
CM_EASY_MODE_NOT_ON_REMOTE Unable to connect because of the VPN Client on the remote computer is running in Easy Mode.
CM_EASY_CONNECT_BUTTON_1 Start VPN &Connection
CM_EASY_CONNECT_BUTTON_2 &Disconnect
CM_EASY_ACCOUNT_WARNING You can only modify Proxy Server Setting, User Authentication and Virtual Network Adapter Used because the setting has been locked.
CM_EASY_INFO_1 Select a VPN connection.
CM_EASY_INFO_2 Click Start VPN Connection to start a VPN connection.
CM_EASY_INFO_3 VPN connection is active. You can disconnect by clicking Disconnect.
CM_EXT_VOICE_MSG It is possible that some of the voice message contents of the Extension Voice Guide has not been played normally. \r\nIs the Extension Voice Guide enabled?
CM_EASY_TITLE VPN Client Easy Connection Manager
CM_EASY_CONNECTED VPN connection is active.
CM_EASY_CONNECTING Establishing VPN connection...
CM_PROXY_FROM_IE Currently proxy setting from Internet Explorer has been loaded.
CM_TRAY_ICON_RESTORE The icon in the task tray has been deleted.\r\n\r\nTo restore the icon, run the VPN Client Manager and click Show Task-tray Icon in the View menu.
CM_WOULDYOULOAD_IE_PROXY Currently the Internet Explorer on this computer is configured to use the proxy server "%S".\r\nDo you want to apply the current proxy settings on the new VPN connection setting?\r\n\r\nClick Yes to use the proxy settings of Internet Explorer.\r\nClick No to use direct connection to the VPN Server (does not a proxy server.)\r\nThis setting can be modified in the property screen of the connection settings any time later.
CM_MSG_TITLE VPN Server "%S" (Virtual Hub: "%S")
CM_JUMPLIST_RCCONNECT Recent VPN Servers
CM_VPNGATE_MESSAGE There is the list of Public VPN Relay Servers on the VPN Gate Academic Project Web Site.\r\nAnyone on the Internet can connect a VPN connection to any VPN servers on the list.\r\n\r\nVPN Gate Academic Project is not a part of SoftEther VPN.\r\nThis icon provides just a link to http://www.vpngate.net/.\r\nYou need to install VPN Gate Plugin to connect VPN Gate.\r\n\r\nDo you want to visit http://www.vpngate.net/ (provided by University of Tsukuba) ?
VGC_COLUMN_0 DDNS Hostname
VGC_COLUMN_1 IP Address (Hostname)
VGC_COLUMN_2 Region
VGC_COLUMN_3 Uptime
VGC_COLUMN_4 VPN Sessions
VGC_COLUMN_5 Line Speed
VGC_COLUMN_6 Ping (Google, SE)
VGC_COLUMN_7 SSL-VPN (TCP)
VGC_COLUMN_8 UDP Support
VGC_COLUMN_9 Logging Policy
VGC_COLUMN_10 Cumulative Transfers
VGC_COLUMN_11 Cumulative Users
VGC_COLUMN_12 Operator's Name
VGC_COLUMN_13 Operator's Message
VGC_COLUMN_14 Total Score
VGC_LOG_PERMANENT Permanent
VGC_LOG_2WEEKS 2 Weeks
VGC_LOG_NONE No Logs
VGC_UPTIME_MIN %u mins
VGC_UPTIME_HOUR %u hours
VGC_UPTIME_DAY %u days
VGC_NUM_VPN %u sessions
VGC_NUM_LOGIN %S logins
VGC_UDP_AVAILABLE UDP OK
VGC_TITLE VPN Gate Plug-in Message
VGC_VER_DIFF The version of VPN Gate Client Plug-in is different from SoftEther VPN Client.\r\n\r\n- Current VPN Gate Plug-in: Build %u\r\n- Current SoftEther VPN Client: Build %u\r\n\r\nIt is recommended to download and install VPN Gate Plug-in Build %u. Otherwise, communication errors or list-update errors might be occur. If the VPN Server List updating fails many times, update the VPN Gate Plug-in version.\r\n\r\nThe latest VPN Gate Plug-in is available at http://www.vpngate.net/.\r\n(Use a mirror-site if you cannot visit the above web-site directly.)\r\n\r\n
VGC_LIST_STR_OK %S Public VPN Relay Servers on the Earth! (Updated at %S)
VGC_LIST_STR_OK_2 %S Servers (at %S) - List update failed. Try again. If fails again, download the latest VPN Gate Client.
VGC_LIST_STR_NG List update failed. Try again. If fails again, download the latest VPN Gate Client.
VGC_PROXY_MSG If you are using a proxy server, you might not be able to use VPN Relay Servers which don't support the TCP port 443 as "SSL-VPN Connection" from such a proxy-mandated network.
VGC_PROXY_TITLE Notice for Proxy Server Users
VGS_NO_HUB_YET In order to set the message, first you have to commit enabling the VPN Gate service. After the service will be enabled, re-open this window and set the message.
VGS_STOP VPN Gate Service will stop after you click the OK button.\r\n\r\nAfter VPN Gate Service will be stopped, this computer will never accept new VPN connection requests, however, still-alive VPN Sessions might remain.\r\n (Such VPN sessions sometimes hidden from the enumeration.) \r\n\r\nTo terminate all of still-alive VPN Sessions completely, restart SoftEther VPN Server or SoftEther VPN Client service, or reboot the computer.
VGS_START This will activate the VPN Gate Relay Service function.\r\n\r\nVPN Gate Relay Service function must be activated by your own risk.\r\nSome countries prohibit using of encrypted VPN by laws.\r\nFor more details about VPN Gate Relay Service please visit http://www.vpngate.net/en/join.aspx.\r\n\r\nThe VPN Gate Academic Experiment Service is operated as a research project at the graduate school on University of Tsukuba, Japan. The service is governed under the Japanese laws. Other countries' laws are none of our concerns nor responsibilities.\r\n\r\nBy nature, there are almost 200 countries in the World, with different laws. It is impossible to verify every countries' laws and regulations and make the software comply with all countries' laws in advance to release the software. If a user uses VPN Gate service in a specific country, and damaged by public servants of the authority, the developer of either the service or software will never be liable to recover or compensate such damages or criminal responsibilities.\r\nBy using this software and service, the user must observe all concerned laws and rules with user's own responsibility. The user will be completely liable to any damages and responsibilities which are results of using this software and service, regardless of either inside or outside of Japan's territory.\r\nIf you don't agree nor understand the above warnings, do not use any of VPN Gate Academic Experiment Service functions.
# Concerning services (Win32)
SVC_HELP *** Command Line Arguments of %s (%S) ***\r\n\r\nThis program (%s) is a process runs as a background task. Start the program by specifying the following arguments on the command line. \r\n\r\n\r\n/install : Installs %s service (service name: %S) in Windows. After this, the service will automatically start. \r\n\r\n/uninstall... Uninstalls %s service (service name: %S) from Windows. \r\n\r\n/start : Starts %s service (service name: %S). \r\n\r\n/stop : Stops %s service (service name: %S). \r\n\r\n/test : Starts %s program in test mode. (For debug)\r\n\r\n/usermode : Starts %s program in the user mode. (When possible)\r\n\r\n/usermode_showtray : When starting in the user mode, this is used to display task tray icons when they were set to be hidden on a previous occasion. \r\n\r\n/usermode_hidetray : When starting in the user mode, this sets the task tray icons to be hidden. \r\n\r\n\r\nNote: Commands related to service operation other than /test and /usermode can only be operated on Windows NT / XP / Server 2003 / Vista / Server 2008.
SVC_NT_ONLY The service related operation commands can only operate on Windows NT / 2000 / XP / Server 2003 / Vista / Server 2008. \r\nThey do not operate on Windows 98 / Me.
SVC_ALREADY_INSTALLED The "%s" service (service name: %S) is already installed on this computer. Do you want to uninstall it and then re-install?
SVC_INSTALL_OK The "%s" service (Service name: %S) has been installed successfully. \r\n\r\n(Execution path: %s)\r\n\r\nThe service has started.
SVC_INSTALL_FAILED The installation of the "%s" service (service name: %S) failed.
SVC_INSTALL_FAILED_2 The "%s" service (Service name: %S) has been successfully installed. \r\n\r\n(Execution path: %s)\r\n\r\nAn attempt to start the service, however, failed.
SVC_NOT_INSTALLED The "%s" service (service name: %S) is not yet installed on this computer. Use the /install command line argument to install it.
SVC_START_OK The "%s" service (service name: %S) started successfully.
SVC_START_FAILED The "%s" service (service name: %S) failed to start.
SVR_ALREADY_START The "%s" service (service name: %S) has already started.
SVC_STOP_OK The "%s" service (Service name: %S) has been stopped.
SVC_STOP_FAILED The "%s" service (service name: %S) failed to stop.
SVC_ALREADY_STOP The "%s" service (service name: %S) is already stopped.
SVC_UNINSTALL_OK The "%s" service (Service name: %S) has been uninstalled successfully.
SVC_UNINSTALL_FAILED The uninstallation of the "%s" service (service name: %S) failed.
SVC_NOT_FOUND Unable to find information related to service %S from the string table.
SVC_NOT_ADMIN To install, uninstall, start or stop the service you must have administrator privileges for this computer. \r\n\r\nIf you have an administrators account for this computer, log out and log on as an administrator. \r\nIf you are unclear about administrators accounts, contact your system administrator.
SVC_TEST_MSG The "%s" service is started in test mode. \r\n\r\nClick OK to exit the service.
SVC_TRAY_TOOLTIP %S (User mode)
SVC_TEST_MUTEX The executable file %s is already started.
SVC_USERMODE_MUTEX Another process of %s is already started.
SVC_SERVICE_MUTEX Because service %S has process %s that is already started, the service cannot start.
SVC_USERMODE_MENU_1 &Hide Tasktray Icon
SVC_USERMODE_MENU_2 E&xit %s
SVC_HIDE_TRAY_MSG This will hide the tasktray icons when starting %S in user mode. \r\nBeginning from next time %S is started in user mode, icons will not be displayed in the tasktray. \r\nThe menu to exit the process will also be hidden. \r\n\r\nTo exit the process in the case of Windows 98 / Me, use the Ctrl + Alt + Del key combination and select to end the process. \r\nWhen using other operating systems, use Task Manager. \r\n\r\nTo redisplay the tasktray icons, use the /usermode_showtray option when starting in user mode next time.
# Concerning services (UNIX)
UNIX_SVC_HELP %S service program\nCopyright (c) SoftEther VPN Project. All Rights Reserved.\n\n%S command usage:\n %S start - Start the %S service.\n %S stop - Stop the %S service if the service has been already started.\n\n
UNIX_SVC_STARTED The %S service has been started.\n
UNIX_SVC_STOPPING Stopping the %S service ...\n
UNIX_SVC_STOPPED %S service has been stopped.\n
UNIX_SVC_STOP_FAILED Stopping %S service was failed.\n
UNIX_SVC_ALREADY_START %S service has been already started.\nRun the "%S stop" command to stop this service.\n
UNIX_SVC_NOT_STARTED %S service has not yet been started.\nRun the "%S start" to start this service.\n
UNIX_SVC_ERROR_FORK Failed to create child process for the %S service.\n
UNIX_SVC_NONROOT \nWarning: The current user context is non-root. It is recommended to run the VPN service by the root user. Although the VPN service may run under non-root users, some privilege-required functions (e.g. the local bridge function) need the root privilege.\n
# Service definition (SoftEther VPN Client)
SVC_VPNCLIENT_NAME vpnclient
SVC_VPNCLIENT_TITLE SoftEther VPN Client
SVC_VPNCLIENT_DESCRIPT This manages the Virtual Network Adapter device driver and connection service for the SoftEther VPN Client. When this service is stopped, it will not be possible to use SoftEther VPN Client on this computer to connect to a SoftEther VPN Server.
# Service Definition (SoftEther VPN Server)
SVC_VPNSERVER_NAME vpnserver
SVC_VPNSERVER_TITLE SoftEther VPN Server
SVC_VPNSERVER_DESCRIPT This manages the server processes of SoftEther VPN Server. SoftEther VPN Server provides high-performance SoftEther VPN Server functions via TCP/IP protocol. When this service is stopped, SoftEther VPN Server on this computer will stop and SoftEther VPN Client will be unable to establish a VPN connection with this computer.
# Service Definition (SoftEther VPN Bridge)
SVC_VPNBRIDGE_NAME vpnbridge
SVC_VPNBRIDGE_TITLE SoftEther VPN Bridge
SVC_VPNBRIDGE_DESCRIPT This manages the processes of SoftEther VPN Bridge. SoftEther VPN Bridge provides a bridging connection between the network this computer is connected to and a SoftEther VPN Server that is remotely located. When this service is stopped, SoftEther VPN Bridge on this computer will stop and it will no longer be possible to communicate via the bridge connection.
# Service definition (SoftEther VPN Client)
SVC_SEVPNCLIENT_NAME sevpnclient
SVC_SEVPNCLIENT_TITLE SoftEther VPN Client
SVC_SEVPNCLIENT_DESCRIPT This manages the Virtual Network Adapter device driver and connection service for the SoftEther VPN Client. When this service is stopped, it will not be possible to use SoftEther VPN Client on this computer to connect to a SoftEther VPN Server.
# Service Definition (SoftEther VPN Server)
SVC_SEVPNSERVER_NAME sevpnserver
SVC_SEVPNSERVER_TITLE SoftEther VPN Server
SVC_SEVPNSERVER_DESCRIPT This manages the server processes of SoftEther VPN Server. SoftEther VPN Server provides high-performance SoftEther VPN Server functions via TCP/IP protocol. When this service is stopped, SoftEther VPN Server on this computer will stop and SoftEther VPN Client will be unable to establish a VPN connection with this computer.
# Service Definition (SoftEther VPN Bridge)
SVC_SEVPNBRIDGE_NAME sevpnbridge
SVC_SEVPNBRIDGE_TITLE SoftEther VPN Bridge
SVC_SEVPNBRIDGE_DESCRIPT This manages the processes of SoftEther VPN Bridge. SoftEther VPN Bridge provides a bridging connection between the network this computer is connected to and a SoftEther VPN Server that is remotely located. When this service is stopped, SoftEther VPN Bridge on this computer will stop and it will no longer be possible to communicate via the bridge connection.
# Service definition (SoftEther VPN User-mode Router)
SVC_VPNROUTER_NAME vpnrouter
SVC_VPNROUTER_TITLE SoftEther VPN Router
SVC_VPNROUTER_DESCRIPT This manages the server processes of SoftEther VPN Router (service mode). SoftEther VPN Router is a program that provides a virtual NAT and DHCP server that operates in user mode and by using simple operations it is possible to establish a safe connection between a virtual IP network and a physical IP network. When this service is stopped, SoftEther VPN Router on this computer will stop and SoftEther VPN Client will be unable to use the routing service on this computer.
# Service Definition (EtherLogger)
SVC_ELOGSVC_NAME elogsvc
SVC_ELOGSVC_TITLE SoftEther EtherLogger
SVC_ELOGSVC_DESCRIPT SoftEther EtherLogger is a service that captures data flowing through LAN cards connected to the computer and keeps a log of the headers of the packet types specified by the administrator and all data in text file format.
# Concerning SoftEther VPN Server Manager
SM_TITLE SoftEther VPN Server Manager
SM_LOCALHOST localhost (This server)
SM_SERVER_BRIDGE_TITLE Manage VPN Bridge "%S"
SM_S_VHUB_BRIDGE When using VPN Bridge, you manage Virtual Hub "BRIDGE" to operate management of VPN Bridge.
SM_DISCONNECTED The management connection has been disconnected.
SM_MIKAN Under Construction.
SM_MAIN_COLUMN_1 Setting Name
SM_MAIN_COLUMN_2 VPN Server Hostname
SM_MAIN_COLUMN_3 Operation Mode
SM_MODE_SERVER Entire VPN Server
SM_MODE_HUB Hub '%S' Only
SM_EDIT_CAPTION_1 New Connection Setting
SM_EDIT_CAPTION_2 Edit %s
SM_SETTING_EXISTS A Connection Setting with the same name as Connection Setting "%s" is already registered. Specify a different name.
SM_SETTING_DELETE_MSG This will delete the Connection Setting "%s". Do you really want to do this?
SM_PASSWORD_TYPE_STR Password for Administration Connection
SM_HUB_COLUMN_1 Virtual Hub Name
SM_HUB_COLUMN_2 Status
SM_HUB_COLUMN_3 Type
SM_HUB_COLUMN_4 Users
SM_HUB_COLUMN_5 Groups
SM_HUB_COLUMN_6 Sessions
SM_HUB_COLUMN_7 MAC Tables
SM_HUB_COLUMN_8 IP Tables
SM_HUB_COLUMN_9 Num Logins
SM_HUB_COLUMN_10 Last Login
SM_HUB_COLUMN_11 Last Communication
SM_HUB_ONLINE Online
SM_HUB_OFFLINE Offline
SM_HUB_STANDALONE Standalone
SM_HUB_STATIC Static Hub
SM_HUB_DYNAMIC Dynamic Hub
SM_SERVER_STANDALONE Standalone Server
SM_FARM_CONTROLLER Cluster Controller
SM_FARM_MEMBER Cluster Member Server
SM_INFORMATION Latest Information
SM_HUB_STATUS_CAPTION Status of Virtual Hub "%s"
SM_HUB_STATUS_HUBNAME Virtual Hub Name
SM_HUB_STATUS_ONLINE Status
SM_HUB_TYPE Type
SM_HUB_NUM_SESSIONS Sessions
SM_HUB_NUM_SESSIONS_CLIENT Sessions (Client)
SM_HUB_NUM_SESSIONS_BRIDGE Sessions (Bridge)
SM_HUB_NUM_ACCESSES Access Lists
SM_HUB_NUM_USERS Users
SM_HUB_NUM_GROUPS Groups
SM_HUB_NUM_MAC_TABLES MAC Tables
SM_HUB_NUM_IP_TABLES IP Tables
SM_HUB_SECURE_NAT SecureNAT
SM_HUB_SECURE_NAT_YES Enabled
SM_HUB_SECURE_NAT_NO Disabled
SM_HUB_NUM_LOGIN Num Logins
SM_HUB_LAST_LOGIN_TIME Last Login
SM_HUB_LAST_COMM_TIME Last Communication
SM_HUB_CREATED_TIME Created at
SM_STATUS_COLUMN_1 Item
SM_STATUS_COLUMN_2 Value
SM_ST_SEND_UCAST_NUM Outgoing Unicast Packets
SM_ST_SEND_UCAST_SIZE Outgoing Unicast Total Size
SM_ST_SEND_BCAST_NUM Outgoing Broadcast Packets
SM_ST_SEND_BCAST_SIZE Outgoing Broadcast Total Size
SM_ST_RECV_UCAST_NUM Incoming Unicast Packets
SM_ST_RECV_UCAST_SIZE Incoming Unicast Total Size
SM_ST_RECV_BCAST_NUM Incoming Broadcast Packets
SM_ST_RECV_BCAST_SIZE Incoming Broadcast Total Size
SM_ST_NUM_PACKET_STR %S packets
SM_ST_SIZE_BYTE_STR %S bytes
CM_EDIT_HUB_1 New Virtual Hub
CM_EDIT_HUB_2 Properties of %S
CM_EDIT_HUB_STANDALONE Currently the server is operating in Standalone Mode. This Virtual Hub is operating as a Standalone Hub.
CM_EDIT_HUB_TYPE_FIXED Currently the server is operating in Cluster Mode. This Virtual Hub is of the following type, which means it is not possible to make dynamic changes.
CM_EDIT_HUB_CREATER A new Virtual Hub '%S' has been created.
CM_OFFLINE_MSG Do you want to switch %s to offline?\r\n\r\nIf you switch the Virtual Hub to offline all sessions currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect.
CM_DELETE_HUB_MSG Do you want to delete %S?\r\n\r\nIf you delete the Virtual Hub, all sessions currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect. \r\nThis will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. \r\n\r\nOnce you delete the Virtual Hub, it cannot be recovered. \r\nAre you sure you want to delete it?
CM_HUB_DELETED_MSG Virtual Hub %S has been deleted.
CM_LISTENER_COLUMN_1 Port Number
CM_LISTENER_COLUMN_2 Status
CM_LISTENER_TCP_PORT TCP %u
CM_LISTENER_ONLINE Listening
CM_LISTENER_OFFLINE Stopped
CM_LISTENER_ERROR Error
CM_DELETE_LISTENER_MSG This will delete the Listener (TCP port %u). From now on, it will not be possible to connect to this port. \r\nDo you really want to do this?
CM_STOP_LISTENER_MSG This will stop the Listener (TCP port %u). Until Listener is restarted it will not be possible to connect to this port. \r\n\r\nDo you really want to do this?
CM_CLOSE_BUTTON Close
CM_CERT_SET_MSG A new server certificate has been set.\r\n\r\nIf you are using OpenVPN protocols, please mind that you may have to update the inline certificate data in the OpenVPN configuration file.
CM_SHORTCUT_DISCONNECT There is already an active connection to the specified connection destination. \r\n\r\nDo you want to disconnect?
SM_SERVER_STATUS Server Status
SM_ST_SERVER_TYPE Server Type
SM_ST_NUM_TCP Number of Active Sockets
SM_ST_NUM_TCP_LOCAL Number of Active Sockets (This Server)
SM_ST_NUM_TCP_REMOTE Number of Active Sockets (Other Member Servers)
SM_ST_NUM_HUB_TOTAL Number of Virtual Hubs
SM_ST_NUM_HUB_STATIC Number of Static Virtual Hubs
SM_ST_NUM_HUB_DYNAMIC Number of Dynamic Virtual Hubs
SM_ST_NUM_SESSION_TOTAL Number of Sessions
SM_ST_NUM_SESSION_LOCAL Number of Sessions (This Server)
SM_ST_NUM_SESSION_REMOTE Number of Sessions (Other Member Servers)
SM_ST_NUM_MAC_TABLE Number of MAC Address Tables
SM_ST_NUM_IP_TABLE Number of IP Address Tables
SM_ST_NUM_USERS Number of Users
SM_ST_NUM_GROUPS Number of Groups
SM_ST_CLIENT_LICENSE Using Client Connection Licenses (This Server)
SM_ST_BRIDGE_LICENSE Using Bridge Connection Licenses (This Server)
SM_ST_CLIENT_LICENSE_EX Using Client Connection Licenses (Entire Cluster)
SM_ST_BRIDGE_LICENSE_EX Using Bridge Connection Licenses (Entire Cluster)
SM_ST_START_TIME Server Started at
SM_ST_CURRENT_TIME Current Time
SM_ST_CURRENT_TICK 64 bit High-Precision Logical System Clock
SM_ST_TOTAL_MEMORY Total Logical Memory Size
SM_ST_USED_MEMORY Used Logical Memory Size
SM_ST_FREE_MEMORY Free Logical Memory Size
SM_ST_TOTAL_PHYS Total Physical Memory Size
SM_ST_USED_PHYS Used Physical Memory Size
SM_ST_FREE_PHYS Free Physical Memory Size
SM_ST_RAM_SIZE_KB %S bytes
SM_INFO_TITLE VPN Server Version Information
SM_INFO_PRODUCT_NAME Product Name
SM_INFO_VERSION Version
SM_INFO_BUILD Build
SM_INFO_HOSTNAME Host Name
SM_OS_SYSTEM_NAME Type of Operating System
SM_OS_PRODUCT_NAME Product Name of Operating System
SM_OS_SERVICE_PACK Service Pack
SM_OS_SP_TAG Service Pack %u
SM_OS_VENDER_NAME Operating System Vendor
SM_OS_VERSION Operating System Version
SM_OS_KERNEL_NAME Type of OS Kernel
SM_OS_KERNEL_VERSION Version of OS Kernel
SM_CONNECTION_TYPE_0 Client
SM_CONNECTION_TYPE_1 Initializing...
SM_CONNECTION_TYPE_2 Login
SM_CONNECTION_TYPE_3 Additional Connection
SM_CONNECTION_TYPE_4 Clustering RPC
SM_CONNECTION_TYPE_5 Management RPC
SM_CONNECTION_TYPE_6 Hub Enumeration RPC
SM_CONNECTION_TYPE_7 Changing Password
SM_CONNECTION_TYPE_8 MS-SSTP Connection
SM_CONNECTION_TYPE_9 OpenVPN Connection
SM_CONN_COLUMN_1 Connection Name
SM_CONN_COLUMN_2 Connection Source
SM_CONN_COLUMN_3 Connection Start
SM_CONN_COLUMN_4 Type
SM_HOSTNAME_AND_PORT %S: %u
SM_CONN_DISCONNECT_MSG This will disconnect connection %s. \r\nDo you really want to do this?
SM_CONNINFO_CAPTION Connection %s Information
SM_CONNINFO_NAME Connection Name
SM_CONNINFO_TYPE Connection Type
SM_CONNINFO_HOSTNAME Source Host Name
SM_CONNINFO_IP Client IP Address
SM_CONNINFO_PORT Client Port Number (TCP)
SM_CONNINFO_TIME Connection Start
SM_CONNINFO_SERVER_STR Server Product Name
SM_CONNINFO_SERVER_VER Sever Version
SM_CONNINFO_SERVER_BUILD Server Build Number
SM_CONNINFO_CLIENT_STR Client Product Name
SM_CONNINFO_CLIENT_VER Client Version
SM_CONNINFO_CLIENT_BUILD Client Build
SM_FARM_REBOOT_MSG You are about to change the clustering configuration. \r\n\r\nWhen you change the clustering configuration, all currently connected sessions and connections for management purposes (including this management connection) will be disconnected and the server program will restart. \r\nWhen there are many server users, it could take over a minute to restart. \r\n\r\nClick OK to automatically disconnect the connection with the server. To continue management, you will need to reconnect to the server.
SM_FM_COLUMN_1 Type
SM_FM_COLUMN_2 Connection Started at
SM_FM_COLUMN_3 Host Name
SM_FM_COLUMN_4 Point
SM_FM_COLUMN_5 Number of Sessions
SM_FM_COLUMN_6 Number of TCP Connections
SM_FM_COLUMN_7 Number of Operating Hubs
SM_FM_COLUMN_8 Using Client Connection Licenses
SM_FM_COLUMN_9 Using Bridge Connection Licenses
SM_FM_CONTROLLER Controller
SM_FM_MEMBER Member
SM_FMINFO_TYPE Server Type
SM_FMINFO_CONNECT_TIME Connection Established at
SM_FMINFO_IP IP Address
SM_FMINFO_HOSTNAME Host Name
SM_FMINFO_POINT Point
SM_FMINFO_WEIGHT Performance Standard Ratio
SM_FMINFO_NUM_PORT Number of Public Ports
SM_FMINFO_PORT Public Port #%u (TCP/IP)
SM_FMINFO_NUM_HUB Number of Running Virtual Hubs
SM_FMINFO_HUB Virtual Hub #%u
SM_FMINFO_HUB_TAG_1 %S (Dynamic)
SM_FMINFO_HUB_TAG_2 %S (Static)
SM_FMINFO_NUM_SESSION Number of Sessions
SM_FMINFO_NUN_CONNECTION Number of TCP Connections
SM_FMINFO_CAPTION Cluster Member Server Status
SM_FC_STATUS_CAPTION Connection to Cluster Controller Status
SM_FC_IP Controller IP Address
SM_FC_PORT Controller TCP/IP Port
SM_FC_STATUS Connection Status
SM_FC_ONLINE Online
SM_FC_OFFLINE Offline
SM_FC_LAST_ERROR Last Error
SM_FC_ERROR_TAG %s (Error Code: %u)
SM_FC_START_TIME Connection Started at
SM_FC_FIRST_TIME First Connection Established at
SM_FC_CURRENT_TIME Current Connection Established at
SM_FC_NUM_TRY Number of Connection Attempts
SM_FC_NUM_CONNECTED Number of Successful Connections
SM_FC_NUM_FAILED Number of Failed Connections
SM_FC_NOT_CONNECTED (Not Connected)
SM_CHANGE_PASSWORD_1 The passwords you entered did not match. Enter the same password in Confirm as you enter in Password.
SM_CHANGE_PASSWORD_2 You have entered an empty password. Continue anyway?
SM_CHANGE_PASSWORD_3 The password has been changed.
SM_USER_COLUMN_1 User Name
SM_USER_COLUMN_2 Full Name
SM_USER_COLUMN_3 Group Name
SM_USER_COLUMN_4 Description
SM_USER_COLUMN_5 Auth Method
SM_USER_COLUMN_6 Num Logins
SM_USER_COLUMN_7 Last Login
SM_AUTHTYPE_0 Anonymous Authentication
SM_AUTHTYPE_1 Password Authentication
SM_AUTHTYPE_2 Individual Certificate Authentication
SM_AUTHTYPE_3 Signed Certificate Authentication
SM_AUTHTYPE_4 RADIUS Authentication
SM_AUTHTYPE_5 NT Domain Authentication
SM_NO_GROUP -
SM_USER_DELETE_MSG This will delete the user "%s". Do you really want to do this?
SM_EDIT_USER_CAPTION_1 Create New User
SM_EDIT_USER_CAPTION_2 Properties of User %S
SM_EDIT_USER_CERT_INFO The users using 'Individual Certificate Authentication' will be allowed or denied connection depending on whether the SSL client certificate completely matches the certificate that has been set for the user beforehand.
SM_EDIT_USER_POL_DLG Security Policy of User %S
SM_POLICY_DEF_CAPTION Security Policy
SM_LIMIT_STR Specify an integer that is within the range %u to %u.
SM_POLICY_INIT_TITLE Select a policy item from the list on the left.
SM_USER_CREEATE_OK User %S has been created.
SM_USERINFO_CAPTION User "%S" Information
SM_USERINFO_NAME User Name
SM_USERINFO_GROUP Group Name
SM_USERINFO_CREATE Created on
SM_USERINFO_UPDATE Updated on
SM_USERINFO_EXPIRE Expiration Date
SM_USERINFO_NUMLOGIN Number of Logins
SM_GROUPLIST_NAME Group Name
SM_GROUPLIST_REALNAME Full Name
SM_GROUPLIST_NOTE Description
SM_GROUPLIST_NUMUSERS Num Users
SM_EDIT_GROUP_CAPTION_1 Creation of New Group
SM_EDIT_GROUP_CAPTION_2 Properties of Group %S
SM_GROUP_CREATED Group %S has been created.
SM_GROUP_DELETE_MSG Group %S has been deleted. Do you really want to do this?
SM_GROUP_POLICY_CAPTION Security Policy of Group %S
SM_GROUP_MEMBER_STR \ (Display only users belonging to group %S)
SM_SELECT_GROUP &Select
SM_SELECT_NO_GROUP &None
SM_SELECT_ALT_GROUP Select a &Group...
SM_ACCESS_COLUMN_0 ID
SM_ACCESS_COLUMN_1 Action
SM_ACCESS_COLUMN_2 Status
SM_ACCESS_COLUMN_3 Priority
SM_ACCESS_COLUMN_4 Memo
SM_ACCESS_COLUMN_5 Contents
SM_ACCESS_COLUMN_6 Unique ID
SM_ACCESS_PASS Pass
SM_ACCESS_DISCARD Discard
SM_ACCESS_ENABLE Enable
SM_ACCESS_DISABLE Disable
SM_ACCESS_PROTO_1 All IPv4 / IPv6 Protocols
SM_ACCESS_PROTO_2 6 (TCP/IP Protocol)
SM_ACCESS_PROTO_3 17 (UDP/IP Protocol)
SM_ACCESS_PROTO_4 1 (ICMPv4 Protocol)
SM_ACCESS_PROTO_5 58 (ICMPv6 Protocol)
SM_ACCESS_PROTO_6 Specify the IP Protocol Number
SM_SELECT_USER &Select
SM_SELECT_NO Do&n't Select
SM_PLEASE_SELECT Select User.
SM_LINK_COLUMN_1 Setting Name
SM_LINK_COLUMN_2 Status
SM_LINK_COLUMN_3 Established at
SM_LINK_COLUMN_4 Destination VPN Server
SM_LINK_COLUMN_5 Virtual Hub
SM_LINK_STATUS_OFFLINE Offline (Stopped)
SM_LINK_STATUS_ERROR Error %u: %s
SM_LINK_STATUS_ONLINE Online (Established)
SM_LINK_POLICY_GROUP Cascade Connection Setting
SM_LINK_POLICY_CAPTION Security policy settings applicable to Cascade sessions
SM_LINK_CONNECTING Connecting
SM_LINK_SAVE_ONLINE Although the Cascade Connection Setting "%s" has been changed, this Cascade Connection is currently online. The setting will not be applied until next time the connection is established.
SM_LINK_DELETE_MSG This will delete the settings for Cascade Connection "%s". Do you really want to do this?
SM_LINK_OFFLINE_MSG Currently Cascade Connection "%s" is active. Do you want to disconnect this connection?
SM_LINK_STATUS_CAPTION Connection status of Cascade Connection "%s"
SM_LOG_SWITCH_0 No Switching
SM_LOG_SWITCH_1 Switch in Every Second
SM_LOG_SWITCH_2 Switch in Every Minute
SM_LOG_SWITCH_3 Switch in Every Hour
SM_LOG_SWITCH_4 Switch in Every Day
SM_LOG_SWITCH_5 Switch in Every Month
SM_SESS_DISCONNECT_MSG This will disconnect session "%S". Do you really want to do this?
SM_SESS_COLUMN_1 Session Name
SM_SESS_COLUMN_2 Location
SM_SESS_COLUMN_3 User Name
SM_SESS_COLUMN_4 Source Host Name
SM_SESS_COLUMN_5 TCP Connections
SM_SESS_COLUMN_6 Transfer Bytes
SM_SESS_COLUMN_7 Transfer Packets
SM_SESS_COLUMN_8 VLAN ID
SM_SESS_NORMAL Local Session
SM_SESS_LOCAL Local Session
SM_SESS_LOCAL_2 On '%S'
SM_SESS_REMOTE On '%S'
SM_SESS_LINK Cascade Connection
SM_SESS_LINK_HOSTNAME Virtual Host
SM_SESS_LINK_TCP None
SM_SESS_SNAT SecureNAT Session
SM_SESS_SNAT_HOSTNAME Virtual Host
SM_SESS_SNAT_TCP None
SM_SESS_BRIDGE Local Bridge Session
SM_SESS_BRIDGE_HOSTNAME Ethernet Bridge
SM_SESS_LAYER3_HOSTNAME Virtual Layer 3 Switch
SM_SESS_BRIDGE_TCP None
SM_SESS_STATUS_CAPTION VPN Session "%S" Status
SM_SESS_STATUS_USERNAME User Name (Authentication)
SM_SESS_STATUS_REALUSER User Name (Database)
SM_SESS_STATUS_GROUPNAME Group Name
SM_CLIENT_IP Client IP Address
SM_CLIENT_HOSTNAME Client Host Name
SM_NODE_CLIENT_NAME Client Product Name (Reported)
SM_NODE_CLIENT_VER Client Version (Reported)
SM_NODE_CLIENT_BUILD Client Build (Reported)
SM_NODE_SERVER_NAME Server Product Name (Reported)
SM_NODE_SERVER_VER Server Version (Reported)
SM_NODE_SERVER_BUILD Server Build (Reported)
SM_NODE_CLIENT_OS_NAME Client OS Name (Reported)
SM_NODE_CLIENT_OS_VER Client OS Version (Reported)
SM_NODE_CLIENT_OS_PID Client OS Product ID (Reported)
SM_NODE_CLIENT_HOST Client Host Name (Reported)
SM_NODE_CLIENT_IP Client IP Address (Reported)
SM_NODE_CLIENT_PORT Client Port (Reported)
SM_NODE_SERVER_HOST Server Host Name (Reported)
SM_NODE_SERVER_IP Server IP Address (Reported)
SM_NODE_SERVER_PORT Server Port (Reported)
SM_NODE_PROXY_HOSTNAME Proxy Host Name (Reported)
SM_NODE_PROXY_IP Proxy IP Address (Reported)
SM_NODE_PROXY_PORT Proxy Port (Reported)
SM_MAC_COLUMN_1 Session Name
SM_MAC_COLUMN_2 MAC Address
SM_MAC_COLUMN_3 Created at
SM_MAC_COLUMN_4 Updated at
SM_MAC_COLUMN_5 Location
SM_MAC_COLUMN_1A VLAN ID
SM_SESSION_FILTER \ (Displays only entries of session %S)
SM_IP_COLUMN_1 Session Name
SM_IP_COLUMN_2 IP Address
SM_IP_COLUMN_3 Created at
SM_IP_COLUMN_4 Updated at
SM_IP_COLUMN_5 Location
SM_MAC_IP_DHCP %S (DHCP)
SM_MACIP_LOCAL On This Server
SM_MACIP_SERVER On '%S'
SM_SNAT_STATUS SecureNAT Operating Status
SM_SNAT_NUM_SESSION %u Session
SM_SNAT_NUM_CLIENT %u Client
SM_SNAT_IS_KERNEL Kernel-mode NAT is Active
SM_SNAT_IS_RAW Raw IP mode NAT is Active
SM_BRIDGE_TOO_OLD_VER The Local Bridge function is not supported by the version of the VPN Server that is currently connected. \r\nTry update to a new version.
SM_BRIDGE_UNSUPPORTED Unable to use the Local Bridge function with the operating system that this VPN Server is operating on. For the list of operating system that the Local Bridge function can be used on, refer to the online documentation of the VPN Server.
SM_BRIDGE_WPCAP_REMOTE In order to use the Local Bridge function on this VPN Server, you must install the WinPcap software. The software WinPcap is currently not installed on the server computer. \r\n\r\nTo continue the installation of the WinPcap software, you must start SoftEther VPN Server Manager on the server computer that is running VPN Server and then while connected to localhost (location of your own computer), have the Local Bridge Function Setting window displayed. \r\nTo continue, first exit this management session, and then, after starting SoftEther VPN Server Manager on the server computer, connect to localhost and continue the setting process.
SM_BRIDGE_WPCAP_ROOT In order to use the Local Bridge function on this VPN Server, you must install the WinPcap software. \r\n\r\nTo continue the installation you must log in to this computer as a user with administrator privileges. \r\nLog on as an administrator and start the SoftEther VPN Server Manager again.
SM_BRIDGE_WPCAP_INSTALL In order to use the Local Bridge function on this VPN Server, you must install the WinPcap software. The software WinPcap is currently not installed on the server computer. \r\n\r\nWinPcap is an easy-to-install free software that is bundled together with the VPN Server. \r\n\r\nDo you want to begin the installation of WinPcap?
SM_BRIDGE_WPCAP_REBOOT1 After WinPcap installation has completed, you must restart the computer before you use the Local Bridge function again. \r\n\r\nAfter you restart the computer manually and start VPN Server, configure the settings for the Local Bridge function.
SM_BRIDGE_WPCAP_REBOOT2 After WinPcap installation has completed, you must restart the SoftEther VPN Server service before you use the Local Bridge function again. \r\n\r\nIt only takes a short time to restart the SoftEther VPN Server service, however all sessions that are currently connected to the VPN Server will be disconnected. \r\nThis management session will also be disconnected, so you will need to reconnect to continue. \r\n\r\nDo you want to restart the SoftEther VPN Server service?
SM_BRIDGE_RESOURCE Unable to load the WinPcap driver.
SM_BRIDGE_COLUMN_1 Number
SM_BRIDGE_COLUMN_2 Virtual Hub Name
SM_BRIDGE_COLUMN_3 Network Adapter or Tap Device Name
SM_BRIDGE_COLUMN_4 Status
SM_BRIDGE_OFFLINE Offline
SM_BRIDGE_ONLINE Operating
SM_BRIDGE_ERROR Error
SM_BRIDGE_OK The Local Bridge connection definition has been added.
SM_BRIDGE_DELETE Do you want to delete the Local Bridge from Virtual Hub "%s" to device "%s"?
SM_BRIDGE_DELETE_OK The Local Bridge has been deleted.
SM_BRIDGE_INTEL While in the condition that occurs immediately after a new bridge connection is made when bridging to a physical network adapter, depending on the type of network adapter, there are cases where it will not be possible to communicate using TCP/IP to the network adapter using a bridge connection from a computer on the virtual network. \r\n(This phenomenon is known to occur for Intel and Broadcom network adapters.) \r\n\r\n\r\nIf this issue arises, remedy the situation by restarting the computer on which VPN Server / Bridge is running. Normal communication will be possible after the computer has restarted. \r\n\r\n\r\nAlso many wireless network adapters will not respond to the sending of packets in promiscuous mode and when this occurs you will be unable to use the Local Bridge. If this issue arises, try using a regular wired network adapter instead of the wireless network adapter.
SM_BRIDGE_VPN You are attempting to make a Local Bridge to "%S".\r\n\r\nA Local Bridge is made between a Virtual Hub and a physical network adapter in usual usage. It is unusual to make a Local Bridge to a Virtual Network Adapter.\r\nPlease make sure that it is your intention.\r\n\r\nDo you really want to continue?
SM_BRIDGE_INFO_1 Select the Ethernet device (network adapter) for the bridge destination.
SM_BRIDGE_INFO_2 Enter a name of the new tap device to create.
SM_CONFIG_SAVED The configuration file has been saved.
SM_CONFIG_SAVE_FAILED Failed to save the configuration file.
SM_CONFIG_OPEN_FAILED Unable to open the specified file.
SM_CONFIG_CONFIRM This will apply the specified configuration file to the VPN Server. The VPN Server will automatically restart and it will start loading the new configuration file. The users who are currently connected to the VPN Server will be disconnected. This management session will also be disconnected, you will be needing to reconnect to the server. \r\n\r\nDo you want to proceed?
SM_CONFIG_WRITE_OK The configuration file on the server side has been overwritten.
SM_AO_COLUMN_1 Item
SM_AO_COLUMN_2 Value
SM_TRUE_OR_FALSE Set either 0 (false) or 1 (true) for this item.
SM_AO_SET_OK The Virtual Hub Administration Option has been set.
SM_EXT_OPTION_SET_OK The Virtual Hub Extended Option has been set.
SM_PASSWORD_MSG Currently an administrator password has not been set for this VPN Server. It is recommended that a password is set. \r\n\r\nDo you want to set a server administrator password?
SM_L3_SW_COLUMN1 Layer 3 Switch Name
SM_L3_SW_COLUMN2 Running Status
SM_L3_SW_COLUMN3 Interfaces
SM_L3_SW_COLUMN4 Routing Tables
SM_L3_SW_ST_F_F Stop
SM_L3_SW_ST_T_F Start (Error)
SM_L3_SW_ST_T_T Start (Running)
SM_L3_SW_DEL_MSG This will delete the Virtual Layer 3 Switch "%S". \r\nDo you really want to do this?
SM_L3_SW_IF_COLUMN1 IP Address
SM_L3_SW_IF_COLUMN2 Subnet Mask
SM_L3_SW_IF_COLUMN3 Virtual Hub Name
SM_L3_SW_TABLE_COLUMN1 Network Address
SM_L3_SW_TABLE_COLUMN2 Subnet Mask
SM_L3_SW_TABLE_COLUMN3 Gateway Address
SM_L3_SW_TABLE_COLUMN4 Metric
SM_SECURE_NAT_MSG Are you sure you want to enable the SecureNAT?\r\n\r\nIf you enable the SecureNAT, a virtual router with virtual NAT function will be created that has one IP address in the Virtual Hub. This Virtual Router will interact as one computer or router with other computers that are connected to the virtual network. \r\n\r\nThe SecureNAT in the Virtual NAT enables any computers connected to the Virtual Hub to establish communication with an external network via the SecureNAT. \r\nTherefore, when SecureNAT is running on this VPN Server, there is no need to use local VPN Client to connect the self-computer's Virtual Hub.\r\n\r\n\r\nAlso, please take care about that if there is already a DHCP server in a location that can be reached from a Virtual Hub Layer 2 segment, disable the DHCP server function by clicking the SecureNAT Configuration, otherwise there will be a DHCP conflict. \r\n\r\nMoreover, you can disable the NAT function and only use the DHCP server if you wish.
SM_CRL_COLUMN_1 Certificate Summary
SM_CRL_DELETE_MSG This will delete the selected item. Do you really want to do this?
SM_CRL_EMPTY_MSG No items have been selected. \r\nIf you add this certificate revocation entry, all certificates will be judged as invalid and all client connections that are made in certificate authentication mode will be refused. \r\n\r\nDo you really want to do this?
SM_AC_COLUMN_1 ID
SM_AC_COLUMN_2 Priority
SM_AC_COLUMN_3 Action
SM_AC_COLUMN_4 Contents
SM_AC_PASS Pass
SM_AC_DENY Deny
SM_LOG_FILE_COLUMN_1 Log File Name
SM_LOG_FILE_COLUMN_2 File Size
SM_LOG_FILE_COLUMN_3 Updated on
SM_LOG_FILE_COLUMN_4 Location
SM_READ_LOG_FILE_INFO_1 Please wait until processing is finished...
SM_READ_LOG_FILE_INFO_2 %S in process, %S has finished...
SM_READ_LOG_FILE_ERROR Failed to download file
SM_READ_SAVE_DLG_TITLE Specify a File Name for the Log File's Save Destination
SM_READ_SAVE_DLG_FILTER Log Files (*.LOG)|*.log|All Files (*.*)|*.*
SM_READ_SAVE_FAILED Failed to save the log file.
SM_READ_SAVE_TMP_FAILED Unable to write to temporary file "%S".
SM_READ_SAVE_OPEN_ERROR Unable to open temporary file "%S". \r\n\r\nIt is possible that the .LOG file extension is not an assigned file type in Windows.
SM_LICENSE_COLUMN_1 Number
SM_LICENSE_COLUMN_2 License Key
SM_LICENSE_COLUMN_3 License Type Name
SM_LICENSE_COLUMN_4 Status
SM_LICENSE_COLUMN_5 Expiration Date
SM_LICENSE_COLUMN_6 License ID
SM_LICENSE_COLUMN_7 License Type ID
SM_LICENSE_COLUMN_8 Server ID
SM_LICENSE_COLUMN_9 Serial ID
SM_LICENSE_INFINITE Infinite
SM_LICENSE_NO_EXPIRES No Expiration
SM_LICENSE_STATUS_EDITION Product Edition
SM_LICENSE_STATUS_RELEASE Release Date of VPN Server
SM_LICENSE_STATUS_SYSTEM_ID Current Server ID
SM_LICENSE_STATUS_EXPIRES Expiration of Current Product License
SM_LICENSE_STATUS_SUBSCRIPTION Status of Subscription Contract
SM_LICENSE_STATUS_SUBSCRIPTION_NONEED No Need (This Edition requires no subscription keys)
SM_LICENSE_STATUS_SUBSCRIPTION_NONE No Keys (Adding a subscription key is required)
SM_LICENSE_STATUS_SUBSCRIPTION_VALID Subscription is Active [Until %s]
SM_LICENSE_STATUS_SUBSCRIPTION_EXPIRED Subscription is Expired [at %s]
SM_LICENSE_STATUS_SUBSCRIPTION_BUILD Version Allowed by Current Contract
SM_LICENSE_STATUS_SUBSCRIPTION_BUILD_STR Free Upgrade to Any Future Versions Released Until %s is Allowed
SM_LICENSE_STATUS_ENTERPRISE Enterprise Functions Availability
SM_LICENSE_STATUS_ENTERPRISE_YES Yes (Available)
SM_LICENSE_STATUS_ENTERPRISE_NO No (Unavailable)
SM_LICENSE_NUM_USER Allowed User Objects to Create
SM_LICENSE_NUM_CLIENT Allowed Concurrent Clients
SM_LICENSE_NUM_BRIDGE Allowed Concurrent Bridges
SM_NO_LICENSE_COLUMN Caution:
SM_NO_LICENSE Because there are no product licenses registered, this VPN Server's communication function doesn't operate.
SM_LICENSE_DELETE_MSG Are you sure you want to delete the selected license from the VPN Server?
SM_SYSLOG_0 Disable Syslog Send Function
SM_SYSLOG_1 Send Server Logs by Syslog
SM_SYSLOG_2 Send Server and Virtual Hub Security Logs by Syslog
SM_SYSLOG_3 Send Server, Virtual Hub Security, and Packet Logs by Syslog
SM_SETUP_INFO_1 Click Next to start Setup. Click Close if you want to exit the setup and manually configure all settings.
SM_SETUP_INFO_2 Click Close to configuring the settings of a VPN server manually by yourself.
SM_SETUP_BRIDGE_ONLY You are currently connected to VPN Bridge. You can only create VPN Bridge at Each Site for Multi-site VPN.
SM_SETUP_BRIDGE_EDGE VPN Bridge at &Each Site
SM_SETUP_WARNING The current settings of this VPN Server or VPN Bridge will be initialized. \r\nDo you really want to do this?
SM_SETUP_SELECT Select the Ethernet device to establish the bridge connection.
SM_SETUP_NO_LICENSE_KEY Currently there is no licenses registered for this SoftEther VPN Server. \r\n\r\nFor SoftEther VPN Server to operate as a VPN server, you must enter a license key. \r\nDo you want to display the License Manager?\r\n\r\n(To use the VPN Server as a Trial Version, you have to obtain a trial key from the SoftEther VPN Project web site.\r\nClick Yes and click Obtain or Extend of License button to obtain a trial key.
SM_HUBEXT_OPTION_TITLE Virtual Hub Extended Options
SM_HUBEXT_OPTION_STATIC1 Virtual Hub Extended Options allows you to configure more detailed parameters of this Virtual Hub.
SM_HUBEXT_OPTION_STATIC2 By default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options.\nHowever, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options. (View only.)
SM_VLAN_COLUMN_0 Network Adapter Name
SM_VLAN_COLUMN_1 Driver Type
SM_VLAN_COLUMN_2 Driver File Name
SM_VLAN_COLUMN_3 VLAN Transparency Setting
SM_VLAN_COLUMN_4 GUID
SM_VLAN_COLUMN_5 Device Instance ID
SM_VLAN_YES Enabled
SM_VLAN_NO Not Enabled
SM_VLAN_MSG_1 The Windows Registry has been configured to allow the network adapter "%S" to transmit / receive tagged-VLAN packets.\r\n\r\nHowever, there are some network adapters which requires additional settings on the property of the Device Manager on the local computer's Windows to set the parameters to enable Jumbo Frames. (Ethernet frames which are larger than 1,512 bytes.) Unless you enable Jumbo Frames, some large VLAN packets will be dropped. In the case if large VLAN packets always disappeared, please enable Jumbo Frames. (For example, set the maximum size to 4,088 bytes.) The Device Manager in Windows will help you to configure.\r\n\r\nThis VLAN Transparency Setting has been written to the Windows Registry, however it is not guaranteed that VLAN packets can be transmitted effectively.\r\nIf transmitting VLAN tagged packets will fail after this configuration, refer the manual of the network adapter "%S" to configure manually and adequately. Moreover, "%S" might not support the VLAN transparency setting. In that case, such a network adapter cannot be used to transmit VLAN frames. Use other products.\r\n\r\nTo apply this setting, Windows which runs VPN Server must be rebooted. Do not forget to reboot it.
SM_VLAN_MSG_2 The Windows Registry parameters which was enabling the VLAN transparency features on the network adapter "%S" are deleted from the Registry.\r\n\r\nIf you did a Jumbo Frame enable settings last time, undo such changes manually.\r\n\r\nTo apply this setting, Windows which runs VPN Server must be rebooted. Do not forget to reboot it.
SM_VLAN_NOTHING There are no network adapters which VLAN Transparency Setting Tool supports on the computer "%S".\r\n\r\nHowever, some network adapters are capable to transmit VLAN tagged packets by default, or can be configured to perform VLAN tagged packets by specific configuration utility provided by the vendor.\r\nBy using such network adapters, you have to configure such settings by yourself manually.
SM_SERVER_ADMIN_MSG VPN Server / Bridge "%S"
SM_ETHERIP_COLUMN_0 ISAKMP Phase 1 ID
SM_ETHERIP_COLUMN_1 Virtual Hub Name
SM_ETHERIP_COLUMN_2 User Name
SM_ETHERIP_ADD_OK A new EtherIP / L2TPv3 client setting has been registered.
SM_IPSEC_SETUP_QUESTION This VPN Server has a function to accept IPsec / L2TP / EtherIP / L2TPv3 compatible VPN clients or VPN router products.\r\n\r\nYou can allow the VPN Server to accept connections from smartphones such as iPhone, iPad, Android, or standard VPN client functions on Mac OS X or Windows.\r\n\r\nDo you want to set up the IPsec?\r\n(IPsec settings can be configured by clicking "IPsec / L2TP Settings" button any time later.)
SM_OPENVPN_CONFIG_SAVE_OK The ZIP file '%s' which contains the setting files for OpenVPN.\r\n\r\nOpen this ZIP file to extract sample configuration files for OpenVPN which can be used immediately and easily.\r\nYou might be required to revise the configuration file a little.\r\n\r\nFor details please read the 'readme.txt' file in the ZIP file.\r\n\r\nDo you want to open this ZIP file now?
SM_OPENVPN_CONFIG_SAVE_NG Failed to save the ZIP file '%s'.
SM_OPENVPN_CONFIG_OPEN_NG Failed to open the ZIP file '%s'. Please open this file manually.
SM_DDNS_IPV4_ERROR Unable to reach the IPv4 DDNS Server.
SM_DDNS_IPV6_ERROR Unable to reach the IPv6 DDNS Server.
SM_DDNS_FQDN_EMPTY (None)
SM_DDNS_OK_MSG The Dynamic DNS hostname: %S%S\r\n\r\nYou can access to the below IP address by specifying the above DNS hostname.\r\n\r\nIPv4 Address: %s\r\nIPv6 Address: %s\r\n\r\nYou can also specify the following special forms of hostnames to specify IPv4 or IPv6 as the address-type explicitly.\r\n\r\nHostname for IPv4: %S.v4%S\r\nHostname for IPv6: %S.v6%S\r\n
SM_DDNS_OK_TITLE Dynamic DNS Function
SM_DDNS_OK_MSG2 The Dynamic DNS hostname has been changed to '%S'.\r\n\r\nClick Hint to read additional information.
SM_DDNS_KEY_TITLE Dynamic DNS Key
SM_DDNS_KEY_MSG Your Dynamic DNS Private Key: %s\r\n\r\nThis is the private key which is associated with your current DDNS name. If your VPN Server PC damaged and lost the key, the current DDNS name will be occupied forever and other VPN Server will not be able to use the same name.\r\nIf you want to continue to use the same name, keep the key on a safe place, such as an Internet storage, an another PC or a notepad.\r\nWhen applying the key to the new VPN Server, edit the configuration file of the VPN Server to replace the key by the string in the value following to "byte Key" in the "declare DDnsClient" directive.\r\nDo not use the duplicated key to two or more VPN Servers at the same time.
SM_DDNS_KEY_ERR Failed to read the DNS key.
SM_IPSEC_PSK_TOO_LONG The pre-shared key (PSK) has 10 or more letters.\r\n\r\nIt is reported that several versions of Google Android has a serious bug with 10 or more letters pre-shared key.\r\nTherefore 9 or less letters are recommended for pre-shared key.\r\n\r\nDo you want to try another pre-shared key?
SM_ADVANCED_REDIRECT_URL_HINT_TITLE How to Use Advanced HTTP Redirection Function
SM_ADVANCED_REDIRECT_URL_HINT Advanced HTTP Redirection (For Experts)\r\n\r\nThe string "<INFO>" is a place holder. It can embedded on the URL of redirection.\r\n\r\nEmbedded URL Example:\r\nhttp://www.google.com/search?q=<INFO>|secret\r\n\r\nWhen the client is being redirected, the actual destination URL of redirection will be replaced as follows.\r\n\r\nUsername|Session ID|IP Address|Date and Time|Hash Value\r\n\r\\nAfter Replacement Example: zurukko|SID-ZURUKKO-123|219.117.219.154|20131117100354|99707160AFE7A454042B2C47B064112D652452D7\r\n\r\nThe details of each fields are described as following.\r\n\r\nUsername: The username using for the current VPN Session will be placed.\r\n\r\nSession ID: The Session ID of the VPN Session will be placed.\r\n\r\nDate and Time: 14-digits will be placed as 'YYYYMMDDHHMMSS' format (Time zone is UTC).\r\n\r\nHash Value: A 40-characters hexadecimal strings which represent 20 bytes binary data. The binary data is the result of SHA-1 hash function to the temporary string. The temporary string is the combination of the bit-array of the above fields plus the secret string after the '|' symbol in the redirection URL. (In the above example, "secret" is the secret string.) If there are no '|' symbols in the URL, no hash value will be appended.\r\n\r\nThe Purpose of Hash Value: The secret string is effective as the secret key. Thanks to the secret key, the CGI program which receives the query strings on the redirected URL can verify the integrity of the parameters included in the URL.\r\n
SM_ADVANCED_REDIRECT_URL_MSG An URL must start with "http://" or "https://"
SM_DISABLE_DDNS_HINT_CAPTION Disable Dynamic DNS Function
SM_DISABLE_DDNS_HINT To disable the Dynamic DNS Function, modify the configuration file of VPN Server.\r\n\r\nThe "declare root" directive has the "declare DDnsClient" directive. In this directive, you can switch "bool Disable" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled.\r\n
SM_REGENERATE_CERT_MSG The certificate of VPN Server is being replaced to the new one.\r\n\r\nThis will affect all VPN Clients which are configured to verify the certificate of VPN Server.\r\nDo you want to continue?
SM_DDNS_SERVER_CERT_MSG The DDNS hostname has been changed to "%S".\r\n\r\nIf you are planning to use Microsoft SSTP VPN to connect to the VPN Server from Windows Vista or greater versions of Windows with specifying the DDNS hostname as the destination of VPN Server, the destination hostname of the VPN Server must exactly match to the CN (Common Name) field on the certificate of VPN Server due to the security.\r\n\r\nDo you want to regenerate the server certificate in order to match the CN value to "%S"?\r\n(Click No to keep using the current server certificate.)
SM_DDNS_SERVER_CERT_OK The SSL certificate of VPN Server is now regenerated.\r\n\r\nWhen you make Microsoft SSTP VPN client connects to the VPN Server, you should specify the current DDNS hostname "%S" as the destination server hostname.\r\nYou have to also prepare the "Trusted Root Certificates" list on the Windows to add the certificate of this VPN Server beforehand.\r\n(To install a root certificate to Windows, open MMC and navigate to "Local Computer" in the "Certificates" applet. After that, you can import a certificate into the trusted root certification list.\r\n For details refer Microsoft's documents.)\r\n\r\nDo you want to save the new SSL certificate as a file in the X.509 format?
SM_SETUP_STEP_SECURENAT This VPN Server / Bridge might be running as user-more, or by other limitations, the Virtual Hub and a physical network adapter cannot be bridged together. Instead, the SecureNAT function allows VPN Clients to communicate with other computers in the physical network. The SecureNAT function was enabled by default. You can configure or disable it.
SM_SETUP_STEP_SECURENAT_TITLE Step 3. Bridge Virtual Hub and Physical Network
SM_UPDATE_CHECK_TITLE_VPNSERVER %S VPN Server (on the host '%S')
SM_UPDATE_CHECK_TITLE_VPNBRIDGE %S VPN Bridge (on the host '%S')
SM_FACTORY_DEFAULT_WARNING This will perform a factory-reset on the VPN Server / Bridge.\r\nThe current configuration of VPN Server / Bridge will be erased, and the initial settings will be applied immediately.\r\nYou are recommended to make a backup copy of the current configuration before do a factory-reset.\r\n\r\nPress OK to perform a factory-reset. The VPN Server / Bridge will be rebooted. The current management connection will be disconnected, so please re-connect to the VPN Server / Bridge.\r\n\r\nPress Cancel to cancel the operation.
SM_FACTORY_DEFAULT_PERFORMED The factory-reset operation is performing on the server.\r\n\r\nPress OK to exit the current session of VPN Server Manager.\r\nAfter exiting, please re-start the VPN Server Manager and connect to the VPN Server again.\r\nThen you will see the VPN Server is reset.
SM_AZURE_STATUS_CONNECTED Status: Connected
SM_AZURE_STATUS_NOT_CONNECTED Status: Not Connected
SM_NO_BRIDGE_NICS No physical network adapters suitable for Local Bridge were found on the VPN server computer.\r\nIn order to create a Local Bridge, you have to install at least one physical network adapters on the computer.\r\nYou cannot use Wi-Fi adapters or 3G adapters for Local Bridge.\r\nPlease install a physical network adapter which is compatible to wired Ethernet.\r\n\r\nIf a recently-installed network adapter doesn't appear, once reboot the computer.\r\n\r\nIf the Local Bridge cannot be used anyway, you can use "SecureNAT Function" instead.\r\n\r\nIf you have a certain reason to use unusual network adapters (i.e. Wi-Fi adapters, 3G adapters or virtual adapters), set the "ShowAllInterfaces" variable on the "LocalBridgeList" directive to "true" and restart the VPN Server. Then such devices will appear on the list. (For advanced Windows users only.)\r\n\r\nIf this error occurs after you upgraded Windows, please re-install SoftEther VPN Server or SoftEther VPN Bridge>
SM_CERT_MESSAGE The current SSL self-signed root certificate on this VPN Server is in the old format.\r\n\r\nSome versions of OpenVPN Connect for Android have a bug to misinterpret SSL certificates in the old format. It might cause the connection problem from OpenVPN Connect for Android to this VPN Server.\r\n\r\nIf you are planning to use OpenVPN Connect for Android as a VPN client, it is recommended to regenerate the SSL server certificate.\r\n\r\nDo you want to regenerate the server certificate now?
SM_CERT_MESSAGE_CLI --- Caution ---\r\n\r\nThe current SSL self-signed root certificate on this VPN Server is in the old format.\r\n\r\nSome versions of OpenVPN Connect for Android have a bug to misinterpret SSL certificates in the old format. It might cause the connection problem from OpenVPN Connect for Android to this VPN Server.\r\n\r\nIf you are planning to use OpenVPN Connect for Android as a VPN client, it is recommended to regenerate the SSL server certificate.\r\n\r\nTo regenerate and update the server certificate, execute the "ServerCertRegenerate" command after updating the VPN Server to the latest version.
SM_CERT_NEED_ROOT The specified SSL certificate is a sub-certificate which was issued by a CA (Certificate Authority).\r\n\r\nIf you are planning to support either Microsoft SSTP or OpenVPN protocol on this VPN server, you have to install the root certificate and all intermediate certificates (if exists) on this VPN Server.\r\n\r\nTo install these certificates, copy the root certificate and all intermediate certificate files (in the X.509 format) into the "chain_certs" subdirectory on the directory which is VPN Server has been installed on.\r\n\r\nIf you don't know how to obtain root and intermediate certificate files for your certificate authority (CA), please refer to the CA's web site or contact technical support staffs of the CA.
# Concerning User-mode Router Administration Tools
NM_TITLE deleted
NM_CONNECT_TITLE deleted
NM_STATUS_TAG Connection status: %s
NM_OFFLINE You are not connected to any VPN Servers.
NM_CONNECTING Connecting to VPN Server
NM_CONNECTED Connected to VPN Server "%S"
NM_CONNECT_ERROR Error number %u (%s)
NM_ACCOUNT_TITLE deleted
NM_STATUS User-mode Router Status
NM_STATUS_CONNECT Connection Status
NM_STATUS_TCP NAT TCP/IP Sessions
NM_STATUS_UDP NAT UDP/IP Sessions
NM_STATUS_ICMP NAT ICMP Sessions
NM_STATUS_DNS NAT DNS Sessions
NM_STATUS_DHCP Allocated DHCP Clients
NM_INFO User-mode Router information
NM_INFO_PRODUCT_NAME Product Name
NM_INFO_VERSION_STR Version information
NM_INFO_BUILD_INFO Build information
NM_INFO_HOSTNAME Host name
NM_NAT_ID ID
NM_NAT_PROTOCOL Protocol
NM_NAT_SRC_HOST Source Host
NM_NAT_SRC_PORT Source Port
NM_NAT_DST_HOST Destination Host
NM_NAT_DST_PORT Destination Port
NM_NAT_CREATED Session Created On
NM_NAT_LAST_COMM Last Communication Time
NM_NAT_SIZE Receive / Send Size
NM_NAT_TCP_STATUS TCP Connection Status
NM_NAT_PROTO_TCP TCP/IP
NM_NAT_PROTO_UDP UDP/IP
NM_NAT_PROTO_DNS DNS
NM_NAT_PROTO_ICMP ICMP
NAT_TCP_CONNECTING Connecting
NAT_TCP_SEND_RESET Disconnecting
NAT_TCP_CONNECTED Connected
NAT_TCP_ESTABLISHED Running
NAT_TCP_WAIT_DISCONNECT Disconnecting
DHCP_DHCP_ID ID
DHCP_LEASED_TIME Leased at
DHCP_EXPIRE_TIME Expires at
DHCP_MAC_ADDRESS MAC Address
DHCP_IP_ADDRESS Allocated IP
DHCP_HOSTNAME Client Host Name
NM_PASSWORD_MSG The administration password has been set.
NM_PUSH_ROUTE_WARNING The specified text of the static routing table may have a syntax error.
# Concerning version information
ABOUT_CAPTION About %s
BETA_EXPIRES Because the currently installed SoftEther VPN software is a beta version, you cannot use it after the provision of a newer beta version of full version. \r\nAccess http://selinks.org/ and get the latest version of SoftEther VPN software.
# Concerning the saving of logs
# (Common log)
L_YES Yes
L_NO No
L_LINE ------------------------------------------------------
# (Server log)
LS_START_UTF8 Log Messages are written with UTF-8 Encoding Format.
LS_START_1 The SoftEther VPN Server has been started.
LS_START_2 %S %S
LS_START_3 %S
LS_END_1 The SoftEther VPN Server Engine has been successfully shutdown.
LS_END_2 The Server Engine shutdown processing has started.
LS_STOP_ALL_LISTENER All TCP listeners will be stopped.
LS_STOP_ALL_LISTENER_2 All TCP listeners have been stopped.
LS_STOP_ALL_HUB Stopping all Virtual Hubs.
LS_STOP_ALL_HUB_2 All Virtual Hubs have been stopped.
LS_STOP_CEDAR Shutting down the Cedar communication module.
LS_STOP_CEDAR_2 The Cedar communication module has been shut down.
LS_STOP_FARM_MEMBER Disconnecting connection to the cluster controller.
LS_STOP_FARM_MEMBER_2 Connection with the cluster controller has been disconnected.
LS_STOP_FARM_CONTROL Cluster controller is stopping.
LS_STOP_FARM_CONTROL_2 Cluster controller has stopped.
LS_ENUM_ETHERNET_1 Ethernet device has been enumerated.
LS_ENUM_ETHERNET_2 Device %u: "%S"
LS_LOAD_CONFIG_1 Loading the configuration file.
LS_LOAD_CONFIG_2 The configuration file has been loaded.
LS_LOAD_CONFIG_3 Configuration file does not exist. Attempting to start using initial settings.
LS_INIT_SAVE_THREAD Starting the automatically saving background task. The interval between auto-saves is %u seconds. You can change the interval by changing the parameter AutoSaveConfigSpan in the configuration file.
LS_BAD_CONFIG The contents of the configuration file is invalid. The loading process has been terminated.
LS_LISTENER_START_1 TCP Listener (port %u) is starting.
LS_LISTENER_START_2 TCP Listener (port %u) has started. Now listening for connection from client.
LS_LISTENER_START_3 Unable to set port to Listen status for TCP Listener (port %u). Attempting at fixed intervals until successful.
LS_LISTENER_ACCEPT On the TCP Listener (Port %u), a Client (IP address %S, Host name "%S", Port number %u) has connected.
LS_LISTENER_DISCONNECT The connection with the client (IP address %S, Port number %u) has been disconnected.
LS_LISTENER_DOS A DoS attack on the TCP Listener (port %u) has been detected. The connecting source IP address is %S, port number is %u. This connection will be forcefully disconnected now.
LS_LISTENER_MAXUEC The TCP listener is temporary suspending to accept new inward connections because of the number of pending TCP connections exceeded %u. (Current value = %u)
LS_LISTENER_STOP_1 TCP Listener (port %u) is stopping.
LS_LISTENER_STOP_2 TCP Listener (port %u) has stopped.
LS_HUB_START Virtual Hub "%S" has been started.
LS_HUB_STOP Virtual Hub "%S" has been stopped.
LS_HUB_MAC The MAC address of Virtual Hub "%S" is "%S".
LS_NODE_INFO_TAG Client product name: "%S", Client version: %u, Client build number: %u, Server product name: "%S", Server version: %u, Server build number: %u, Client OS name: "%S", Client OS version: "%S", Client product ID: "%S", Client host name: "%S", Client IP address: "%S", Client port number: %u, Server host name: "%S", Server IP address: "%S", Server port number: %u, Proxy host name: "%S", Proxy IP address: "%S", Proxy port number: %u, Virtual Hub name: "%S", Client unique ID: "%S"
LS_CONNECTION_START_1 For the client (IP address: %S, host name: "%S", port number: %u), connection "%S" has been created.
LS_CONNECTION_END_1 Connection "%S" has been terminated.
LS_SSL_START SSL communication for connection "%S" has been started. The encryption algorithm name is "%S".
LS_CONNECTION_ERROR Connection "%S" terminated by the cause "%s" (code %u).
LS_FARMMEMBER_NOT_ADMIN Connection "%S": Although the server is a cluster member, the client attempted that to directly connect to the Virtual Hub "%S" while not being administrator user "%S". The user name provided by the client is "%S". Access is refused.
LS_HUB_NOT_FOUND Connection "%S": Virtual Hub "%S" that the client is trying to connect to does not exist on the server.
LS_IP_DENIED Connection "%S": The source IP address "%S" of the client has refused based on the Source IP Address Limit List defined for the Virtual Hub.
LS_LICENSE_ERROR Connection "%S": Because a license-related error has been occurred, the client is unable to connect to the server.
LS_BETA_EXPIRES This beta version of SoftEther VPN Server is expired. The beta version period of use has expired. Download a new beta version or full version from http://selinks.org/.
LS_TICKET_1 A new client authentication ticket has been issued for cluster member "%S". Virtual Hub "%S", User name "%S" ("%S"), Session name "%S", Ticket "%S"
LS_TICKET_2 A new client authentication ticket has been received from the cluster controller. Virtual Hub "%S", User name "%S" ("%S"), Session name "%S", Ticket "%S", Expiration %u seconds
LS_ENUM_HUB Connection "%S": %u Virtual Hub servers have been enumerated on this server.
LS_FARM_ACCEPT_1 Connection "%S": Although this server received a cluster control connection request, this server is not a cluster controller.
LS_FARM_ACCEPT_2 Connection "%S":Although this server received a cluster control connection request, the authentication password is incorrect and connection has been refused.
LS_FARM_ACCEPT_3 Connection "%S": This server received a cluster control connection request. Authentication has been successful.
LS_FARM_SERV_START Connection with a cluster member has been established. IP address: %S, Host name: "%S"
LS_FARM_SERV_END Connection with cluster member "%S" has been deleted.
LS_FARM_CONNECT_1 Connection to cluster controller "%S" has started.
LS_FARM_CONNECT_2 Connection to cluster controller "%S" has been refused. Error: %s (code %u)
LS_FARM_CONNECT_3 TCP connection to cluster controller "%S" failed. Continuing to attempt connection in intervals of %u seconds until connection is successful.
LS_FARM_DISCONNECT Connection to the cluster controller has stopped.
LS_FARM_START Connected to cluster controller. Operation as cluster member is starting.
LS_LICENSE_NOT_VPNSERVER Connection "%S": License error occurred. The VPN Client attempted to connect while the VPN Server product license is not yet registered.
LS_LICENSE_NOT_VPNCLUSTER Connection "%S": License error occurred. The license registered on this VPN Server is of a type that prevents the use of the current clustering function and a VPN Client has attempted connection while operating in Cluster mode. You must restart the VPN Server.
LS_LICENSE_VIOLATION Connection "%S": A license violation has occurred on the VPN Server and connections are not being received.
LS_LICENSE_VIOLATION_DETECTED A license violation has been detected. A different VPN Server is operating with the same server ID "%I64u" as this VPN Server. It is possible that there are two or more VPN Servers in the cluster that are using the same license. Check the license information of each VPN Server.
# (OpenVPN Logs)
LO_PREFIX_RAW OpenVPN Module:
LO_PREFIX_SESSION OpenVPN Session %u (%r:%u -> %r:%u):
LO_PREFIX_CHANNEL OpenVPN Session %u (%r:%u -> %r:%u) Channel %u:
LO_NEW_CHANNEL A new channel is created.
LO_CHANNEL_ESTABLISHED_NEWKEY The channel is established. (Trigger: Re-key completion.)
LO_OPTION_STR_RECV Option Strings Received: "%S"
LO_OPTION_STR_SEND Option Strings to Send: "%S"
LO_NEW_SESSION A new session is created. Protocol: %S
LO_INITIATE_REKEY The re-keying process is started.
LO_CHANNEL_ESTABLISHED The channel becomes the established state.
LO_PUSH_REPLY The full strings replied: "%S"
LO_CHANNEL_FAILED Failed to connect a channel.
LO_CHANNEL_DISCONNECTED_BY_HUB This OpenVPN channel is being terminated because the administrator of the Virtual Hub has disconnected this the VPN Session.
LO_DELETE_SESSION Deleting the session.
LO_START The OpenVPN Server Module is starting.
LO_STOP The OpenVPN Server Module is stopped.
# (IPsec Logs)
LI_PREFIX_RAW IPsec Module:
LI_PREFIX_CLIENT IPsec Client %u (%S:%u -> %S:%u):
LI_PREFIX_IKE IPsec IKE Session (IKE SA) %u (Client: %u) (%S:%u -> %S:%u):
LI_PREFIX_IPSEC IPsec ESP Session (IPsec SA) %u (Client: %u) (%S:%u -> %S:%u):
LI_START The IPsec ver 2.0 (ISAKMP/IKEv1) processing module is started.
LI_STOPPING The IPsec ver 2.0 (ISAKMP/IKEv1) processing module is now terminating...
LI_STOP The IPsec ver 2.0 (ISAKMP/IKEv1) processing module is terminated.
LI_NUM_IPSEC_SA The number of still-alive IPsec SAs was %u.
LI_NUM_IKE_SA The number of still-alive IKE SAs was %u.
LI_NUM_IKE_CLIENTS The number of still-alive IPsec Clients was %u.
LI_L2TP_SERVER_STARTED The L2TP Server Module is started.
LI_ETHERIP_SERVER_STARTED The EtherIP Server Module is started. The Session ID of the EtherIP Session: %u
LI_DELETE_IKE_CLIENT This IPsec Client is deleted.
LI_DELETE_IKE_SA This IKE SA is deleted.
LI_DELETE_IPSEC_SA This IPsec SA is deleted.
LI_START_QM_FROM_SERVER The server initiates a QuickMode negotiation.
LI_START_QM_FROM_CLIENT The client initiates a QuickMode negotiation.
LI_QM_DH_ERROR Failed to calculate a Diffie-Hellman algorithm.
LI_NEW_IKE_CLIENT A new IPsec client is created.
LI_NEW_IKE_SA A new IKE SA (%s) is created. Initiator Cookie: 0x%I64X, Responder Cookie: 0x%I64X, DH Group: %S, Hash Algorithm: %S, Cipher Algorithm: %S, Cipher Key Size: %u bits, Lifetime: %u Kbytes or %u seconds
LI_TAG_MAINMODE Main Mode
LI_TAG_AGGRESSIVE Aggressive Mode
LI_NEW_IPSEC_SA A new IPsec SA (Direction: %s) is created. SPI: 0x%X, DH Group: %S, Hash Algorithm: %S, Cipher Algorithm: %S, Cipher Key Size: %u bits, Lifetime: %u Kbytes or %u seconds
LI_TAG_SERVER_TO_CLIENT Server -> Client
LI_TAG_CLIENT_TO_SERVER Client -> Server
LI_IPSEC_SA_SPI_SET The SPI which has been pending is now set. New SPI: 0x%X
LI_IPSEC_SA_ESTABLISHED This IPsec SA is established between the server and the client.
LI_IKE_SA_ESTABLISHED This IKE SA is established between the server and the client.
LI_IPSEC_NO_TRANSFORM There are no acceptable transform proposals from the client for establishing an IPsec SA.
LI_IKE_NO_TRANSFORM There are no acceptable transform proposals from the client for establishing an IKE SA.
LI_IKE_NO_NAT_T The connection cannot be accepted because this VPN client is not compatible with IPsec NAT Traversal (RFC 3947 Negotiation of NAT-Traversal in the IKE or draft-ietf-ipsec-nat-t-ike).
LI_SET_CLIENT_ID The client ID which this client presented in the establishing phase is "%S".
LI_CLIENT_MERGE This client (Client %u) and the other client (Client %u) is the same client. So they are merged to the client %u.
LI_CLIENT_UPDATE The port number information of this client is updated.
# (EtherIP Log)
LE_PREFIX EtherIP / L2TPv3 Session %u (%S:%u -> %S:%u):
LE_START_MODULE The EtherIP / L2TPv3 Module is started.
LE_STOP The EtherIP / L2TPv3 Module is stopped.
LE_NO_SETTING Error: No EtherIP / L2TPv3 setting entries for the Client ID "%S" is registered on the VPN Server. Please register an entry of a EtherIP / L2TPv3 setting on the VPN Server beforehand.
LE_START_IPC The internal pipe was created between the EtherIP / L2TPv3 module to the Virtual Hub "%S". The using username is "%S". The IPv4 TCP MSS (Max Segment Size) to be set is %u bytes.
LE_IPC_CONNECT_ERROR The connection from the EtherIP / L2TPv3 module to the Virtual Hub "%S" failed. Error: %u : %s
LE_IPC_CONNECT_OK The connection from the EtherIP / L2TPv3 module to the Virtual Hub "%S" succeeded.
LE_RECONNECT Settings of EtherIP / L2TPv3 has been changed. Internal pipes is now being deleted and auto-reconnecting.
# (PPP Log)
LP_PREFIX %S%SPPP Session [%S:%u]:
LP_CONNECTED A new PPP session (Upper protocol: %S) is started. IP Address of PPP Client: %S (Hostname: "%S"), Port Number of PPP Client: %u, IP Address of PPP Server: %S, Port Number of PPP Server: %u, Client Software Name: "%S", IPv4 TCP MSS (Max Segment Size): %u bytes
LP_DISCONNECTED The PPP session is disconnected.
LP_PAP_REJECTED The client denied to accept the authentication protocol "PAP" (Password Authentication Protocol, a clear-text password authentication protocol). Enable PAP on the client-side and retry.
LP_PAP_MSCHAPV2_REJECTED The client denied to accept both the "PAP" (Password Authentication Protocol, a clear-text password authentication protocol) and MS-CHAP v2 Protocol. Enable either PAP or MS-CHAP v2 on the client-side and retry.
LP_DISCONNECTED_ABNORMAL A PPP protocol error occurred, or the PPP session has been disconnected.
LP_NEXT_PROTOCOL_IS_NOT_PAP An invalid protocol (Protocol Number: 0x%x) with non-PAP (Password Authentication Protocol) control packet.
LP_PAP_FAILED "PAP" (Password Authentication Protocol, a clear-text password authentication protocol) user authentication failed.
LP_MSCHAPV2_FAILED "MS-CHAP v2" (Microsoft Challenge and Response Protocol Version 2.0) user authentication failed.
LP_NEXT_PROTOCOL_IS_NOT_IPCP An invalid protocol (Protocol Number: 0x%x) with non-IPCP (IP Configuration Protocol) control packet.
LP_DATA_TIMEOUT A timeout on the PPP data transmitting occurred. The PPP client might be disconnected from the network.
LP_CONTROL_TIMEOUT A timeout on the PPP control transmitting occurred. No responses from the PPP client.
LP_VPN_SESSION_TERMINATED The PPP session is disconnected because the VPN Session has been disconnected by the administrator.
LP_UPPER_PROTOCOL_DISCONNECTED The PPP session is disconnected because the upper-layer protocol "%S" has been disconnected.
LP_NORMAL_TERMINATE The PPP session is disconnected by the VPN Client's disconnecting request.
LP_IP_ADDRESS_NOT_DETERMIND The VPN Client sent a packet though an IP address of the VPN Client hasn't been determined.
LP_DHCP_REQUEST_TRYING Trying to request an IP address from the DHCP server.
LP_DHCP_REQUEST_OK An IP address is assigned. IP Address of Client: %S, Subnet Mask: %S, Default Gateway: %S, Domain Name: "%S", DNS Server 1: %S, DNS Server 2: %S, WINS Server 1: %S, WINS Server 2: %S, IP Address of DHCP Server: %S, Lease Lifetime: %u seconds
LP_DHCP_REQUEST_NG Acquiring an IP address from the DHCP server failed. To accept a PPP session, you need to have a DHCP server. Make sure that a DHCP server is working normally in the Ethernet segment which the Virtual Hub belongs to. If you do not have a DHCP server, you can use the Virtual DHCP function of the SecureNAT on the Virtual Hub instead.
LP_DHCP_INFORM_TRYING Acquiring the IP networking information such as subnet mask and the default gateway information from the DHCP server.
LP_DHCP_INFORM_OK The networking information has been acquired. Subnet Mask: %S, Default Gateway: %S, Domain Name: "%S", DNS Server 1: %S, DNS Server 2: %S, WINS Server 1: %S, WINS Server 2: %S, IP Address of DHCP Server: %S
LP_DHCP_INFORM_NG Acquiring the networking information from the DHCP server failed. To accept a PPP session, you need to have a DHCP server. Make sure that a DHCP server is working normally in the Ethernet segment which the Virtual Hub belongs to. If you do not have a DHCP server, you can use the Virtual DHCP function of the SecureNAT on the Virtual Hub instead.
LP_SET_IPV4_PARAM The IP address and other network information parameters are set successfully. IP Address of Client: %S, Subnet Mask: %S, Default Gateway: %S, DNS Server 1: %S, DNS Server 2: %S, WINS Server 1: %S, WINS Server 2: %S
# (Virtual Hub log)
LH_ONLINE The Virtual Hub is now online.
LH_OFFLINE The Virtual Hub is now offline.
LH_CONNECT_CLIENT The connection "%S" (IP address: %S, Host name: %S, Port number: %u, Client name: "%S", Version: %S, Build: %u) is attempting to connect to the Virtual Hub. The auth type provided is "%s" and the user name is "%S".
LH_AUTH_UNKNOWN Unknown auth type.
LH_AUTH_ANONYMOUS Anonymous authentication
LH_AUTH_PASSWORD Password authentication
LH_AUTH_PLAIN_PASSWORD External server authentication
LH_AUTH_CERT Certificate authentication
LH_AUTH_TICKET Ticket authentication
LH_AUTH_RADIUS_NOT_SUPPORT Connection "%S": The authentication method of the user "%S" has been specified as RADIUS Authentication or Active Directory Authentication (NT Domain Authentication). However, the edition of the VPN Server is "%S". This edition does not support RADIUS Authentication nor Active Directory Authentication (NT Domain Authentication). The connection will be denied.
LH_AUTH_RADIUS_NOT_SUPPORT_ON_OPEN_SOURCE Connection "%S": The authentication method of the user "%S" has been specified as RADIUS Authentication or Active Directory Authentication (NT Domain Authentication). However, such an external user-authentication function hasn't been implemented on the Open-Source version of SoftEther VPN yet. The connection will be denied.
LH_AUTH_CERT_NOT_SUPPORT_ON_OPEN_SOURCE Connection "%S": The authentication method of the user "%S" has been specified as Certificate Authentication. However, the Certificate Authentication function hasn't been implemented on the Open-Source version of SoftEther VPN yet. The connection will be denied.
LH_AUTH_OK Connection "%S": Successfully authenticated as user "%S".
LH_AUTH_OK_CERT The Virtual Hub's Security Account Manager has received the following certificate from the VPN Client and accepted its contents as the certificate for when user "%S" logs in: %s
LH_AUTH_NG_CERT Although the Virtual Hub's Security Account Manager has received the following certificate, has refused its contents as the certificate for when user "%S" logs in because this certificate's contents matches the contents that are registered in the Virtual Hub's certificates revocation list: %s
LH_AUTH_NG Connection "%S": User authentication failed. The user name that has been provided was "%S".
LH_LOCAL_ONLY Connection "%S": The remote login has been refused because of the password for user "%S" is blank.
LH_POLICY_ACCESS_NG Connection "%S": Access has beens refused to user "%S" based on the security policy.
LH_USER_EXPIRES Connection "%S": Access has been refused to user "%S" because of the expiration date has been expired.
LH_CLIENT_VERSION_OLD Connection "%S": The build number of the VPN Client is %u. Only the build %u or latest version of VPN Client is granted to access the VPN Server.
LH_CLIENT_ID_REQUIRED Connection "%S": The Client ID which has been specified by the VPN Client is %u. However, this Virtual Hub has the RequiredClientId value set to %u.
LH_FARM_SELECT_1 Connection "%S": The cluster controller is deciding the destination cluster member of this client.
LH_FARM_SELECT_2 Connection "%S": Failed to decide the destination cluster member server.
LH_FARM_SELECT_3 Connection "%S": This current VPN Server has been decided as the destination cluster member server. Proceeding to receive connection.
LH_FARM_SELECT_4 Connection "%S": The server "%S" has been decided as a destination cluster member server. Instructing clients to redirect connection to this server.
LH_MAX_SESSION Connection "%S": The maximum number of sessions (%u) that can be set by the Virtual Hub has been reached. Unable to create a new session.
LH_MAX_SESSION_CLIENT Connection "%S": The maximum number of client sessions (%u) that can be set by the Virtual Hub has been reached. Unable to create a new session.
LH_MAX_SESSION_BRIDGE Connection "%S": The maximum number of bridge sessions (%u) that can be set by the Virtual Hub has been reached. Unable to create a new session.
LH_MAX_SESSION_2 Connection "%S": The maximum number of sessions (%u) that can be managed by a VPN Server has been reached. Unable to create a new session.
LH_NEW_SESSION Connection "%S": The new session "%S" has been created. (IP address: %S, Port number: %u, Physical underlying protocol: "%S")
LH_SET_SESSION Session "%S": The parameter has been set. Max number of TCP connections: %u, Use of encryption: %s, Use of compression: %s, Use of Half duplex communication: %s, Timeout: %u seconds.
LH_NODE_INFO Session "%S": VPN Client details: (%s)
LH_VLAN_ID Session "%S": Assigned VLAN ID: %u
LH_INVALID_SIGNATURE Session "%S": The connected client sent invalid protocol data. Unable to establish normal communication with client. First check for problems with the connections and cabling of the network connecting the client and the server and then check there is not a special transparent packet re-writing device installed.
LH_END_SESSION Session "%S": The session has been terminated. The statistical information is as follows: Total outgoing data size: %I64u bytes, Total incoming data size: %I64u bytes.
LH_BCAST_STORM Session "%S": A large volume of broadcast packets has been detected. There are cases where packets are discarded based on the policy. The source MAC address is %S, the source IP address is %S, the destination IP address is %S. The number of broadcast packets is equal to or larger than %u items per 1 second (note this information is the result of mechanical analysis of part of the packets and could be incorrect).
LH_DHCP_FORCE Session "%S": The packet was discarded because it has been attempting to use the IP address %S, which is not a DHCP server allocated IP address.
LH_MAC_LIMIT Session "%S": Although the virtual hub has attempt to assign a new MAC address "%S" was made, %u MAC addresses have already been assigned for this service. According to the security policy, this session is allowed to have a maximum of %u MAC addresses. The packet has been discarded.
LH_BRIDGE_LIMIT Session "%S": Although the virtual hub has attempt to assign a new MAC address "%S" was made, %u MAC addresses have already been assigned for this service. According to the security policy, this session is denied bridges and is therefore allowed to hold no more than %u MAC addresses. The packet has been discarded.
LH_MAC_REGIST Session "%S": A new MAC address "%S" has been assigned.
LH_MAC_REGIST_VLAN Session "%S": A new MAC address "%S" (VLAN ID: %u) has been assigned.
LH_IP_LIMIT Session "%S": Although the virtual hub has attempt to assign a new IP address %S was made, %u IP addresses have already been assigned for this service. According to the security policy, this session is allowed to have a maximum of %u IP addresses. The packet has been discarded.
LH_ROUTING_LIMIT Session "%S": Although the virtual hub has attempt to assign a new IP address %S was made, %u IP addresses have already been assigned for this service. According to the security policy, this session is denied routing and is therefore allowed to hold no more than %u IP addresses. The packet has been discarded.
LH_IP_CONFLICT Session "%S": Although the virtual hub has attempt to use the IP address %S was made, this IP address is already being used by another session "%S" (MAC Address: "%S"). The security policy for this session denies duplication of IP addresses that are used by other sessions. The packet has been discarded. Detailed Information: CreatedTime=%I64u, UpdatedTime=%I64u, DhcpAllocated=%u, Now=%I64u
LH_NO_SERVER Session "%S": Although TCP/IP connection request (from %S:%u to %S:%u) was made to this session, because of the security policy denies operation as a server, the packet has been discarded.
LH_NO_DHCP Session "%S": Although host %S on this session sent a packet that allocates an IP address as a DHCP server for host %S on another session, this session's security policy denies operation as a DHCP server. The packet has been discarded.
LH_REGIST_DHCP Session "%S": The DHCP server of host "%S" (%S) on this session allocated, for host "%S" on another session "%S", the new IP address %S.
LH_BRIDGE_1 Session "%S": A Local Bridge connection to physical Ethernet interface "%S" was started.
LH_BRIDGE_2 Session "%S": Because communication has failed to be established with physical Ethernet interface "%S", the Local Bridge has stopped.
LH_SET_MTU Session "%S": The physical Ethernet interface "%S" has an MTU value set to %u. It is necessary to send and receive an Ethernet packet which has %u bytes. The MTU is now changed to %u.
LH_SET_MTU_ERROR Session "%S": The physical Ethernet interface "%S" has an MTU value set to %u. It is necessary to send and receive an Ethernet packet which has %u bytes. However, changing the MTU to %u failed. This physical Ethernet interface or device driver might be unable to process an Ethernet packet which has more 1,514 bytes (payload size: 1,500 bytes). In such case, the larger tagged-VLAN packets than 1,514 bytes cannot be transmitted. You should replace the current physical Ethernet adapter to another which supports Jumbo Frames. You can also try to update the device driver. Another possible method is to enable Jumbo Frames on the operating system or device driver settings.
LH_START_BRIDGE The Local Bridge connection "%S" has started. The bridge session "%S" was created.
LH_STOP_BRIDGE The Local Bridge connection "%S" has stopped.
LH_LINK_START The Cascade Connection "%s" has been established. The Cascade session "%S" was created.
LH_LINK_STOP The Cascade Connection "%s" has stopped.
LH_NAT_START SecureNAT has started. The SecureNAT session "%S" was created.
LH_NAT_STOP SecureNAT stopped.
LH_NAT_TCP_SUCCEED The connection to TCP session %u: Host "%S (%S)", Port %u was successful.
LH_NAT_TCP_FAILED The connection to TCP session %u: Host "%S", Port %u failed.
LH_NAT_TCP_DELETED The TCP session %u has been deleted.
LH_NAT_TCP_CREATED The TCP session %u has been created. Connection source %S:%u, Connection destination %S:%u
LH_NAT_UDP_DELETED The UDP session %u has been deleted.
LH_NAT_UDP_CREATED The UDP session %u has been created. Connection source %S:%u, Connection destination %S:%u
LH_NAT_DHCP_CREATED The DHCP entry %u has been created. MAC address: %S, IP address: %S, host name: %S, expiration span: %u seconds
LH_CHANGE_PASSWORD_1 The connection "%S" (IP address %S) connected to Virtual Hub in change password mode.
LH_CHANGE_PASSWORD_2 Connection "%S": Changing of password failed. The specified user "%S" does not exist.
LH_CHANGE_PASSWORD_3 Connection "%S": Changing of password failed. The auth type of user "%S" is not password authentication.
LH_CHANGE_PASSWORD_4 Connection "%S": Changing of password failed. The old password of user "%S" is incorrect.
LH_CHANGE_PASSWORD_5 Connection "%S": The password of user "%S" has been changed.
LH_CONNECT_1 Starting Cascade Connection "%s": connection number %u.
LH_CONNECT_2 The Cascade Connection "%s" is connected. Session name: "%S"
LH_CONNECT_ERROR The connection for Cascade Connection "%s" has been either disconnected or it failed. Cause: %s (code %u)
LH_POLICY_MONITOR_MODE Connection "%S": Because of a user whose security policy denies permission for Monitoring Mode requested that Monitoring Mode be enabled and attempted to connect to a Virtual Hub, the connection has been denied.
LH_POLICY_BRIDGE_MODE Connection "%S": Because of a user whose security policy denies both bridge connections and routing operations requested that bridge connections or routing operations be enabled and attempted to connect to the Virtual Hub, the connection has been denied.
LH_NOT_ENOUGH_CLIENT_LICENSE Connection "%S": Although this connection attempted to connect to the VPN Server using "client connection mode", because this would have made the number of client connections on the entire server exceed the number of registered Client Connection Licenses, it is not possible to receive the connection for this connection. When the number of licenses for concurrent connections is insufficient, you must either disconnect another existing client connection or increase the number of licenses. There are currently %u registered Client Connection Licenses and the number of connections to servers was %u.
LH_NOT_ENOUGH_BRIDGE_LICENSE Connection "%S": Although this connection attempted to connect to the VPN Server using "bridge connection mode", because this would have made the number of bridge connections on the entire server exceed the number of registered Bridge Connection Licenses, it is not possible to receive the connection for this connection. When the number of licenses for concurrent connections is insufficient, you must either disconnect another existing client connection or increase the number of licenses. There are currently %u registered Bridge Connection Licenses and the number of connections to servers was %u.
LH_TOO_MANY_MULTILOGINS Connection "%S": Although the user "%S" made a login attempt, the security policy that applies to this user limits the maximum number of multiple logins to %u sessions. Currently the number of logins by this user is %u sessions and therefore the user has denied permission for a new VPN connection.
LH_TOO_MANY_MULTILOGINS2 Connection "%S": Although the user "%S" made a login attempt, this edition of the VPN Server permits the maximum number of multiple concurrent VPN sessions to %u sessions per user. Current number of the multiple concurrent VPN sessions of this users is %u, so no more concurrent VPN sessions cannot be permitted. If you want to support more number of multiple concurrent VPN sessions per user, please consider upgrading to Professional Edition or greater of the VPN Server.
LH_PACKET_LOG_NO_LOG The edition of this VPN Server doesn't supports the packet logging function. No IP address nor TCP/UDP header data will be recorded. After you upgrade the edition of the VPN Server to Professional Edition or greater, all kinds of packet logs will be recorded in this file.
LH_PACKET_LOG_NO_LOG_OSS The VPN Server is either Open-Source or Free version. It hasn't implemented the IP Address or TCP/UDP header data logging function. No IP address nor TCP/UDP header data are not be recorded here.
LH_NO_RADIUS_SETTING The user "%S" is configured to use RADIUS authentication. However, there is no RADIUS authentication settings. The user cannot be authenticated.
LH_KERNEL_MODE_START It has been detected that the Kernel-mode NAT for SecureNAT can be run on the interface "%S". The Kernel-mode NAT is starting. The TCP, UDP and ICMP NAT processings will be performed with high-performance via Kernel-Mode hereafter. The parameters of Kernel-mode NAT: IP Address = "%r", Subnet Mask = "%r", Default Gateway = "%r", Broadcast Address = "%r", Virtual MAC Address: "%S", DHCP Server Address: "%r", DNS Server Address: "%r"
LH_KERNEL_MODE_STOP The Kernel-mode NAT on the interface "%S" for SecureNAT has been stopped.
# (Administration log)
LA_CONNECTED_1 Connection "%S" connected using server admin mode.
LA_CONNECTED_2 Connection "%S" connected using Virtual Hub Admin Mode. The name of the Virtual Hub is "%S".
LA_IP_DENIED Connection "%S" attempted to connect using administration mode from an IP address whose permission is denied by adminip.txt. Disconnecting.
LA_ERROR Connection "%S" was unable to log in using administration mode. %s (Error code %u)
LA_OK Connection "%S" successfully logged in using administration mode.
LA_RPC_START Connection "%S" created a new remote procedure call session "%S" for the purpose of administration mode.
LA_TAG_1 Administration mode [%S]:
LA_TAG_2 Administration mode [%S] (Virtual Hub "%S"):
LA_CREATE_LISTENER A new TCP listener (port number %u) has been created.
LA_DELETE_LISTENER TCP listener (port number %u) has been deleted.
LA_ENABLE_LISTENER TCP listener (port number %u) has been enabled.
LA_DISABLE_LISTENER TCP listener (port number %u) has been disabled.
LA_SET_SERVER_PASSWORD The server administrator password has been set.
LA_SET_FARM_SETTING The clustering setting has been changed.
LA_SET_SERVER_CERT The server certificates have been set.
LA_REGENERATE_SERVER_CERT The server certificate has been re-generated. The new CN: "%S"
LA_SET_SERVER_CIPHER A new encryption algorithm name for the server has been set. The new encryption algorithm name is "%S".
LA_CREATE_HUB A new Virtual Hub "%S" has been created.
LA_SET_HUB The Virtual Hub setting has been changed.
LA_DELETE_HUB The Virtual Hub "%S" has been deleted.
LA_SET_HUB_RADIUS The Virtual Hub's external RADIUS authentication server setting has been changed.
LA_DISCONNECT_CONN The client connection "%S" connected to the server has been forcefully disconnected.
LA_SET_HUB_ONLINE The Virtual Hub is now online.
LA_SET_HUB_OFFLINE The Virtual Hub is now offline.
LA_SET_SNAT_OPTION The SecureNAT option has been set.
LA_ENABLE_SNAT The SecureNAT function has been enabled.
LA_DISABLE_SNAT The SecureNAT function has been disabled.
LA_SET_HUB_LOG The log save setting has been changed.
LA_ADD_CA A registration of trusted root certificate has been added.
LA_DELETE_CA A registration of trusted root certificate has been deleted.
LA_CREATE_LINK The Cascade Connection "%s" has been added.
LA_SET_LINK The setting for Cascade Connection "%s" has been changed.
LA_SET_LINK_ONLINE The Cascade Connection "%s" is now online.
LA_SET_LINK_OFFLINE The Cascade Connection "%s" is now offline.
LA_DELETE_LINK The Cascade Connection "%s" has been deleted.
LA_RENAME_LINK The name of Cascade Connection "%s" has been changed to "%s".
LA_ADD_ACCESS An access list has been added.
LA_DELETE_ACCESS The access list has been deleted.
LA_SET_ACCESS_LIST The access list has been updated. An access list of %u items are set.
LA_SET_AC_LIST The Source IP Address Limit List has been updated. Rule items for %u items are set.
LA_CREATE_USER User "%S" has been created.
LA_SET_USER The setting of user "%S" has been updated.
LA_DELETE_USER User "%S" has been deleted.
LA_CREATE_GROUP Group "%S" has been created.
LA_SET_GROUP The setting of group "%S" has been updated.
LA_DELETE_GROUP Group "%S" has been deleted.
LA_DELETE_SESSION This session "%S" has been forcefully disconnected.
LA_SET_KEEP The server's Internet keep-alive setting has been updated.
LA_SET_SYSLOG The server's syslog send function setting has been updated.
LA_DELETE_BRIDGE The Local Bridge connection definition "%S" --> "%S" has been deleted.
LA_ADD_BRIDGE The Local Bridge connection definition "%S" --> "%S" has been added.
LA_REBOOT_SERVER There has been a request to restart VPN Server.
LA_GET_CONFIG The config file has been read.
LA_SET_CONFIG The config file has been written. Restarting VPN Server.
LA_SET_HUB_ADMIN_OPTION The administration option has been set for Virtual Hub "%S".
LA_SET_HUB_EXT_OPTION The Virtual Hub Extended Option has been set for Virtual Hub "%S".
LA_ADD_L3_SW The Virtual Layer 3 Switch "%S" has been created on the server.
LA_DEL_L3_SW The Virtual Layer 3 Switch "%S" has been deleted from the server.
LA_START_L3_SW The Virtual Layer 3 Switch "%S" has been started.
LA_STOP_L3_SW The Virtual Layer 3 Switch "%S" has been stopped.
LA_ADD_L3_IF The virtual interface for Virtual Hub "%S" has been added to Virtual Layer 3 Switch "%S".
LA_DEL_L3_IF The virtual interface for Virtual Hub "%S" has been deleted from Virtual Layer 3 Switch "%S".
LA_ADD_L3_TABLE The routing table for network "%S" has been added to Virtual Layer 3 Switch "%S".
LA_DEL_L3_TABLE The routing table for network "%S" has been deleted from Virtual Layer 3 Switch "%S".
LA_ADD_CRL A certificate has been added to Certificate Revocation List.
LA_DEL_CRL A certificate has been edited in Certificate Revocation List.
LA_SET_CRL A registered item in a registration of a list of invalid certificates has been edited.
LA_READ_LOG_FILE The log file on the server "%S" (log file "%S") has been downloaded.
LA_ADD_LICENSE_KEY A new license key "%S" has been registered.
LA_DEL_LICENSE_KEY An existing license (No. %u) has been deleted.
LA_SET_IPSEC_CONFIG The IPsec server setting has been updated.
LA_ADD_ETHERIP_ID A new EtherIP / L2TPv3 server setting (ID="%S") has been added.
LA_DEL_ETHERIP_ID The new EtherIP / L2TPv3 server setting (ID="%S") has been deleted.
LA_SET_OVPN_SSTP_CONFIG The OpenVPN and MS-SSTP VPN Server setting has been updated.
LA_DDNS_HOSTNAME_CHANGED The hostname of Dynamic DNS Function has been changed to "%S".
LA_SET_SPECIAL_LISTENER Special Listener enable / disable status has been changed.
# (Client log)
LC_START_1 The SoftEther VPN Client Engine has been started.
LC_START_2 %S %S
LC_START_3 %S
LC_END The SoftEther VPN Client Engine has been shut down.
LC_LOAD_CONFIG_1 Loading configuration file...
LC_LOAD_CONFIG_2 The configuration file has been loaded.
LC_LOAD_CONFIG_3 Configuration file does not exist. Applying the initial settings.
LC_NEW_ACCOUNT A new VPN Connection Setting "%s" has been created.
LC_DELETE_ACCOUNT The VPN Connection Setting "%s" has been deleted.
LC_RENAME_ACCOUNT The name of VPN Connection Setting "%s" has been changed to "%s".
LC_CONNECT Connection processing for VPN Connection Setting "%s" has started.
LC_CONNECT_1 VPN Connection Setting "%s": Connection operation starting (this is now %u times).
LC_CONNECT_2 VPN Connection Setting "%s": Now connected. Session name: "%S"
LC_CONNECT_ERROR VPN Connection Setting "%s": The connection has been either disconnected or it failed. Cause: %s (code %u)
LC_DISCONNECT Disconnecting the VPN Connection Setting "%s".
LC_CREATE_VLAN A Virtual Network Adapter "%S" has been created.
LC_UPDATE_VLAN The Virtual Network Adapter "%S" driver has been reinstalled.
LC_DELETE_VLAN The Virtual Network Adapter "%S" has been deleted.
LC_SET_PASSWORD The password setting for connection to a client service has been changed.
LC_TAP_NOT_FOUND Cannot find the tun/tap driver for Mac OS X. Please install the tun/tap driver.
# (Eraser log)
LE_START Monitoring the directory "%S". If the amount of available free disk space becomes less than %S, the backup files for log files and configurations that are saved on the sub-directories of this directory will be automatically deleted in the order of oldest first. The amount of free disk space that determines when to start deletion can be modified by changing the "AutoDeleteCheckDiskFreeSpaceMin" item in the configuration file.
LE_DELETE The free disk space is now less then %S so the old file "%S" has been automatically deleted. The amount of free disk space that determines when to start deletion can be modified by changing the "AutoDeleteCheckDiskFreeSpaceMin" item in the configuration file.
LE_NOT_ENOUGH_FREE <<WARNING>> If the free disk space becomes lower than %S, it will no longer be possible to automatically delete the old backup files of log files and configurations. We recommend that you immediately manually delete the unnecessary files on this computer and recover the necessary free disk space. When there is a very small amount of free disk space, computer operation can become unstable.
# (Layer 3 Switch log)
L3_SWITCH_START The Virtual Layer 3 Switch "%S" started. It will wait until the Virtual Hubs of all interfaces registered on this switch become online and then it will start operation.
L3_SWITCH_ONLINE The Virtual Hubs of all interfaces of the Virtual Layer 3 Switch "%S" are online and the Virtual Layer 3 Switch has commenced Virtual Layer 3 Switch operation.
L3_SWITCH_OFFLINE At least one Virtual Hub of an interface registered on Virtual Layer 3 Switch "%S" stopped, and Virtual Layer 3 Switch operation has been stopped.
L3_SWITCH_STOP The Virtual Layer 3 Switch "%S" terminated.
# Concerning Microsoft.c
MS_ETHERNET Ethernet Interface
MS_TOKENRING Token Ring Interface
MS_FDDI FDDI Interface
MS_PPP PPP (Dialup or VPN)
MS_LOOPBACK Loopback Interface
MS_SLIP SLIP Interface
MS_WLAN Wireless Network Interface
MS_OTHER Unknown Other Interface
MS_NON_OPERATIONAL Disabled
MS_UNREACHABLE Not Connected
MS_DISCONNECTED Not Connected
MS_CONNECTING Connecting
MS_CONNECTED Connected
MS_OPERATIONAL Connected
# Concerning Network Utility
UT_SM_COLUMN_1 Item Name
UT_SM_COLUMN_2 Value
UT_SM_ST_TITLE Network Adapter Name
UT_SM_ST_GUID GUID
UT_SM_ST_TYPE Type
UT_SM_ST_TYPE2 Physical Wired Ethernet
UT_SM_ST_STATUS Status
UT_SM_ST_MTU MTU
UT_SM_ST_SPEED Link Speed
UT_SM_ST_ADDRESS Physical Address
UT_SM_ST_RECV_BYTES Incoming Bytes
UT_SM_ST_RECV_BCASTS Incoming Broadcast Packets
UT_SM_ST_RECV_UNICASTS Incoming Unicast Packets
UT_SM_ST_SEND_BYTES Outgoing Bytes
UT_SM_ST_SEND_BCASTS Outgoing Broadcast Packets
UT_SM_ST_SEND_UNICASTS Outgoing Unicast Packets
UT_SM_ST_IP IP Address %u
UT_SM_ST_SUBNET Subnet Mask %u
UT_SM_ST_GATEWAY Gateway %u
UT_SM_ST_DHCP DHCP Server
UT_SM_ST_DHCP_1 Lease Start
UT_SM_ST_DHCP_2 Lease Limit date and time
UT_SM_ST_WINS_1 WINS Server 1
UT_SM_ST_WINS_2 WINS Server 2
# Concerning EtherLogger Manager
EM_TITLE SoftEther EtherLogger Manager
EM_REMOTE_TITLE You can connect to and manage the SoftEther EtherLogger service. \r\nEnter the host name and IP address of the computer on which the EtherLogger service to be managed is operating. You can also concatenate the port number by using the ":" (colon).
EM_MAIN_COLUMN_1 Network adapter name
EM_MAIN_COLUMN_2 Status
EM_MAIN_OK Operating
EM_MAIN_ERROR Error
EM_ADD_NEW Add new capture device
EM_ADD_EDIT Edit capture settings
EM_DELETE_CONFIRM Are you sure you want to delete capture setting "%S"?
EM_NO_LICENSE_COLUMN Note:
EM_NO_LICENSE Because not even one product license is registered, this SoftEther EtherLogger will not operate.
EM_UNSUPPORTED Unable to use SoftEther EtherLogger on the operating system that this SoftEther EtherLogger is operating on. For the list of operating system that the SoftEther EtherLogger can be used on, please refer to the online documentation of the SoftEther EtherLogger.
EM_WPCAP_REMOTE In order to use this SoftEther EtherLogger, you need to install WinPcap software. The software WinPcap is currently not installed on the server computer. \r\n\r\nTo continue the installation of the WinPcap software, you must start SoftEther EtherLogger Manager on the server computer that is running VPN Server and then while connected to localhost (location of your own computer), have the Local Bridge Function Setting window displayed. \r\nTo continue, first exit this management session, and then, after starting SoftEther EtherLogger Manager on the server computer, connect to localhost and continue the setting process.
EM_WPCAP_ROOT In order to use this SoftEther EtherLogger, you need to install WinPcap software. \r\n\r\nTo continue the installation you must log in to this computer as a user with administrator privileges. \r\nLog on as an administrator and start the SoftEther VPN Server Manager again.
EM_WPCAP_INSTALL In order to use this SoftEther EtherLogger, you need to install WinPcap software. The software WinPcap is currently not installed on the server computer. \r\n\r\nWinPcap is an easy-to-install free software that is bundled together with the VPN Server. \r\n\r\nDo you want to begin the installation of WinPcap?
EM_WPCAP_REBOOT1 After WinPcap installation has completed, you must restart the computer before you use the SoftEther EtherLogger. \r\n\r\nAfter you restart the computer manually and start SoftEther EtherLogger, configure the settings again.
EM_WPCAP_REBOOT2 After WinPcap is installed, you must restart the SoftEther EtherLogger service. \r\n\r\nIt only takes a short time to restart the SoftEther EtherLogger service, however all management sessions that are currently connected to the SoftEther EtherLogger will be disconnected. \r\nThis management session will also be disconnected, so you will need to reconnect to continue. \r\n\r\nDo you want to restart the SoftEther Ether Logger service?
EM_RESOURCE Unable to read the WinPcap driver.
###########################################################################
# #
# String data of dialog boxes in software #
# #
###########################################################################
PREFIX D_SECURE
CAPTION Access to %s - %S
S_TITLE Access to %S
S_DEVICE_INFO Device Name: %S\r\nManufacturer: %S
IDS_STATIC1 Device Information
S_WARNING Take care entering the PIN code because if you have entered it incorrectly for a few times the device will be locked.
IDOK &OK
IDCANCEL Cancel
S_PIN_CODE &PIN Code:
PREFIX D_PKCSUTIL
CAPTION PKCS#12 Write Utility
S_TITLE ePass 1000 USB token PKCS#12 Write Utility
STATIC1 By using this utility, you can write a PKCS#12 file (certificate file) of your choice to an ePass 1000 USB hardware security token. \r\n\r\nThe USB token that the certificate file is written in can be used for SoftEther VPN authentication.
STATIC2 Write to PKCS#12 file
STATIC3 To write an existing PKC#12 file to a USB token, click Write. \r\nNOTE: If a PKCS#12 certificate for SoftEther VPN is already stored in the USB token, it will be overwritten.
B_WRITE &Write
STATIC4 Erase PKCS#12 certificate from USB token.
STATIC5 You can erase the certificate data from a USB token on which a PKCS#12 certificate for SoftEther VPN is already stored.
B_ERASE &Erase
IDCANCEL E&xit Utilities
S_COPYRIGHT Copyright (c) SoftEther VPN Project.\r\nAll Rights Reserved.
PREFIX D_PASSPHRASE
CAPTION Private Key Passphrase
STATIC1 The private key is protected by passphrase. \r\n\r\nEnter the passphrase to read the private key.
STATIC2 &Passphrase:
IDOK &OK
IDCANCEL Cancel
PREFIX D_NM_CONNECT
CAPTION Connect to SoftEther VPN User-mode Router
S_TITLE Connecting to "%S"...
PREFIX D_PASSWORD
CAPTION Login to %S
S_TITLE Enter your user name and password to log in to server %S. Make sure you select the correct auth type.
STATIC1 Enter Use&r Info:
STATIC2 Auth &Type:
STATIC3 User &Name:
STATIC4 &Password:
R_NO_SAVE_PASSWORD &Do not Save Password
S_COUNTDOWN An automatic reconnection will be made after %u seconds...
IDOK &OK
IDCANCEL Cancel Connection
PREFIX D_STATUS
CAPTION Connecting to "%s"...
S_STATUS Initializing...
IDCANCEL Cancel
PREFIX D_CERT
CAPTION Certificate
S_TITLE The following information is available for this certificate.
STATIC1 Basic Information of this Certificate:
STATIC2 Issued to:
STATIC3 Issuer:
STATIC4 Expires at:
STATIC5 Advanced Information of this Certificate:
STATIC6 Certificate of Authority Who Signed This Certificate:
S_PARENT The certificate of the certificate authority who signed this certificate is registered on the list of trusted certificates.
S_PARENT_BUTTON_STR &View Certificate
IDCANCEL &OK
B_SAVE &Save to File
PREFIX D_CHECKCERT
CAPTION Security Alert - %s
S_TITLE Although the connection to the destination VPN Server "%S" that you are currently connecting to is encrypted, the trustworthiness of the server certificate provided by the server is unknown.
STATIC1 About the Server Certificate
STATIC2 Establishing encrypted tunnel (SSL session) between VPN Server and VPN Client. Checking the server certificate enables to verify the authenticity of the server.
S_MSG1 The server certificate provided by destination VPN Server "%S" is as follows.
STATIC3 Issued to:
STATIC4 Issuer:
STATIC5 Expires at:
B_SHOW &Show Certificate
STATIC6 Digest (MD5):
STATIC7 Digest (SHA-1):
IDOK &Resume the Connection
IDCANCEL &Cancel Connection
STATIC8 There may be a problem with this certificate, such as it has not been issued by a trusted certificate authority (CA), or cert is expired.
STATIC9 Confirm the content of this certificate and decide whether or not to connect to this VPN Server. Click Cancel Connection to abort the connection.
PREFIX D_CONNECTERROR
CAPTION Connect Error - %s
S_TITLE An error occurred while connection to VPN Server "%S".
S_COUNTDOWN Automatically reconnects after %u seconds...
IDOK &Retry
IDCANCEL Cancel Connection
R_HIDE &Hide this window when connecting next time
PREFIX D_CM_LOGIN
CAPTION Enter Password - VPN Client Manager
S_TITLE You must enter a client administration password to operate the VPN Client that is operating on %s. Enter the client administration password.
STATIC1 &Password:
STATIC2 Enter the Client Administration Password:
IDOK &OK
IDCANCEL Cancel
PREFIX D_CONNECTION_STATUS
S_TITLE Status of VPN Session of %s (Real Time)
B_POLICY Security &Policy...
B_SERVER_CERT &Server Certificate
B_CLIENT_CERT &Client Certificate
IDCANCEL &Close
PREFIX D_CM_POLICY
CAPTION Security Policy List
S_TITLE Security policies defined for the current session %s
IDCANCEL &Close
PREFIX D_CM_ACCOUNT
STATIC1 Please configure the VPN Connection Setting for VPN Server.
S_ACCOUNT_NAME Setting &Name:
STATIC2 Destination VPN Server:
STATIC3 Specify the host name or IP address, and the port number and the Virtual Hub on the destination VPN Server.
STATIC4 &Host Name:
STATIC5 &Port Number:
STATIC6 (TCP Port)
STATIC7 &Virtual Hub Name:
STATIC8 Pro&xy Server as Relay:
STATIC9 You can connect to a VPN Server via a proxy server.
STATIC10 Proxy &Type:
R_DIRECT_TCP &Direct TCP/IP Connection (No Proxy)
R_HTTPS Connect via H&TTP Proxy Server
R_SOCKS Connect via &SOCKS Proxy Server
B_PROXY_CONFIG P&roxy Server Setting
STATIC11 Server Certificate Veri&fication Option:
R_CHECK_CERT Always Verify Server &Certificate
B_TRUST Manage Trusted CA &Certificate List
B_SERVER_CERT &Specify Individual Cert
B_VIEW_SERVER_CERT Show Indi&vidual Cert
S_VLAN_GROUP Virtua&l Network Adapter to Use:
S_POLICY_1 You can configure the security policy which will be applied to the Cascade Connection on this Virtual Hub's side.
B_POLICY Security Po&licy
STATIC12 User &Authentication Setting:
STATIC13 Auth &Type:
S_USERNAME &User Name:
S_PASSWORD Password:
S_CERT_INFO You must specify a client certificate to be used for user authentication.
STATIC14 Advanc&ed Setting of Communication:
R_RETRY Reconnects Automatically After Disconnected
S_RETRY_NUM_1 Reconnect &Count:
S_RETRY_NUM_2 times
S_RETRY_SPAN_1 Reconnect Interval:
S_RETRY_SPAN_2 seconds
R_INFINITE &Infinite Reconnects (Keep VPN Always Online)
R_NOTLS1 Do not use TLS &1.0
B_DETAIL A&dvanced Settings...
IDOK &OK
IDCANCEL Cancel
B_CHANGE_PASSWORD Change &Password
S_CHANGE_PASSWORD You can change the user's password on the VPN Server.
R_HIDE Hide Status and Errors Screens
R_HIDE2 Hide IP Address Screens
STATIC15 Set the user authentication information that is required when connecting to the VPN Server.
B_REGIST_CLIENT_CERT Specify Client &Certificate
B_IE Import I&E Proxy Server Settings
R_DISABLE_NATT Disable NAT-T
PREFIX D_CM_PROXY
CAPTION Proxy Server Connection Setting
STATIC1 Enter the host name of the proxy server for relaying (HTTP proxy or SOCKS proxy), and the IP address, port, and when necessary, the user name and password.
STATIC2 &Host Name:
STATIC3 Port:
STATIC4 &User Name:
STATIC5 &Password:
IDOK &OK
IDCANCEL Cancel
STATIC6 (optional)
STATIC7 (optional)
PREFIX D_CM_DETAIL
CAPTION Advanced Settings
STATIC1 Optional settings for system administrators and experts for networking, communication protocol, and security. Customize the VPN protocol communication settings.
STATIC2 Op&timization of VPN Communication:
STATIC3 Uses multiple physical TCP connection aggregation for a logical VPN connection to increase the communication throughput.
STATIC4 &Number of TCP Connections:
STATIC5 connections
STATIC6 Note: It is recommend that about 8 connections for broadband and 1 connection for slow line (e.g. dialup).
STATIC7 Advanced Settings:
STATIC8 Establi&shing Interval:
STATIC9 seconds
R_USE_DISCONNECT Set Connection Lifetime of E&ach TCP Connection
STATIC10 Lifetime:
STATIC11 seconds
STATIC12 When using two or more TCP connections, Half Duplex Mode is available. The half-duplex mode fixes the data direction as half and half for each TCP connection. For example when a VPN using 8 TCP connections is established, physical consists of the VPN tunnel will be fixed so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction.
R_USE_HALF_CONNECTION Use &Half-Duplex Mode
STATIC13 Encryption and &Compression:
STATIC14 Normally the VPN session is encrypted for secure. You can disable encryption to improve the throughput. Please note that the data flows in plain over the network when disabled.
R_USE_ENCRYPT &Encrypt VPN Session with SSL
STATIC15 You can use data compression to save VPN communication bandwidth. Enable this option when using a slow connectivity such as dial-up or mobile connection.
R_DISABLE_UDP Disable UD&P Acceleration
R_USE_COMPRESS &Use Data Compression
STATIC16 VPN Connection &Mode:
S_MODE You can specify the following connection modes. (Options for network administrators.)
R_BRIDGE &Bridge / Router Mode
R_MONITOR Monitoring Mo&de
STATIC17 Other Confi&gurations:
R_NO_ROUTING No Adjustments of &Routing Table
STATIC18 Keep the settings default in this dialog unless you are told to do so by a system administrator, or you have expertise for networking and security.
STATIC19 The VoIP / QoS functions handle high priority packets such as IP telephone packets (VoIP) to be transmitted faster.
R_DISABLE_QOS Disable VoIP / &QoS Functions
IDOK &OK
IDCANCEL Cancel
S_UDPACCEL You can use data compression to save VPN communication bandwidth. Enable this option when using a slow connectivity such as dial-up or mobile connection.
PREFIX D_CM_NEW_VLAN
CAPTION Create New Virtual Network Adapter
S_INFO A new Virtual Network Adapter will be created on the system.\r\nYou can specify a name for the Virtual Network Adapter, which can be a maximum of %u alphanumeric characters.
STATIC1 Virtual Network Adapter &Name:
IDOK &OK
IDCANCEL Cancel
S_WIN8 The name of a Virtual Network Adapter must be 'VPN' or 'VPN2' to 'VPN127'. (Maximum 127 adapters can be created.)
PREFIX D_CM_TRUST
CAPTION Manage Trusted CA Certificate List
STATIC1 Here you can manage the list of certificate authority (CA) certificates that are trusted.\r\n\r\nYou can use the CA certificate list registered here to verify server certificates when connecting to VPN Servers.
B_IMPORT &Add
B_EXPORT &Export
IDOK &View Certificate
IDCANCEL &Close
B_DELETE &Delete
PREFIX D_CM_PASSWORD
CAPTION Set Password - VPN Client Manager
S_TITLE You can set the password to limit the SoftEther VPN Client Service.\r\nAfter setting a password, you will be asked to enter a password the next time you use the VPN Client Connect Manager to connect to the SoftEther VPN Client service.
STATIC1 Set Client Administration Password:
R_USE_PASSWORD &Use Password
R_REMOTE_ONLY Only &Request Password for Remote Operation
IDC_STATIC1 &Password:
IDC_STATIC2 &Confirm:
IDOK &OK
IDCANCEL Cancel
PREFIX D_CM_CONFIG
CAPTION Optional Settings
STATIC1 You can modify the settings for VPN Client.
STATIC2 R&emote Management:
STATIC3 You can remotely manage the VPN Client Service Program from another computer by using VPN Client Manager Remote Mode.
R_ALLOW_REMOTE_CONFIG Allow &Remote Management of VPN Client Service
S_WARNING It is recommended to set a password if you allow remote management. From the menu bar, choose Tools -> Set Password to set the password.
STATIC4 For environments where Internet connections will automatically be disconnected when idle, you can keep alive the Internet connection by sending dummy packets to any host on the Internet.
R_USE_KEEP_CONNECT Use &Keep Alive Internet Connection Function
S_HOSTNAME &Host Name:
S_PORT &Port Number:
S_INTERVAL Packet Send &Interval:
S_INTERVAL2 seconds
S_PROTOCOL Pr&otocol:
R_TCP &TCP/IP Protocol
R_UDP &UDP/IP Protocol
S_INFO Packets sent to keep alive the Internet connection have random bits. No personal information is sent.
IDOK &OK
IDCANCEL Cancel
STATIC5 &Other Configurations:
R_ALPHA Transparency of UI:
STATIC6 Note: The transparency setting will be applied after the connection manager is restarted.
STATIC7 &Keep Alive Internet Connection Function:
PREFIX D_ABOUT
S_INFO1 SoftEther VPN %u.0 (Ver %u.%02u, Build %u)
S_INFO2 Open-Source VPN Software for Academic Purpose, under the GPLv2 License.\r\nCopyright (c) 2012-%u SoftEther Project at University of Tsukuba, Japan. All Rights Reserved.\r\nWeb Site: http://www.softether.org/\r\n%S
S_INFO3 This product includes the following software components:\r\nBitVisor: Copyright (c) 2007, 2008 University of Tsukuba. Copyright (C) 2007, 2008 National Institute of Information and Communications Technology. All rights reserved. / Microsoft(R) C Runtime Library: (c) 2007 Microsoft Corporation. All Rights Reserved. / PKCS #11 Cryptographic Token Interface (Cryptoki): Copyright (c) RSA Security Inc. / WinPcap: Copyright (c) 2001 - 2003 NetGroup, Politecnico di Torino (Italy). All rights reserved. / libedit: Copyright (c) 1992, 1993 The Regents of the University of California. All rights reserved. / libiconv: Copyright (C) 2007 Free Software Foundation, Inc. / ncurses: Copyright (c) 1998-2005, 2006 Free Software Foundation, Inc. / OpenSSL: Copyright (c) 1998-2011 The OpenSSL Project. All rights reserved. This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). / zlib: (C) 1995-2004 Jean-loup Gailly and Mark Adler. / Special Thanks to: Software Laboratory, Academic Computing Communication Center, Industrial Liaison and Cooperative Research Center and Professor Yasushi Shinjo in University of Tsukuba, Japan.
S_INFO4 THIS SOFTWARE IS FREEWARE DEVELOPED UNDER THE SOFTETHER VPN PROJECT AT UNIVERSITY OF TSUKUBA, WITHOUT WARRANTY OF AND KIND. IN NO EVENT SHALL THE DEVELOPERS, COPYRIGHT OWNERS OR DISTRIBUTORS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY IN ANY WAY OUT OF THE USE OF THIS SOFTWARE.\r\n\r\nSoftEther VPN is a work of the research and development project of Japanese Government, subsidized by Ministry of Economy, Trade and Industry of Japan, administrated by Information Promotion Agency.
IDCANCEL &OK
B_WEB Visit SoftEther VPN &Website...
B_EULA &End User License
B_IMPORTANT &Important Notices
B_LEGAL &Legal Notices
B_UPDATE_CONFIG &Configure Updates
B_AUTHORS List of &Authors
PREFIX D_REMOTE
STATIC1 &Specify the Host Name of the Destination Computer, or IP Address:
R_LOCAL Connect to &Local Computer (Computer Displaying this Window)
S_HOSTNAME &Computer Name:
IDOK &OK
IDCANCEL Cancel
PREFIX D_CM_DESKTOP
CAPTION Connection - %s
S_TITLE Starting connect process for VPN Connection Setting "%s".
S_WARNING VPN Client will output to the "Console Session" window of %s, the progress status and error messages related to the process of connecting to VPN Server
S_INFO Do you want to proceed with the connection?
IDOK &Continue
IDCANCEL Cancel
PREFIX D_CM_CHANGE_PASSWORD
CAPTION Change Password
S_TITLE You can change the password of the user registered on server %S.
STATIC1 Change &Password
STATIC2 Virtual &Hub Name:
STATIC3 &User Name:
STATIC4 &Old Password:
STATIC5 &New Password:
STATIC6 &Confirm of New Password:
IDOK &OK
IDCANCEL Cancel
S_STATIC Note: If authentication type is RADIUS or NT Domain Authentication, you cannot change the user's password here.
PREFIX D_SM_MAIN
CAPTION SoftEther VPN Server Manager
STATIC1 Connection &Settings for VPN Server:
STATIC2 Connection Settings for VPN Server or VPN Bridge are defined as follows. Double-click the item to connect to the server.\r\nTo add a new connection, click New Setting.
B_NEW_SETTING &New Setting
B_EDIT_SETTING &Edit Setting
B_DELETE &Delete Setting
IDOK &Connect
B_SECURE_MANAGER &Smart Card Manager...
B_SELECT_SECURE Select S&mart card...
B_ABOUT &About SoftEther VPN...
IDCANCEL E&xit SoftEther VPN Server Manager
B_CERT_TOOL Make a Certificate
PREFIX D_SM_EDIT_SETTING
STATIC1 Please configure the connection setting for the VPN Server or the VPN Bridge to manage.
STATIC2 Setting &Name:
STATIC3 Destination VPN Server:
STATIC4 Specify the host name or IP address, and the port number and the Virtual Hub on the destination VPN Server.
STATIC5 &Host Name:
R_LOCALHOST Connect to &Localhost
STATIC6 &Port Number:
STATIC7 (TCP Port)
STATIC8 Pro&xy Server as Relay:
STATIC9 You can connect to a VPN Server via a proxy server.
STATIC10 Proxy &Type:
R_DIRECT_TCP &Direct TCP/IP Connection (No Proxy)
R_HTTPS Connect via H&TTP Proxy Server
R_SOCKS Connect via S&OCKS Proxy Server
B_PROXY_CONFIG P&roxy Server Setting
STATIC11 Select Administration &Mode and Enter Password
STATIC12 You can connect to VPN Server using either Server Admin Mode or Virtual Hub Admin Mode.\r\n\r\nServer Admin Mode allows you manage entire VPN Server and all Virtual Hubs. \r\n\r\nVirtual Hub Admin Mode allows you manage only one Virtual Hub for which you hold privileges.
R_SERVER_ADMIN &Server Admin Mode
R_HUB_ADMIN Virtual H&UB Admin Mode
S_HUBNAME &Virtual Hub Name:
STATIC13 Please enter the password to connect administration mode.
S_PASSWORD &Password:
R_NO_SAVE Do not &Save Admin's Password
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_SERVER
CAPTION %s - SoftEther VPN Server Manager
S_TITLE Manage VPN Server "%S"
S_VHUB_BRIDGE Virtual Hubs Hosted by this VPN Server:
IDOK M&anage Virtual Hub
B_ONLINE &Online
B_OFFLINE O&ffline
B_HUB_STATUS View &Status
B_CREATE &Create a Virtual Hub
B_EDIT Prop&erties
B_DELETE &Delete
STATIC1 Management of &Listeners:
STATIC2 L&istener List (TCP/IP port):
B_CREATE_LISTENER C&reate
B_DELETE_LISTENER Dele&te
B_START Start
B_STOP Sto&p
STATIC3 VPN Server and &Network Information and Settings:
B_SSL &Encryption and Network
B_STATUS &View Server Status
B_INFO About this VPN Server
B_LICENSE Add / Delete &Licenses
B_FARM Clustering Configuration
B_FARM_STATUS Clustering Status
B_CONNECTION Show List of\r\nTCP/IP Connections
B_BRIDGE Local &Bridge Setting
B_L3 Layer &3 Switch Setting
B_CONFIG E&dit Config
B_REFRESH Refres&h
IDCANCEL E&xit
S_BETA Beta Version (Pre-release)
B_IPSEC IPsec / L&2TP Setting
B_DDNS Dynamic DNS Setting
S_DDNS Current DDNS Hostname:
B_OPENVPN OpenVPN / MS-SSTP Setting
B_AZURE VPN Azure Setting
S_AZURE VPN Azure Hostname:
B_VPNGATE VPN Gate Setting
PREFIX D_SM_STATUS
IDOK Refres&h
IDCANCEL E&xit
PREFIX D_SM_EDIT_HUB
STATIC1 Virtual Hub &Name:
STATIC2 Security &Settings:
S_BOLD Administration password for this Virtual Hub.
STATIC3 &Password:
STATIC4 &Confirm:
R_NO_ENUM No En&umerate to Anonymous Users
STATIC5 V&irtual Hub Options:
R_LIMIT_MAX_SESSION &Limit Max VPN Sessions
S_MAX_SESSION_1 Ma&x Number of Sessions:
S_MAX_SESSION_2 sessions
STATIC6 (Will not count sessions on server side that are generated by Local Bridge, Virtual NAT or Cascade Connection.)
STATIC7 Virtual Hub Status:
STATIC8 Set the Virtual Hub status.
R_ONLINE Onlin&e
R_OFFLINE O&ffline
STATIC9 Set Clustering:
S_FARM_INFO Select the Virtual Hub type in the cluster.
R_STATIC St&atic Virtual Hub
R_DYNAMIC &Dynamic Virtual Hub
S_AO_1 Virtual Hub Admin Option:
S_AO_3 Display and edit the Virtual Hub administration options.
B_ADMINOPTION Virtual Hub Admin Option
S_ACL_3 Sou&rce IP Address Limit List
S_ACL Allow or deny VPN connections to this Virtual Hub according to the client computer's IP address.
B_ACL IP Access Con&trol List
IDOK &OK
IDCANCEL Cancel
STATIC10 You can configure more advanced settings on the Virtual Hub Extended Option List.
B_EXTOPTION Edit Virtual Hub Extended Option List
S_MSG_1 Show Message when Client Connects
S_MSG_2 Shows a message on the screen of a user when a VPN Client connects to this Virtual Hub.
B_MSG Set the Messa&ge
PREFIX D_SM_CREATE_LISTENER
CAPTION Create Listener
STATIC1 You can add a TCP/IP port number for the VPN Server to accept connections from clients. \r\n\r\nSpecify the port number to add.
STATIC2 If the port number is already being used by another server program, the status of the new listener will be error. \r\n\r\nIn this case, stop the other program that is opening the same port.
STATIC3 &Port Number:
IDOK &OK
IDCANCEL Cancel
STATIC4 (TCP/IP Port)
PREFIX D_SM_SSL
CAPTION Encryption and Network Settings
STATIC1 You can view or change settings related to encryption, communication and security for this VPN Server.
STATIC2 Encryption &Algorithm Settings:
STATIC3 Specify the encryption algorithm for SSL applied to the connection between this VPN Server and VPN Clients. The encryption algorithm must be compatible with SSL Version 3.
STATIC4 En&cryption Algorithm Name:
STATIC6 Server &Certificate Settings:
STATIC7 Specify the X509 certificate and private key to be presented to clients by this server.
B_IMPORT &Import
B_EXPORT E&xport
B_VIEW &View
B_REGENERATE New
STATIC8 &Keep Alive Internet Connection:
STATIC9 For environments where Internet connections will automatically be disconnected when idle, you can keep alive the Internet connection by sending dummy packets to any host on the Internet.
STATIC10 Server Certificate:
R_USE_KEEP_CONNECT Use &Keep Alive Internet Connection
S_HOSTNAME &Host Name:
S_PORT &Port:
S_INTERVAL Send &Interval:
S_INTERVAL2 seconds
S_PROTOCOL Pr&otocol:
R_TCP &TCP/IP Protocol
R_UDP &UDP/IP Protocol
S_INFO Packets sent to keep alive the Internet connection have random bits. No personal information is sent.
STATIC11 Administrator Pass&word:
S_INFO4 You can modify an administrator password of the administrator for all Virtual Hubs and this entire VPN Server.
B_PASSWORD Change Admin &Password
IDOK &OK
IDCANCEL Cancel
IDCANCEL2 Cancel
STATIC12 Syslog Send Function:
STATIC13 You can transfer the entire VPN Server / Bridge Logs, Virtual Hub Administration Logs, or Virtual Hub Packet Logs by using syslog protocol instead of writing to a local disk.
STATIC14 Syslog &Server Host Name:
STATIC15 P&ort:
S_OVER_FUNCS VPN over ICMP / DNS Server Function
S_INFO5 You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications.
B_SPECIALLISTENER VPN over ICMP / DNS Settings
B_UPDATE_CONFIG &Update Notify Setting...
PREFIX D_SM_SAVE_KEY_PAIR
CAPTION Save Certificate and Private Key
STATIC1 Select the method to save the certificate and private key.
STATIC2 Sa&ve Method:
R_X509_AND_KEY Save as &X509 Certificate (.CER) and Private Key File (.KEY)
R_PKCS12 Save as &PKCA#12 File (.P12)
R_SECURE Write to &Smart Card
STATIC3 Saving by splitting into two files: a standard Base 64-encoded certificate file and a private key file.
STATIC4 Saving as a PKCS#12 (Public Key Cryptography Standard #12) file. \r\nYou can store both certificate and private key in a single PKCS#12 file.
STATIC5 When a smart card is connected to this computer, you can write the certificate and private key to a smart card.
B_SELECT &Select Which Smart Card to Use...
S_PASS3 Private Key P&rotection:
S_PASS4 When saving the private key, you can set a passphrase to encrypt. You will be required to enter the passphrase when loading it.
R_USE_PASS Set P&assphrase
S_PASS1 Pa&ssphrase:
S_PASS2 Con&firm:
IDOK &OK
IDCANCEL Cancel
B_SECURE_MANAGER Smart Card &Manager...
PREFIX D_SM_CONNECTION
CAPTION Connection List
S_TITLE The server %S has the following active connections. Connections which have been established as a VPN session are not included.
IDOK Show Connection &Information
B_DISCONNECT &Disconnect
B_REFRESH Refres&h
IDCANCEL E&xit
PREFIX D_SM_FARM
CAPTION Clustering Configuration
S_TITLE You can change configuration for clustering function of VPN Server "%S".
STATIC1 Clustering can realize load balancing and fault balance protection to bundle multiple VPN Servers.
STATIC2 Current Mode:
STATIC3 Clustering Se&ttings:
R_STANDALONE &Standalone Server (No Clustering)
R_CONTROLLER &Cluster Controller
R_MEMBER Cluster &Member Server
STATIC4 C&onfigurable Parameters as a Member Server:
S_IP_1 Public &IP Address:
S_IP_2 (When a public IP address is omitted, the IP address of the network interface used when connecting to the cluster controller will be used.)
S_PORT_1 &Public Port List:
S_PORT_2 (Separate multiple port numbers by a space or a comma.)
S_CONTROLLER Controller &Host Name or IP Address:
S_CONTROLLER_PORT Port Number of\r\nControlle&r:
S_PORT_3 (TCP Port)
S_PASSWORD Administration &Password:
STATIC5 When you modify a clustering configuration, the VPN Server service restarts automatically. When this happens, all the currently connected sessions and administration-related connections will be disconnected.
IDOK &OK
IDCANCEL Cancel
S_1 Standard Ratio in Cluster:
S_2 (Standard: 100)
R_CONTROLLER_ONLY Controller Functions Only (No VPN session in itself)
PREFIX D_SM_FARM_MEMBER
CAPTION Cluster Member List
S_TITLE Currently the following Cluster Member Servers are connected to the Cluster Controller %S.
IDOK Cluster Member Server &Information
B_REFRESH Refres&h
IDCANCEL E&xit
B_CERT View Server &Certificate
PREFIX D_SM_CHANGE_PASSWORD
CAPTION Change Administrator Password of %S
S_TITLE Change the administrator password of the server %S. Enter the new password and click OK.
STATIC1 New &Password:
STATIC2 &Confirm Password:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_HUB
CAPTION Management of Virtual Hub - '%S'
S_TITLE Virtual Hub '%S'
STATIC1 Management of Security &Database:
B_USER Manage &Users
S_USER Add, delete or edit user accounts.
B_GROUP Manage &Groups
S_GROUP Add, delete or edit groups.
B_ACCESS Manage &Access Lists
S_ACCESS Add or delete access lists (Packet filtering rules).
STATIC2 Virtual Hub Settings:
B_PROPERTY Virtual Hub &Properties
S_PROPERTY Configure this Hub.
B_RADIUS Auth&entication Server Setting
S_RADIUS Use external RADIUS authentication server for user authentication.
B_LINK Manage &Cascade Connections
S_LINK Establish Cascade Connection to Hubs on local or remote VPN Servers.
STATIC3 Cu&rrent Status of this Virtual Hub:
B_REFRESH Refres&h
STATIC4 &Other Settings:
B_LOG &Log Save Setting
B_LOG_FILE Log File List
S_LOG Configure settings of log saving function.
B_CA &Trusted CA Certificates
B_CRL Revo&ked Certs
S_CA Manage trusted CA certificates.
B_SNAT &Virtual NAT and Virtual DHCP Server (SecureNAT)
S_SNAT Secure NAT is available on this Virtual Hub. You can run Virtual NAT and Virtual DHCP.
STATIC5 VPN Sess&ions Management:
B_SESSION Manage &Sessions
IDCANCEL E&xit
PREFIX D_SM_USER
CAPTION Manage Users
S_TITLE Virtual Hub "%S" has the following users.
IDOK &Edit
B_CREATE &New
B_DELETE &Remove
B_REFRESH &Refresh
IDCANCEL E&xit
B_STATUS &View User Info
PREFIX D_SM_EDIT_USER
IDC_STATIC1 &User Name:
IDC_STATIC3 &Full Name:
IDC_STATIC4 &Note:
IDC_STATIC5 Group Name\r\n(Optional):
B_GROUP Browse Groups...
R_EXPIRES &Set the Expiration Date for This Account
IDC_STATIC6 &Auth Type:
S_RADIUS_3 RADIUS or NT Domain Authentication Settings:
S_RADIUS_1 Login attempts by password will be verified by the external RADIUS server, Windows NT domain controller, or Active Directory controller.
R_SET_RADIUS_USERNAME Specify User Name on Authentication Server
S_RADIUS_2 User Name on Authentication Server:
S_POLICY_1 Security Policy
R_POLICY Set Securit&y Policy
B_POLICY Security Policy
S_PASSWORD_1 Password Authentication Settings:
S_PASSWORD_2 &Password:
S_PASSWORD_3 &Confirm Password:
S_USER_CERT_1 Individual Certificate Authentication Settings:
B_LOAD_CERT Sp&ecify Certificate
B_VIEW_CERT &View Certificate
B_CREATE Create Certificate
S_ROOT_CERT_1 Signed Certificate Authentication Settings:
S_ROOT_CERT_2 Verification of whether the client certificate is signed is based on a certificate of a CA trusted by this Virtual Hub.
R_CN Limit Common Name (CN) Value
R_SERIAL &Limit Values of the Certificate Serial Number
S_ROOT_CERT_3 Note: Enter hexadecimal values. (Example: 0155ABCDEF)
S_HINT Hint: Define a user object with username '*' (asterisk) in order to accept a login attempt of a user which does not match any of registered explicit user objects. Such a special user will use the external user-authentication server to verify the login.
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_POLICY
STATIC1 Selected &Policy:
S_BOLD Des&cription of the policy:
S_BOLD2 Current &Value:
R_ENABLE &Enable the Policy
R_DISABLE &Disable the Policy
R_DEFINE De&fine the Policy
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_GROUP
CAPTION Manage Groups
S_TITLE Virtual Hub "%S" has the following groups.
B_CREATE &New
IDOK &Edit
B_DELETE &Remove
B_REFRESH &Refresh
B_USER &Member List
IDCANCEL E&xit
PREFIX D_SM_EDIT_GROUP
IDC_STATIC1 &Group Name:
IDC_STATIC3 &Full Name:
IDC_STATIC4 &Note:
S_POLICY_1 Security Policy:
R_POLICY Set this group's Securit&y Policy
B_POLICY Security Policy
S_POLICY_2 Statistical Information of the Group:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_ACCESS_LIST
CAPTION Access Lists
S_TITLE The Virtual Hub "%S" has the following access lists (packet filtering rules).
B_ADD &New (IPv&4)
B_ADD_V6 &New (IPv&6)
IDOK &Edit
B_DELETE &Delete
B_SAVE &Save
IDCANCEL &Cancel
STATIC1 Items with higher priority appear higher in the list.
STATIC2 Note: IP packets that did not match any access list items can pass.
B_CLONE Cl&one
B_ENABLE E&nable
B_DISABLE D&isable
PREFIX D_SM_EDIT_ACCESS
CAPTION Edit Access List Item
STATIC1 Configure the access list settings. The access list that is defined here will be applied to all IP packets passing through the Virtual Hub.
STATIC2 Basic Settings
STATIC3 &Memo:
STATIC4 &Action:
R_PASS &Pass
R_DISCARD &Discard
STATIC5 P&riority:
STATIC6 (Smaller number has higher priority.)
STATIC7 Filtering Options for IP Headers
S_ACCESS_SRC_ALL Source IP Address:
R_SRC_ALL Applies to All Source Addresses
S_SRC_IP_1 IPv4 Address:
S_SRC_IP_2 Subnet Mask:
S_SRC_IP_3 (255.255.255.255 means a single host)
S_SRC_IP_1_V6 IPv6 Address:
S_SRC_IP_3_V6 (For example: "ffff:ff00::" or "/24". "/128" means a single host.)
S_ACCESS_DST_ALL Destination IP Address:
R_DST_ALL Applies to All Destination Addresses
S_IP_DST_1 IPv4 Address:
S_IP_DST_2 Subnet Mask:
S_IP_DST_3 (255.255.255.255 means Specified host only)
S_IP_DST_1_V6 IPv6 Address:
S_IP_DST_3_V6 (For example: "ffff:ff00::" or "/24". "/128" means a single host.)
STATIC9 Protocol Type:
STATIC10 Filtering Options for TCP Headers and UDP Headers
S_TCP_1 Minimum
S_TCP_2 Maximum
S_TCP_3 Source Port:
S_TCP_5 Destination Port:
S_TCP_7 The blank port number field matches any ports.\r\nIt will apply to packets that match only the minimum value when the minimum value is specified but the maximum value is not.
STATIC11 Filtering Options for Users or Groups
STATIC11_OLD Filtering Options for Users
STATIC12 This access list will be applied only to the packets that for specific users, groups send or receive.
STATIC12_OLD This access list will be applied only to packets that for specific users send or receive.
STATIC13 Source Name:
B_USER1 Browse...
STATIC14 Destination Name:
B_USER2 Browse...
STATIC15 Leave these fields blank if you don't specify user name nor group name.
STATIC15_OLD Leave these fields blank if you don't specify user name.
IDOK &OK
IDCANCEL Cancel
S_PROTOID Specify IP Protocol:
STATIC16 Filtering Options for MAC Headers
S_CHECK_SRC_MAC Source MAC Address:
R_CHECK_SRC_MAC Applies to any Source Addresses
S_SRC_MAC MAC Address:
S_SRC_MAC_MASK Mask:
S_CHECK_DST_MAC Destination MAC Address:
R_CHECK_DST_MAC Applies to any Destination Addresses
B_SIMULATION De&lay and Packet Loss...
S_DST_MAC MAC Address:
S_DST_MAC_MASK Mask:
S_MAC_NOTE You can use hexadecimal number with two separators, "-" or ":", and without the separators.\r\n(FF-FF-FF-FF-FF-FF means a specified host)
R_CHECK_TCP_STATE Verify TCP Connection State (Only TCP Packets)
R_ESTABLISHED Established Packet
R_UNESTABLISHED Unestablished Packet
R_REDIRECT Redirect HTTP Request to Specific URL
B_REDIRECT Set URL Redirect to...
PREFIX D_SM_RADIUS
CAPTION Authentication Server Settings
S_TITLE To use an external RADIUS server to verify login attempts to the Virtual Hub "%S", specify an external RADIUS server that verifies the user name and password.
STATIC1 RADIUS Server Settings:
R_USE_RADIUS &Use RADIUS Authentication
S_RADIUS_1 RADIUS &Server Host Name or IP:
S_RADIUS_2 &Port:
S_RADIUS3 (UDP Port)
S_RADIUS_4 Shared S&ecret:
S_RADIUS_5 &Confirm Shared Secret:
S_RADIUS_6 The RADIUS server must accept requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled.
S_RADIUS_7 milliseconds (above %u, below %u)
S_RADIUS_8 &Retry Interval
S_RADIUS_9 (use ',' or ';' to split multiple hostnames.)
STATIC2 When using Windows NT Domain Controller or Windows Server Active Directory Controller as an external authentication server, you must setup the VPN Server computer to join the domain. To use NT Domain Authentication, there are no items to configure here.
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_LINK
CAPTION Cascade Connections on %S
STATIC1 Cascade Connection can make a layer-2 Ethernet-level links between this Virtual Hub and other Virtual Hub which is located on either local or remote VPN Server.
STATIC2 Before Using Cascade Connection
STATIC3 Cascade Connection realizes a Layer 2 Bridge between multiple Virtual Hubs. But if the connection is incorrectly configured, an infinity loop could inadvertently be created. When using a Cascade Connection function please design the network topology with care.
B_CREATE &New
B_EDIT &Edit
B_ONLINE O&nline
B_OFFLINE O&ffline
IDOK &Status
B_DELETE &Delete
B_RENAME Ren&ame
B_REFRESH &Refresh
IDCANCEL E&xit
PREFIX D_SM_LOG
CAPTION Log Save Settings
S_TITLE You can save the security logs (such as history of user logins) of Virtual Hub "%S", and the packet logs of all packets that pass through the Virtual Hub.
STATIC1 &Security Log:
B_SEC Save S&ecurity Log
S_SEC Log File S&witch Cycle:
STATIC2 &Packet Log:
B_PACKET Save Pack&et Log
S_PACKET Log File S&witch Cycle:
S_PACKET_0 TCP Connection:
B_PACKET_0_0 Do not Save
B_PACKET_0_1 Header Only
B_PACKET_0_2 Headers && Payloads
S_PACKET_1 TCP Packet:
B_PACKET_1_0 Do not Save
B_PACKET_1_1 Header Only
B_PACKET_1_2 Headers && Payloads
S_PACKET_2 DHCP Packet:
B_PACKET_2_0 Do not Save
B_PACKET_2_1 Header Only
B_PACKET_2_2 Headers && Payloads
S_PACKET_3 UDP Packet:
B_PACKET_3_0 Do not Save
B_PACKET_3_1 Header Only
B_PACKET_3_2 Headers && Payloads
S_PACKET_4 ICMP Packet:
B_PACKET_4_0 Do not Save
B_PACKET_4_1 Header Only
B_PACKET_4_2 Headers && Payloads
S_PACKET_5 IP Packet:
B_PACKET_5_0 Do not Save
B_PACKET_5_1 Header Only
B_PACKET_5_2 Headers && Payloads
S_PACKET_6 ARP Packet:
B_PACKET_6_0 Do not Save
B_PACKET_6_1 Header Only
B_PACKET_6_2 Headers && Payloads
S_PACKET_7 Ethernet\r\nPacket:
B_PACKET_7_0 Do not Save
B_PACKET_7_1 Header Only
B_PACKET_7_2 Headers && Payloads
IDOK &OK
IDCANCEL Cancel
STATIC3 Saving large amounts of packet logs can place a large burden on the CPU and the hard disk and it can cause lower performance of Hub and entire VPN Server. Enable logging on only the necessary packet log to save.
PREFIX D_SM_CA
CAPTION Manage Trusted CA Certificates
STATIC1 You can manage the list of certificate authority (CA) certificates that are trusted by this Virtual Hub.\r\n\r\nThe list of CA certificates that is listed here is used to verify certificates when a VPN Client is connected in signed certificate authentication mode.
B_IMPORT &Add
IDOK &View Certificate
IDCANCEL &Close
B_DELETE &Delete
PREFIX D_SM_SESSION
CAPTION Manage Sessions - %S
S_TITLE Virtual Hub "%S" has the following VPN sessions currently.
STATIC1 Operations for Sessions
IDOK Session &Information
B_DISCONNECT &Disconnect
B_REFRESH Refres&h
B_SESSION_MAC_TABLE &MAC Table of Selected Session
B_SESSION_IP_TABLE I&P Table of Selected Session
STATIC2 &Other Administration Tasks
B_MAC_TABLE MAC &Address Table List
B_IP_TABLE IP Address Ta&ble List
IDCANCEL E&xit
S_FARM_INFO_2 The sessions displayed here are all sessions on the current cluster. To manage sessions on other cluster member servers you must connect as an administrator to those servers.
PREFIX D_SM_MAC
CAPTION MAC Address Table
S_TITLE The MAC address table database on the Virtual Hub "%S" has the following entries.
B_DELETE &Delete Selected Entry
B_REFRESH Refres&h
IDCANCEL E&xit
PREFIX D_SM_IP
CAPTION IP Address Table
S_TITLE The IP address table database on the Virtual Hub "%S" has the following entries.
B_DELETE &Delete Selected Entry
B_REFRESH Refres&h
IDCANCEL E&xit
PREFIX D_SM_CREATE_CERT
CAPTION Create New Certificate
STATIC1 You can easily create certificates which is signed by self or other certificates.
STATIC2 Certificate &Type:
R_ROOT_CERT &Root Certificate (Self-Signed Certificate)
R_SIGNED_CERT Certificate &Signed by Other Certificate
S_LOAD_1 &Certificate and Private Key for Signing:
B_LOAD &Load Certificate and Private Key
S_LOAD_2 Click 'Load Certificate and Private Key' to specify the X509 Certificate and RSA Private Key that will user a new certificate signature.
S_LOAD_3 Common Name (CN):
S_LOAD_4 Organization (O):
S_LOAD_5 Organization Unit (OU):
S_LOAD_6 Country (C):
S_LOAD_7 State (ST):
S_LOAD_8 Locale (L):
S_LOAD_11 &Serial Number:\r\n(Hexadecimal)
S_LOAD_9 &Expires in:
S_LOAD_10 Days
STATIC3 To manage certificates and certificate authorities on a large scale, you should use either free software such as OpenSSL, or commercial CA (certificate authority) software.
IDOK &OK
IDCANCEL Cancel
S_LOAD_12 Strength&ness:
PREFIX D_NM_LOGIN
CAPTION deleted
S_TITLE deleted
STATIC1 deleted
STATIC2 deleted
IDOK deleted
IDCANCEL deleted
PREFIX D_SPEEDMETER
CAPTION Network Device Status
STATIC1 Select Network Adapter:
STATIC2 Real-time Status
STATIC3 &Refresh
PREFIX D_NM_MAIN
CAPTION deleted
STATIC1 deleted
STATIC2 deleted
B_SETTING Connection &Setting for VPN Server
B_CONNECT &Connect
B_DISCONNECT &Disconnect
STATIC3 Operation Settings of User-mode Router
STATIC4 You can set the operations in a virtual network of a SoftEther VPN User-mode Router.
B_OPTION &Operation Settings of User-mode Router
STATIC5 Operating Status of User-mode Router
STATIC6 Displays the current operating status of the SoftEther VPN User-mode Router.
B_NAT Virtual &NAT Status
B_DHCP Virtual D&HCP Server Status
B_STATUS User-mode &Router Status
B_INFO User-mode Router &Information
B_PASSWORD Administration &Password Setting
B_REFRESH Refr&esh
B_ABOUT &About...
IDCANCEL E&xit
PREFIX D_NM_OPTION
CAPTION SecureNAT Configration
S_TITLE Set how SecureNAT virtual host performs operation on the virtual network of Virtual Hub "%S".
STATIC1 Virtual Host's Network Interface Settings:
STATIC2 &MAC Address:
STATIC3 I&P Address:
STATIC4 &Subnet Mask:
STATIC5 Virtual NAT Settings:
R_USE_NAT Use Virtual N&AT Function
STATIC6 M&TU Value:
STATIC7 bytes
STATIC8 T&CP Session Timeout:
STATIC9 seconds
STATIC10 &UDP Session Timeout:
STATIC11 seconds
R_SAVE_LOG Save NAT or DHCP Server Operations to &Log File
STATIC12 Virtual DHCP Server Settings:
R_USE_DHCP Use Virtual DHCP Server Fu&nctions
STATIC13 &Distributes IP Address:
STATIC14 to
STATIC15 .
STATIC16 Su&bnet Mask:
STATIC17 L&ease Limit:
STATIC18 seconds
STATIC19 Options Applied to Clients (optional):
STATIC20 De&fault Gateway\r\nAddress:
STATIC21 DNS &Server Address 1:
STATIC22 Domain Name:
STATIC23 DNS &Server Address 2:
IDOK &OK
IDCANCEL Cancel
S_1 Static routing table pushing function (for split tunneling)
S_2 Push the static routing table to VPN clients.
B_PUSH Edit the static routing table to push
PREFIX D_NM_NAT
CAPTION NAT Session Table on Virtual NAT Router
S_TITLE There are the following TCP or UDP NAT table entries on the virtual NAT router of SecureNAT.
B_REFRESH Refres&h
IDCANCEL E&xit
PREFIX D_NM_DHCP
CAPTION IP Lease Table on Virtual DHCP Server
S_TITLE The SecureNAT Virtual DHCP Server has allocated the following IP addresses to clients.
B_REFRESH Refres&h
IDCANCEL E&xit
PREFIX D_NM_CHANGE_PASSWORD
CAPTION Change Administrator Password of %S
S_TITLE You can change the administrator password of SoftEther VPN User-mode Router (%S). Click OK after entering the new password.
STATIC1 New &Password:
STATIC2 &Confirm Your Input:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_SNAT
CAPTION Virtual NAT and Virtual DHCP Function (SecureNAT) Setting
S_TITLE SecureNAT enables you to operate a virtual NAT router (IP Masquerade) and DHCP Server function on a virtual network of Virtual Hub "%S".
STATIC1 Warning about SecureNAT
S_WARNING The SecureNAT function is recommended only for system administrators or people with a detailed knowledge of networking.
S_WARNING2 If you use the SecureNAT correctly, it is possible to realize a safety remote access via a VPN. However when you use this as incorrectly, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual or online documentation.
STATIC2 Enabling / Disabling and Changing the Setting of the SecureNAT
STATIC3 You can enable, disable or change the settings of the SecureNAT on this Virtual Hub.
B_ENABLE &Enable SecureNAT
B_DISABLE &Disable SecureNAT
B_CONFIG SecureNAT &Configuration
STATIC4 Note: When a running SecureNAT is disabled, all active TCP and UDP sessions that are connected via SecureNAT will be terminated.
STATIC5 View Current SecureNAT Status
STATIC6 You can view the current SecureNAT operating status.
B_NAT Virtual &NAT Router Status
B_DHCP Virtual D&HCP Server Status
B_STATUS View &SecureNAT Operating Status
S_TSUKUBA2 SecureNAT uses technology that Daiyuu Nobori developed in 2004 at "Special Seminar on Information I" at the College of Information Science of the Third Cluster of Colleges, Tsukuba University.
IDCANCEL E&xit
PREFIX D_SM_BRIDGE
CAPTION Local Bridge Settings
STATIC1 Local Bridge can establish a Layer 2 bridge connection between a Virtual Hub on this VPN server and a physical Ethernet Device (Network Adapter). \r\nIt is also possible to create a tap device (virtual network interface) and establish a bridge connection with a Virtual Hub. (Tap is supported on Linux versions only)
B_DELETE &Delete Local Bridge
STATIC2 New &New Local Bridge Definition:
STATIC3 Select the Virtual Hub to bridge.
STATIC4 Virtual &Hub:
STATIC5 &Type to Create:
R_BRIDGE Bridge with &Physical Existing Network Adapter
R_TAP Bridge with New &Tap Device
S_ETH_1 LAN Adapter:
S_TAP_1 New Tap &Device Name:
S_TAP_2 (Maximum 11 Characters)
STATIC6 Note: Although it is possible to establish a bridge using any operating network adapter, in high load environments, you should prepare a network adapter dedicated for bridging.
IDOK Cre&ate Local Bridge
STATIC7 If a network adapter doesn't appear which is recently added on the system, reboot the computer and re-open this screen.
IDCANCEL E&xit
B_VLAN VLAN Transparency Setting Tool
PREFIX D_WIN9X_REBOOT
CAPTION VPN Client - Install Virtual Network Adapter
STATIC1 The VPN Client Virtual Network Adapter has been installed. \r\nIt is necessary to shutdown Windows now and restart the computer. \r\n\r\nThe computer will restart automatically. If the computer does not restart, please restart the computer manually.
PREFIX D_EM_MAIN
CAPTION SoftEther EtherLogger Manager
STATIC1 SoftEther EtherLogger is a service that captures data flowing through LAN cards connected to the computer and keeps a log of the headers of the packet types specified by the administrator and all data in text file format. \r\n\r\nCurrently, the following capture devices are performing capture logging.
B_PASSWORD Administration &Password
B_LICENSE &License
B_ADD &Add
IDOK &Edit
B_DELETE &Delete
IDCANCEL E&xit
PREFIX D_EM_ADD
STATIC1 Name of Network Adapter Used for Capture:
R_PROMISCUS Do&n't Use Promiscuous Mode During Capture
STATIC2 &Packet Log:
S_PACKET Log File S&witch Cycle:
S_PACKET_0 TCP Connection Log:
B_PACKET_0_0 Save Nothing
B_PACKET_0_1 Header Information Only
B_PACKET_0_2 Whole Packet Contents
S_PACKET_1 TCP Packet Log:
B_PACKET_1_0 Save Nothing
B_PACKET_1_1 Header Information Only
B_PACKET_1_2 Whole Packet Contents
S_PACKET_2 DHCP Packet Log:
B_PACKET_2_0 Save Nothing
B_PACKET_2_1 Header Information Only
B_PACKET_2_2 Whole Packet Contents
S_PACKET_3 UDP Packet Log:
B_PACKET_3_0 Save Nothing
B_PACKET_3_1 Header Information Only
B_PACKET_3_2 Whole Packet Contents
S_PACKET_4 ICMP Packet Log:
B_PACKET_4_0 Save Nothing
B_PACKET_4_1 Header Information Only
B_PACKET_4_2 Whole Packet Contents
S_PACKET_5 IP Packet Log:
B_PACKET_5_0 Save Nothing
B_PACKET_5_1 Header Information Only
B_PACKET_5_2 Whole Packet Contents
S_PACKET_6 ARP Packet Log:
B_PACKET_6_0 Save Nothing
B_PACKET_6_1 Header Information Only
B_PACKET_6_2 Whole Packet Contents
S_PACKET_7 Ethernet\r\nPacket Log:
B_PACKET_7_0 Save Nothing
B_PACKET_7_1 Header Information Only
B_PACKET_7_2 Whole Packet Contents
IDOK &OK
IDCANCEL Cancel
STATIC3 Saving large volume packet logs can place a large burden on the CPU and the hard disk and it can cause lower performance of the entire system. Please configure settings so that only the necessary packet log information is saved.
PREFIX D_EM_PASSWORD
CAPTION Change Administrator Password
S_TITLE You can change the administrator password. Click OK after entering the new password.
STATIC1 New &Password:
STATIC2 &Confirm:
IDOK &OK
IDCANCEL Cancel
PREFIX D_EM_LICENSE
CAPTION Add or Delete License
STATIC1 To use SoftEther EtherLogger you must acquire a valid license and register the license key. Using this window, you can register a new license key, delete a registered license key and display the current license list and the license mode of the SoftEther EtherLogger.
S_BOLD &List of Currently Registered Licenses:
B_OBTAIN &Obtain License
STATIC2 Click Obtain License to display the website that will provide instructions on how to obtain a license.
B_ADD &Add License Key Registration
B_DEL &Delete
IDOK &Information About License
STATIC3 Select a license and click Information About License to connect to SoftEther VPN Project's website (softether.com) and view the registered information relating to the selected license.
S_BOLD2 Current License &Mode of SoftEther EtherLogger:
IDCANCEL E&xit
PREFIX D_EM_LICENSE_ADD
CAPTION Add License Key Registration
S_INFO You can register a license key of a SoftEther EtherLogger product license.
STATIC1 The license keys are 36 alphanumeric characters in length plus hyphens. They are key codes that certify the ownership of a license. \r\n\r\nWhen a license certificate is received together with this software, the license key is printed on this license certificate. If the license for this software has been purchased online, the license key is provided by email and on the website window at the time the license is purchased. The license key may also be written down by some other method. If you don't know where the license key is written down, ask the vendor who sold you the license.
STATIC2 &Input the License Key Correctly:
STATIC3 Enter the license key by separating the input into 6-digit groups. You don't need to input the hyphens. It is also possible to copy && paste the license key.
B_INFO2 This software has world-wide copyright protection. Customers can only make copies and use this software in accordance with the license conditions. Warning: Use of illegitimately obtained license keys, use of a single license on multiple servers, or unauthorized distribution of licenses is a breach of the license agreement and such action may result in civil or legal proceedings.
IDOK &Register
IDCANCEL Cancel
PREFIX D_EM_REMOTE
STATIC1 &Specify the Host Name of the Destination Computer, or IP Address:
R_LOCAL Connect to &Local Computer (Computer Displaying this Window)
S_HOSTNAME &Computer Name:
IDOK &OK
IDCANCEL Cancel
B_ABOUT Version information
PREFIX D_SM_CONFIG
CAPTION Edit Config File
IDC_INFO The current configuration of the VPN Server "%S" is as follows.\r\nYou can edit the contents of this configuration file and apply it to the VPN Server.
B_EXPORT &Save to File
B_IMPORT &Import File and Apply
IDCANCEL &Close
STATIC1 You can edit the configuration file by using any text editors. When applying the edited configuration file to the VPN Server, the VPN Server will automatically restart and launch according to the new configuration file. If an invalid configuration file is applied, errors will occur and the current setting contents will get lost, so be careful when editing the configuration file.
B_FACTORY &Restore to Factory Default
PREFIX D_SM_ADMIN_OPTION
CAPTION Virtual Hub Administration Option
S_INFO Currently the following administration options are set for the Virtual Hub "%S".
B_ADD &Add Value
B_EDIT &Edit Value
B_DELETE &Delete Value
STATIC1 The purpose of the Virtual Hub administration options is to set limitations to administrators who are in Virtual Hub Admin Mode.
IDOK &Save
IDCANCEL Cancel
STATIC2 Only an administrator for this entire VPN Server may edit the Virtual Hub administration options. The individual Virtual Hub administrators are unable to change the administration options, however they are able to view them.\r\nHowever, if allow_hub_admin_change_option is set to "1", then Virtual Hub administrators are able to edit the administration options.
S_BOLD Description:
PREFIX D_SM_MSG
CAPTION Set the Message
S_MSG_2 You can set a message to display on the screen of a user when a VPN Client connects to the Virtual Hub "%S". To show a message, input the message that you want to show.
C_USEMSG Show &Message
STATIC1 About the Message Display Funcion
S_INFO The VPN Client must be Version 3.0 or later.\r\n\r\nSpecify a single line starts with "http://" as the message to open the default Web browser on the client instead to showing a message.
IDOK &OK
IDCANCEL Cancel
PREFIX D_NICINFO
CAPTION Virtual Network Adapter "%S" Status
IDCANCEL &Close
PREFIX D_SM_VLAN
CAPTION VLAN Transparency Setting Tool
STATIC1 Some network adapters are unable to transmit tagged-VLAN packets (IEEE802.1Q) transparency. by default\r\n\r\nIf you use such a network adapter to bridge to the Virtual Hub and need to exchange Ethernet packets with VLAN tags, you have to configure the network adapter to enable processing packets for VLAN transparency.
B_ENABLE Configure the Selected Network Adapters to VLAN Transparency
B_DISABLE &Unset the Configuration
STATIC2 About the VLAN Transparency Setting Tool
S_WARNING This tool can enable or disable the transparency for tagged VLAN packets on Intel, Broadcom or Marvell's network adapters. (Only using the vendor provided drivers for Windows.)
S_WARNING2 The above network adapters in the list means supported by this tool. No other network adapters can be configured by this tool. However, other network adapters which is not on the list might be able to support tagged VLAN packets by default or by using some configuration.\r\n\r\nSuch network adapters must be configured by the system administrator with logged on Windows.
IDCANCEL E&xit
PREFIX D_SM_SIMULATION
CAPTION Delay and Packet Loss Generating Function
STATIC1 This function can generate delays, jitters and packet losses on packets which match the condition of this access list entry when transmitted via this Virtual Hub.\r\n\r\nThis function is convenient to simulate a low-quality and slow Internet, WAN or wireless connections on the desk or laboratory. For example, you can use it to evaluate and test IP telephonies (VoIP).
STATIC2 Generate Delays, Jitters and Packet Losses as follow:
C_DELAY Generate &Delays
S_DELAY The Period of Delay (0 - 10000) :
S_DELAY2 milliseconds
C_JITTER Generate &Jitters (Fluctuation)
S_JITTER The Ratio of Jitter (0 - 100) :
S_JITTER2 Percent (%)
C_LOSS Generate Packet &Losses
S_LOSS The Ratio of Packet Losses (0 - 100) :
S_LOSS2 Percent (%)
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_AO_VALUE
CAPTION Name and Value
STATIC1 &Name:
STATIC2 &Value:
STATIC3 (Integer)
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_L3
CAPTION Virtual Layer 3 Switch Setting
STATIC1 You can define Virtual Layer 3 Switches between two or more Virtual Hubs operating on this VPN Server to achieve routing between different IP networks.
STATIC2 The Virtual Layer 3 Switch functions are provided for network administrators or people who know a lot about networking and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions.\r\n\r\nIf the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing.
STATIC3 Cautions about Virtual Layer 3 Switch Function
S_BOLD Defined Virtual &Layer 3 &Switches:
B_ADD &New
B_START &Start
B_STOP S&top
IDOK &Edit
B_DELETE &Delete
IDCANCEL &Close
PREFIX D_SM_L3_ADD
CAPTION New Virtual Layer 3 Switch
STATIC1 To create a new Virtual Layer 3 Switch, enter a name for the switch. \r\n\r\nThe Virtual Layer 3 Switch cannot have the duplicated name as another Virtual Layer 3 Switch on this VPN Server.
STATIC2 &Name:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_L3_SW
CAPTION Edit Virtual Layer 3 Switch "%S"
STATIC1 You can define multiple virtual interfaces and routing tables on a Virtual Layer 3 Switch.
STATIC2 A virtual interface is associated to a Virtual Hub and operates as a single IP host on the Virtual Hub when the Virtual Hub is running. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. \r\nIt is possible to manually set the routing table and more detailed settings.
S_BOLD1 Virtual &Interfaces:
B_ADD_IF &New Virtual Interface
B_DEL_IF D&elete Virtual Interface
S_BOLD2 Routing &Table:
B_ADD_TABLE A&dd Routing Table Entry
B_DEL_TABLE De&lete Routing Table Entry
B_START &Start
B_STOP S&top
IDCANCEL &Close
PREFIX D_SM_L3_SW_IF
CAPTION Add Virtual Interface
STATIC1 Adds a new virtual interface to the Virtual Layer 3 Switch. \r\n\r\nYou must define the IP network that the virtual interface belongs to and the IP address of the interface itself. \r\nPlease select or enter the name of the virtual Hub that the interface will attach to.
STATIC2 Virtual Hub to &Attach
STATIC3 Select or enter the name of the Virtual Hub that this interface will attach to.
STATIC4 Virtual &Hub:
STATIC5 IP A&ddress and Subnet Mask of Virtual Interface:
STATIC6 The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. \r\n\r\nRouting via the Virtual Layer 3 Switches attaching to multiple virtual Hubs operates based on the IP address is specified here.
S_SRC_IP_1 &IP address:
S_SRC_IP_2 &Subnet Mask:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_L3_SW_TABLE
CAPTION New Routing Table Entry
STATIC1 Adds a new routing table entry to the routing table of the Virtual Layer 3 Switch. \r\n\r\nIf the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute the routing.
STATIC2 Definitions of Routing Table &Entry:
STATIC3 The virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. \r\n\r\nRouting via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here.
S_SRC_IP_1 &Network Address:
S_SRC_IP_2 &Subnet Mask:
S_SRC_IP_3 &Gateway Address:
S_SRC_IP_4 &Metric Value:
STATIC4 Note: To specify the default gateway, specify '0.0.0.0' for both the network address and the subnet mask.
IDOK &OK
IDCANCEL Cancel
PREFIX D_CM_SELECT_SECURE
CAPTION Select Smart Card
STATIC1 Select the type of smart card device to use. \r\n\r\nThe types of smart cards listed in this list have had their drivers installed on the current computer and are supported by VPN software. \r\nIf there is a type of smart card that is currently being used that does not appear in the list, it may be possible that update of the VPN software to a newer version enable you to use it. \r\n\r\nNote: If a driver is not displayed immediately after installation, restart Windows.
IDOK &OK
IDCANCEL Cancel
PREFIX D_CM_SECURE_MANAGER
CAPTION Smart Card Manager
S_INFO Current Smart Card:\r\n\r\n%S
B_BOLD Objects stored on the smart card:
B_REFRESH &Refresh Object List
B_IMPORT &Import to Card...
B_EXPORT &Export from Card...
B_DELETE &Delete from Card
B_NEW_CERT &Write New Certificate and Private Key to Card...
B_PIN &Change PIN Code...
IDCANCEL Close
PREFIX D_CM_SECURE_TYPE
CAPTION Select Object Type
STATIC Select the type of the object you want to import.
R_CERT &Certificate
R_KEY Private &Key
R_DATA &Data
IDOK &OK
IDCANCEL Cancel
PREFIX D_STRING
CAPTION VPN Software
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_SELECT_KEYPAIR
CAPTION Specify Certificate in Smart Card
S_INFO Currently selected smart card:\r\n\r\n%S
B_BOLD1 Select the certificate in the smart card.
IDOK &OK
IDCANCEL Cancel
B_BOLD2 Select the corresponding private key.
PREFIX D_CM_LOAD_X
CAPTION Load Certificate
STATIC1 Select the method to load the certificate.
R_FROM_FILE Load Certificate from &File
R_FROM_SECURE Load Certificate from &Smart Card
S_FILE You can load a certificate from a file that stores certificate data (extensions: .cer, .crt, .p12, .pfx).
S_CERT If a smart card is connected to this computer, you can load a certificate from a smart card.
B_SELECT &Select Which Smart Card to Use...
IDOK &OK
IDCANCEL Cancel
PREFIX D_CM_SECURE_PIN
CAPTION Change PIN Code
STATIC1 You can change the PIN code (secret number) of the smart card. \r\n\r\nTo change the PIN code, you are required to enter the current PIN code and the new PIN code twice.
STATIC2 &Current PIN code:
STATIC3 &New PIN Code:
STATIC4 Con&firm New PIN:
STATIC5 Note
STATIC6 If you incorrectly input the current PIN a certain number of times, the smart card will be rendered unusable.
STATIC7 Please insert the smart card and click OK.
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_CRL
CAPTION Certificates Revocation List
STATIC1 You can manage the Certificates Revocation List on this Virtual Hub. \r\n\r\nBy adding certificates in Certificates Revocation List, the clients who provide these certificates will be denied to connect to this Virtual Hub using certificate authentication mode.
B_ADD &Add
IDOK &Edit
IDCANCEL &Close
B_DELETE &Delete
PREFIX D_SM_EDIT_CRL
CAPTION Revoked Certificate
STATIC1 You can set the contents of an entry on the revocation list. \r\n\r\nWhen a user connects to a Virtual Hub in certificate authentication mode and that certificate matches one or more of the contents defined in the Certificates Revocation List, the user will be denied to connect.
S_BOLD The certificates that matches all the fields of the items will be disabled.
STATIC2 Contents of Certificate:
R_CN Common Name (CN):
R_O Organization (O):
R_OU Organization Unit (OU):
R_C Country (C):
R_ST State (ST):
R_L Locale (L):
STATIC3 Certificate Attribute Value:
R_SERI Serial Number (Hex):
R_MD5_HASH MD5 Digest Value (Hex, 128 bit):
R_SHA1_HASH SHA-1 Digest Value (Hex, 160 bit):
STATIC4 A digest value (hash value) can identify the particular certificate exactly. If you specify a MD5 or SHA-1 digest value, you need not to specify other items.
STATIC5 Import Values from a Certificate File
STATIC6 If there is a certificate file that you want to disable, you can correctly specify the certificate and add it to the invalid list by importing that file. Click Load Certificate and the contents of the specified certificate file will be imported automatically.
B_LOAD &Load Certificate...
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_AC_LIST
CAPTION Source IP Address Limit List
S_TITLE To allow or deny VPN connections to this VPN Server Virtual Hub "%S" according to the client computer's IP address, you can set the rules to allow or deny the connection below.
B_ADD &New Rule
IDOK &Edit Rule
B_DELETE &Delete Rule
B_SAVE &Save
IDCANCEL &Cancel
STATIC1 Items with higher priority appear higher in the list.
STATIC2 If the client's IP address does not match any item in the list, VPN connection to this Virtual Hub will be allowed.
PREFIX D_SM_AC
CAPTION Edit Rule Entry of Source IP Address Limit List
STATIC1 Define a rule in the IP Access Control List. The values set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub.
STATIC2 Defines of a Rule
STATIC3 Apply this Rule when the client's IP address matches the following:
R_SINGLE &Single IP Address
R_MASKED &Multiple IP Addresses (Specify by IP Network Address and Mask)
STATIC4 &Address:
S_MASK Net Mas&k:
STATIC5 Action
R_PASS &Permit
R_DENY &Deny
STATIC6 Others
STATIC7 P&riority:
STATIC8 (Integer: higher priority is given to smaller numbers)
STATIC9 IP Protocol Version
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_LOG_FILE
CAPTION Log File List
STATIC1 You can download log files that are saved on the server. \r\n\r\nThe administrator of the entire VPN Server is granted to download all Virtual Hub logs and server logs. Virtual Hub administrators are granted to download the log file for that Virtual Hub.
IDOK &Download
B_REFRESH &Refresh
IDCANCEL Close
PREFIX D_SM_READ_LOG_FILE
CAPTION Download File
S_INFO2 Downloading the file "%S" from the VPN Server. \r\nPlease wait...
IDCANCEL &Stop Download
PREFIX D_SM_SAVE_LOG
CAPTION Downloaded Log File
S_INFO The file "%S" has been downloaded. \r\n\r\nYou can open or save this file.
IDOK &Open
B_SAVE &Save
IDCANCEL Cancel
PREFIX D_TCP
CAPTION TCP Optimization Utility
STATIC1 By optimizing the TCP/IP settings on Windows, it is possible to increase the network communication throughput of this computer. \r\n\r\nBy using this TCP Optimization Utility, you can easily configure the settings for optimize the parameters.
STATIC2 Current TCP/IP setting parameters of Windows is as follows. By changing these values you can optimize the TCP/IP settings. Using this utility any time later you can reset the values or restore them to the previous setting.
STATIC3 TCP/IP Communication Setting:
STATIC4 TCP &Receiving Window Size:
R_RECV_DISABLE Use OS &Default Value
R_RECV_ENABLE S&et the Values Below
S_RECV bytes
B_RECV Default Value
STATIC5 TCP &Sending Window Size:
R_SEND_DISABLE Use OS Default Value
R_SEND_ENABLE Set the Values Below
S_SEND bytes
B_SEND Default Value
IDOK &OK
IDCANCEL Cancel
STATIC6 The changes above will take effect after Windows has rebooted. After changing the settings, you do not need to immediately reboot the computer, but until it is rebooted the TCP/IP optimized settings will not take effect.
B_DELETE Do not Manage by this Utility
PREFIX D_TCP_MSG
CAPTION TCP Optimization
STATIC1 By optimizing the TCP/IP settings on Windows, it is possible to increase the network communication throughput of this computer. Do you want to optimize the communication settings?\r\n\r\nYou can start at any time in the future the TCP Optimization Utility and optimize the communication settings or restore them to their previous values.
STATIC2 When the TCP/IP settings are changed, the changes will take effect after Windows has restarted. After changing the settings, you do not need to immediately restart the computer, but until it is restarted the TCP/IP optimized settings will not take effect.
R_OPTIMIZE &Automatically Optimize Communication Settings
R_MANUAL &Manually Optimize Using TCP Optimization Utility
R_NO &Do not Optimize
IDOK &Next >
IDOK3 < &Back
PREFIX D_CM_PKCSEULA
CAPTION Notice to Use Smart Card's Drivers
S_INFO_1 You are attempting to access the smart card with software "%S".
S_INFO_2 When using software "%S", if there are conditions of use for this software and the smart card that is to be used, you must agree to these conditions of use before using them. \r\n\r\nFor details please contact the vendor of software "%S" and of the smart card.
S_INFO_3 Do you agree to the above and want to use the software "%S" and access the specified smart card?
IDOK &Yes
IDCANCEL &No
PREFIX D_CM_TRAFFIC
CAPTION Network Traffic Speed Test Tool
STATIC1 Network Traffic Speed Test Tool performs transmitting packets between two computers connected with TCP/IP, with large amount of throughput as possible, in order to measure the actual network traffic speed available. This tool can be used for not limited VPNs, but it is useful for physical networks.
STATIC2 Use this tool to measure the current bandwidth capacity of the network. Note that the value obtained is sometimes lower than the actual network processing capacity due to the CPU performance of both endpoints, what other programs are currently running and fluctuations in the rate of use of the network.
S_1 Configurations:
S_3 Which is the role of this computer?
R_SERVER Test &Server
R_CLIENT Test &Client
S_4 To activate the test server, specify the listening port number.\r\nTo use it as the test client, specify the host name of the destination test server or the IP address, and port number. If necessary, configure the optional settings below.
S_5 Destination Test Server &Hostname:
S_6 &Port Number:
S_7 (TCP port)
S_8 Configure following options on the client side.
S_9 Direction of Data Communication
R_DOWNLOAD &Download (Incoming: from Server to Client)
R_UPLOAD &Upload (Outgoing: from Client to Server)
R_FULL Download and Upload (&Full-Duplex Mode: In and Out Simultaneously)
S_10 Advanced Settings
S_11 &Number of Concurrent Parallel TCP Connections:
S_12 Me&asuring Period:
S_13 seconds
R_ETHERNET Correct L2 Throughput Assuming &Ethernet
R_DOUBLE Relay Device Mode
S_14 connections
IDOK &Run
IDCANCEL Cancel
S_15 You can also run this tool from the vpncmd Command-line Management Utility (also available on non-Windows OS).
PREFIX D_CM_TRAFFIC_RUN
CAPTION Network Traffic Speed Test Tool
S_INFO The Network Traffic Speed Test Tool is running. The operating status is as follows.
STATIC1 To abort the Network Traffic Speed Test Tool, click Exit.
IDCANCEL &Exit
PREFIX D_CM_TRAFFIC_RESULT
CAPTION Communication Traffic Measurement Results
STATIC1 Communication traffic has been measured. The results are shown below.
IDCANCEL &Close
PREFIX D_SM_LICENSE
CAPTION Add or Remove License
STATIC1 To use SoftEther VPN Server you must acquire a valid license and register the license key. You can register a new license key, delete a registered license key and display the current license list and the license mode of the VPN Server here.
S_BOLD Currently Registered &License Keys:
B_OBTAIN &Obtain or Extend a License
STATIC2 Click Obtain or Extend License to visit the website that will provide instructions on how to obtain a license.
B_ADD &Add a License Key
B_DEL &Delete
IDOK &Information About License
STATIC3 Select a license and click Information About License to connect to SoftEther VPN Project's website (softether.com) and view the registered information relating to the selected license.
S_BOLD2 Current License &Mode of SoftEther VPN Server:
IDCANCEL E&xit
PREFIX D_SM_LICENSE_ADD
CAPTION Add License Keys
S_INFO You can register a SoftEther VPN Server product license or a connection license.
STATIC1 The license keys are 36 alphanumeric characters in length plus dashes. They are key codes that certify the ownership of a license. \r\n\r\nWhen a license certificate is received together with this software, the license key is printed on this license certificate. If the license for this software has been purchased online, the license key is provided by email and on the website window at the time the license is purchased. The license key may also be written down by some other method. If you don't know where the license key is written down, ask the vendor who sold you the license.
STATIC2 &Input the License Key Accurately:
STATIC3 Enter the license key by separating the input into 6-digit groups. You don't need to input the dashes. It is also possible to copy && paste the license key.
B_INFO2 This software is protected by world-wide copyright laws. Customers can only make copies and use this software in accordance with the license conditions. Warning: Use of illegitimately obtained license keys, use of a single license on multiple servers, or unauthorized distribution of licenses is a breach of the license agreement and such action may result in civil or legal proceedings.
IDOK &Register
IDCANCEL Cancel
PREFIX D_FREEINFO
CAPTION About SoftEther VPN Server Free Edition
S_INFO_1 Thank you for trying out the SoftEther VPN Server Free Edition.
S_INFO_2 The SoftEther VPN Server operating on destination server "%S" is the Free Edition intended for personal use. \r\nWhen using the Free Edition, you can use all the SoftEther VPN Server functions but the User Agreement prohibits the following usage.
S_INFO_3 Use where communication for commercial purposes travels via the VPN Server.
S_INFO_4 Note that if the software is used based on the above mentioned prohibited usage, it is a breach of the SoftEther VPN Server user agreement. The above restriction is lifted once you obtain a regular product license for SoftEther VPN Server. For details on the regular product version, please visit www.softether.com. \r\n\r\nIf this server is being used under the usage described above, please contact us via our website at www.softether.com. \r\n\r\nNote: This window will appear when connected to a Free Edition of VPN Server. This window does not appear when Editions other than the Free Editions of the software product are used. \r\nNote: Apart from this notification window, there are absolutely no differences between the Free Edition software and the product version.
B_HIDE &Hide this window next time.
IDCANCEL &OK
PREFIX D_CM_SETTING
CAPTION Switch SoftEther VPN Client Operating Mode
STATIC1 You can use SoftEther VPN Client in either Normal Mode or Easy Mode. To switch to the other mode, check the respective checkbox below.
R_NORMAL &Normal Mode
R_EASY &Easy Mode
STATIC2 When using Normal Mode, you can perform all the operations that the SoftEther VPN Client software provides. We recommend that general users and system administrators use this mode.
STATIC3 Easy Mode only allows the most frequently used operations such as connecting to the VPN Server. We recommend this mode to beginner users.
STATIC4 By using the Setting Locker, you can connect to a VPN Server by using a Connection Setting registered in SoftEther VPN Client, but by doing so, you are prevented from changing the parameters of Connection Settings, creating a new Connection Setting or deleting a Connection Setting.
R_LOCK Enable Setting &Locker
S_PASSWORD1 You can specify a password. The input of that password will be required next time to disable the Setting Locker.
S_PASSWORD2 &Password:
S_PASSWORD3 &Confirm:
IDOK &OK
IDCANCEL Cancel
S_VGS2 You can configure the VPN Gate Academic Service settings.
B_VGS VPN &Gate Service Settings...
PREFIX D_CM_EASY
CAPTION SoftEther VPN Client Easy Manager
B_MODE Switch Operation &Mode
IDCANCEL &Close
B_STATUS View Connection &Status
B_VGC VPN Gate Academic Project
PREFIX D_SM_SETUP
CAPTION SoftEther VPN Server / Bridge Easy Setup
S_TITLE SoftEther VPN Server / Bridge Easy Setup
IDC_STATIC_1 By using this setup you can easily setup a SoftEther VPN Server or VPN Bridge for the following use and purpose. After exiting the setup, you can use the VPN Server Manager to freely configure more advanced settings.
S_BOLD Select the type of VPN server you want to build. Multiple types can be selected together.
C_REMOTE &Remote Access VPN Server
S_REMOTE_1 The Remote Access VPN Server allows VPN Client computers in remote locations to access to the existing Ethernet segments, for example company LAN.\r\nAny VPN Clients who is connecting to the VPN Server will be able to access to the network as if they are connected directly and physically to the network.
C_SITE &Site-to-site VPN Server or VPN Bridge
S_SITE_1 Site-to-site VPN is a VPN configuration to connect between two or more remote Ethernet segments.\r\nEach of the sites are connected together, and become the same segment at Layer-2 level. It enables any computers of each sites to communicate to each other as if there is a single network.
S_SITE_2 Select the role of this VPN Server:
C_CENTER VPN Server that Accepts Connection from Other Sites (&Center)
C_EDGE VPN Server or VPN Bridge at Each Site (&Edge)
C_OTHER &Other Advanced Configuration of VPN
S_OTHER Select this if you are planning to build a VPN system that provides advanced functions such as a clustering function and a Virtual Layer 3 Switch function.
IDOK &Next >
IDCANCEL &Close
PREFIX D_SM_SETUP_HUB
CAPTION Easy Setup - Decide the Virtual Hub Name
IDC_STATIC_1 You have to create one Virtual Hub on the VPN Server at least. Name the new Virtual Hub as you prefer.
IDC_STATIC_2 Virtual Hub &Name:
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_SETUP_STEP
CAPTION VPN Easy Setup Tasks
IDC_STATIC_1 To complete the setup of this VPN Server / VPN Bridge, you must complete the following tasks.
S_1_1 Step 1. Create a User to Accept VPN Connection
S_1_2 When this VPN Server accepts a remote access VPN, or becomes the central site-to-site VPN server that accepts connections from other sites, create users to accept the VPN connection.
B_USER Create &Users
S_2_1 Step 2. Define a Connection to Destination VPN Server
S_2_2 When this VPN Server is installed on a particular site (edge) of a site-to-site VPN, you have to specify the address of the center VPN Server that accepts the connections, and establish a connection to that central VPN Server.
B_CASCADE &Configure Connection Setting
S_3_1 Step 3. Set Local Bridge
S_3_2 For an site-to-site VPN, use the Local Bridge Function to connect a bridge between the virtual Ethernet segment on the VPN side and the physical Ethernet segment on the local side. Select an existing Ethernet device (Network Adapter) that will be provide the bridge connection to the VPN.
IDCANCEL &Close
IDC_STATIC_8 Once the required settings are configured, click Close. An advanced management tool for VPN Server / VPN Bridge will be appeared. You can then configure any advanced settings as you wish.
B_SECURENAT Configure SecureN&AT
PREFIX D_CPU64_WARNING
CAPTION Information on SoftEther VPN 64-bit Edition
S_BOLD The SoftEther VPN software currently installed is the 32-bit edition, but the Windows operating system that is currently running is a 64-bit edition.
S_INFO You can run the 32-bit edition of SoftEther VPN software on a 64-bit edition of Windows, but it will run on Window's 32-bit emulator, and this results in reduced performance. \r\nThere is also a possibility that some functions are not supported. \r\n\r\nWe strongly recommend you to install and use the 64-bit edition of SoftEther VPN software when running it on 64-bit Windows. \r\nYou can download the 64-bit edition of the SoftEther VPN software from http://selinks.org/. \r\n\r\nThis dialog box will close automatically in 30 seconds.
IDOK &OK
PREFIX D_ONCEMSG
CAPTION TITLE
C_DONTSHOWAGAIN &Do not show this message again
IDCANCEL &OK
PREFIX D_CONNECT
IDCANCEL Cancel
PREFIX D_SM_IPSEC
CAPTION IPsec / L2TP / EtherIP / L2TPv3 Settings
S_TITLE IPsec / L2TP / EtherIP / L2TPv3 Server Settings
S_3 Virtual Hubs on the VPN Server can accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP / L2TPv3 Site-to-Site VPN Connection.
S01 L2TP Server (Remote-Access VPN Server Function)
S02 VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from built-in VPN Clients on Mac OS X and Windows can be accepted.
R_L2TP_OVER_IPSEC Enable L2TP Server Function (L2TP over IP&sec)
S03 Make VPN Connections from iPhone, iPad, Android, Windows, and Mac OS X acceptable.
R_L2TP_RAW Enable L2TP Server Function (Raw &L2TP with No Encryptions)
S04 It supports special VPN Clients which uses L2TP with no IPsec encryption.
S_1 Default Virtual &Hub in a case of omitting a name of Hub on the Username:
S_2 Users should specify their username such as "Username@Target Virtual Hub Name" to connect this L2TP Server.\r\nIf designation of a Virtual Hub is omitted, the below Hub will be used as the target.
S05 EtherIP Server Function (Site-to-Site VPN Connection)
S06 Router products which are compatible with EtherIP / L2TPv3 over IPsec can connect to Virtual Hub on the VPN Server and establish Layer-2 (Ethernet) Bridging.
R_ETHERIP Enable &EtherIP / L2TPv3 over IPsec Server Function
B_DETAIL EtherIP / L2TPv3 &Detail Settings
S07 IPsec &Common Settings
S_PSK IPsec &Pre-Shared Key:
S_PSK2 IPsec Pre-Shared Key is also called "PSKs" or "Secrets". Specify it with around eight ASCII characters, and let all VPN users know.
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_ETHERIP
CAPTION EtherIP / L2TPv3 Server Detail Settings
S_TITLE EtherIP / L2TPv3 Server Detail Settings
S01 EtherIP / L2TPv3 over IPsec compatible routers can connect to Virtual Hubs on VPN Server and establish Layer-2 (Ethernet) Bridge. For instance, Cisco routers, NEC IX series and IIJ SEIL routers are recommended as compatible VPN routers.
S02 In order to accept EtherIP / L2TPv3 protocol, define appropriate EtherIP / L2TPv3 Client Settings to identify the client site of the router beforehand. A EtherIP / L2TPv3 Client Setting must have a corresponding IPsec Phase 1 ID.
S_BOLD &Table of IPsec Phase 1 ID and the Virtual Hub
B_ADD &Add
IDOK &Edit
B_DELETE &Delete
IDCANCEL E&xit
PREFIX D_SM_ETHERIP_ID
CAPTION EtherIP / L2TPv3 over IPsec Client Setting
S01 The following Virtual Hub connection settings will be applied only when an EtherIP / L2TPv3 over IPsec Client is attempting to connect this VPN Server with an ISAKMP (IKE) Phase ID which is exactly equal to the value specified below.
S02 ISAKMP Phase 1 &ID:
S03 Virtual &Hub:
S04 &Username:
S05 &Password:
S06 Note that the username and the password must be same as a registered on the Virtual Hub. An EtherIP / L2TPv3 Client will be regarded as it connected the Virtual Hub with the identification of the above user information.
IDOK &OK
IDCANCEL Cancel
S07 The ID must be exact same as an ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP / L2TPv3 Client uses IP address as Phase 1 ID. You can specify '*' (asterisk) as a wildcard to match any other clients which don't match other explicit rules.
PREFIX D_SM_OPENVPN
CAPTION OpenVPN / MS-SSTP Settings
S_TITLE OpenVPN / MS-SSTP VPN Clone Server Function Settings
S_1 This VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc.\r\n\r\nAny OpenVPN Clients can connect to this VPN Server.
R_OPENVPN Enable &OpenVPN Clone Server Function
S_UDP UDP Ports to Listen for OpenVPN:
B_DEFAULT Restore &Default
S_UDP2 Multiple UDP ports can be specified with splitting by space or comma letters.\r\nOpenVPN Server Function also runs on TCP ports. Any TCP ports which are defined as listeners on the VPN Server accepts OpenVPN Protocol respectively and equally.
S_TOOL Sample File Generating Tool for OpenVPN Clients
S_TOOL2 Making a OpenVPN Client configuration file is a very difficult job. You can use this tool to generate an appropriate OpenVPN Client configuration file. The generated configuration sample can be used immediately.
B_CONFIG Generate a Sample &Configuration File for OpenVPN Clients
S_2 Microsoft SSTP VPN Clone Server Function
S_3 This VPN Server has the clone functions of MS-SSTP VPN Server which is on Windows Server 2008 / 2012 by Microsoft Corporation.\r\nBuilt-in MS-SSTP Clients on Windows Vista / 7 / 8 / RT / 10 can connect to this VPN Server.
R_SSTP Enable &MS-SSTP VPN Clone Server Function
S_SSTP The value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the client, and that certificate must be in the trusted list on the client. For details refer the Microsoft's documents.
S_4 The manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using these clone server functions are same to the IPsec Server functions.
B_IPSEC I&Psec Server Configuration
S_13 OpenVPN Clone Server Function
IDOK &OK
IDCANCEL Cancel
PREFIX D_SM_DDNS
CAPTION Dynamic DNS Function
S_TITLE Dynamic DNS Function
S_BOLD This VPN Server has a Built-in Dynamic DNS Function.
S_1 The Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name.
S_22 Also, if your ISP assigns you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address.\r\nTherefore, you need not any longer to keep static global IP addresses with expenses monthly costs.
S_3 Moreover, this VPN Server version supports 'NAT-Traversal' function. If the VPN Server is inside the NAT and is assigned only a private IP address, you can connect to that VPN Server from the Internet side without any special settings on the NAT beforehand.
S_4 Current &Status:
S_STATUS3 Assigned Dynamic DNS &Hostname:
B_HINT Hint
S_STATUS4 Global IPv&4 Address:
S_STATUS5 Global IPv&6 Address:
S_5 Modify the Settings:
S_STATUS6 &Change the Dynamic DNS Hostname:
S_STATUS7 Hostname is with only alphabets numeric, and dashes '-'. Three letters at least.\r\nYou can change it any time later.
IDOK Set to &Above Hostname
B_RESTORE &Restore
S_2 If you are not connected to IPv6 Internet, "Global IPv6 Address" should show an error.\r\nA few countries or territories might prohibit Dynamic DNS Service.
IDCANCEL E&xit
B_DISABLE &Disable Dynamic DNS Function
B_PROXY Connect via &Proxy Server...
S_STATUS8 DNS Key:
B_HINT2 Hint
PREFIX D_SM_SPECIALLISTENER
CAPTION VPN over ICMP / DNS Function Settings
S_TITLE VPN over ICMP / DNS Function
S_1 VPN over ICMP / DNS Function
S_2 You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You need to enable the following functions beforehand.
R_OVER_ICMP Enable VPN over &ICMP Server Function
R_OVER_DNS Enable VPN over &DNS Server Function (Uses UDP Port 53)
IDOK &OK
IDCANCEL Cancel
S_3 Requires VPN Client / VPN Bridge internal version 4.0 or greater.
S_4 Warning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using.
PREFIX D_SM_REDIRECT
CAPTION HTTP URL Redirection Settings
S_1 The specified URL below will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub.\r\n\r\nTo use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address.
S_2 Specify a URL which redirects to.
S_BOLD2 The &URL Redirect To:
S_3 Example:
S_4 Simple URL Redirection:
S_5 Advanced URL Redirection:
B_HINT &Usage of Advanced URL Redirection Function...
S_6 Caption
S_BOLD This function is for TCP/IP expert administrator. Read the following instructions and be careful to set up.
S_7 This redirection rule is not effective in the case that the destination session of a packet matches the destination username or groupname of an access list entries.
S_8 This redirection rule is ignored for non-TCP packets if it matches the condition.
S_9 This redirection rule always replies HTTP redirect messages. (Not limited for port 80.) If you want to apply to only port 80, set the destination port to 80 on the condition of the access list entry.
S_10 If as the result of redirection by this rule the client attempts to access the redirected URL and such a new request matches this rule again, the redirection results will be replied for such new requests. It will cause an infinite redirection loop.
IDOK &OK
IDCANCEL Cancel
S_11 The advanced redirection function can provide the VPN Session information to the CGI which is redirected to.
PREFIX D_SW_WELCOME
CAPTION D_SW_WELCOME
S_WELCOME SoftEther VPN is freeware developed at University of Tsukuba, Japan. High-performance VPN with the ultimate compatibilities to many devices. Windows, Mac, smartphones, tablets (iPhone, iPad, Android, Windows RT) and Cisco or other VPN routers are supported. SoftEther VPN also accepts OpenVPN and MS-SSTP VPN clients.
S_TITLE Extremely Powerful Open-Source VPN Software.
PREFIX D_SW_MODE
CAPTION D_SW_MODE
R_SYSTEM &System Mode (Recommended)
R_USER &User Mode
S_1 Install the VPN software to this computer normally. The administrator privilege is required.
S_USER Install the VPN software with the normal user privilege. No administrator privilege is required. Some functions such as Local Bridge will be disabled. Runs only the user "%s" is logged on Windows.
S_2 SoftEther VPN can be installed by one of two methods.\r\n\r\nPlease select the System Mode normally.\r\n\r\nIf you cannot use the administrator privilege for some reasons, you can select the User Mode to continue the installation.
PREFIX D_SW_NOT_ADMIN
CAPTION D_SW_NOT_ADMIN
S_INFO The user "%s" which is logged on Windows does not have the administrator privilege.\r\n\r\nLog off Windows, log on by the user who has the administrator privilege and restart the Setup Wizard if you want to continue the setup.
S_INFO6 Click Finish to exit the Setup Wizard.
S_INFO2 If you cannot use the administrator privilege, you can choose the User Mode installation.\r\nTo install the software in the User Mode, click Back.
PREFIX D_SW_COMPONENTS
CAPTION D_SW_COMPONENTS
PREFIX D_SW_EULA
CAPTION D_SW_EULA
S_1 Please read the End User License Agreement carefully.
B_AGREE I agree to the End User License Agreement.
PREFIX D_SW_WARNING
CAPTION D_SW_WARNING
S_1 SoftEther VPN software has extremely powerful communication abilities. Before use please read the Important Notices carefully.
PREFIX D_SW_DIR
CAPTION D_SW_DIR
S_INFO Please specify the directory to install %s.
R_CUSTOM &Specify the Directory
S_DEST &Directory:
B_BROWSE &Browse...
R_SHOWCUSTOM &Advanced Install Options for Experts
R_FOR_SYSTEM Install on &Windows of this Computer Entirely
R_FOR_USER Install only on the Environment of User "%s"
S_WARNING Caution: Not recommended. After the user "%s" logs off Windows, %s will stop. Local Bridge function and L2TP/IPsec Function (supports for Mac and Smartphones) will be unavailabe.
PREFIX D_SW_READY
CAPTION D_SW_READY
S_INFO Install of %s is ready.
S_INFO7 Click Next to perform the install.
PREFIX D_SW_PERFORM
CAPTION D_SW_PERFORM
S_INFO The setup of %s is in progress.\r\nPlease wait...
S_INFO8 SoftEther VPN is a work of the research and development project of Japanese Government, subsidized by Ministry of Economy, Trade and Industry of Japan, administrated by Information Promotion Agency.
PREFIX D_SW_ERROR
CAPTION D_SW_ERROR
S_INFO An error occureed and the setup of %s is aborted.\r\n\r\nRestart the Setup Wizard if you want to retry.
PREFIX D_SW_FINISH
CAPTION D_SW_FINISH
S_INFO The setup process of %s has completed successfully.
S_INFO8 SoftEther VPN is a work of the research and development project of Japanese Government, subsidized by Ministry of Economy, Trade and Industry of Japan, administrated by Information Promotion Agency.
PREFIX D_SW_UNINST1
CAPTION D_SW_UNINST1
S_WELCOME The Setup Wizard can uninstall %s from the computer.\r\n\r\nClick Next if you want to start uninstall.
S_TITLE %s Uninstall Wizard
PREFIX D_SW_EASY1
CAPTION D_SW_EASY1
S_WELCOME Installing and setting up the VPN Clients to a lot of computers in the enterprise is a hard work.
S_TITLE What is SoftEther VPN Client Easy Installer?
S_WELCOME2 Easy Installer Creator is a tool for enterprise administrators. You can create a VPN Client installer with embedding a specific VPN connection setting by using Easy Installer Creator. Personal users can also exploit this tool.
S_WELCOME3 A created Easy Installer can be distributed to employees in the enterprise by using file servers or e-mails. If a user runs the Easy Installer, VPN Client will be installed and the VPN connection setting will be imported, and then the VPN connection will be started automatically.
PREFIX D_SW_EASY2
CAPTION D_SW_EASY2
S_BOLD1 Specify a VPN connection setting file (.vpn file) to embed
S_1 Please specify a VPN connection setting file (a file which extension is .vpn) to embed on the Easy Installer. You can export a setting file by clicking Export VPN Connection Setting on the right-click menu of the target connection setting on the VPN Client Manager.
S_18 Connection &Setting:
B_BROWSE_SETTING &Browse...
B_DELETE_SENSITIVE &Eliminate Username and Password from Connection Setting File
S_BOLD2 Specify an EXE filename to be generated
S_3 This tool will output an EXE file (executable file) which implements an Easy Installer. Please specify the output filename to be generated.
S_19 Save &as:
B_BROWSE_OUT B&rowse...
B_EASYMODE Set the VPN Client Manager to &Easy Mode when Installation
PREFIX D_SW_WEB1
CAPTION D_SW_WEB1
S_WELCOME You can create a SoftEther VPN Client Web Installer and upload it on the Web server in the enterprise. A user opens that web page and can install the SoftEther VPN Client automatically. You can also setup the automatic import and kick-start of a built-in VPN connection setting.
S_TITLE What is SoftEther VPN Web Installer?
S_WELCOME2 The generated Web Installer can be placed as HTML files on the intranet Web server. If an employee accesses to the URL of that HTML files, the SoftEther VPN Client Installer will be executed.
S_WELCOME3 Using ActiveX Control. Internet Explorer 5.0, greater on Windows 2000 or greater are supported. Other web browsers or older operating systems (for example Windows 98) are not supported.
PREFIX D_SW_WEB2
CAPTION D_SW_WEB2
S_BOLD1 Specify a VPN connection setting file (.vpn file) to embed
S_1 Please specify a VPN connection setting file (a file which extension is .vpn) to embed on the Web Installer. You can export a setting file by clicking Export VPN Connection Setting on the right-click menu of the target connection setting on the VPN Client Manager.
S_18 Connection &Setting:
B_BROWSE_SETTING &Browse...
B_DELETE_SENSITIVE &Eliminate Username and Password from Connection Setting File
S_BOLD2 Specify the output filename to be generated
S_3 This tool will output a ZIP file (archive file) which contains HTML files and CAB files that should be placed on the Web server. Please specify the output filename to be generated.
S_19 Save &as:
B_BROWSE_OUT B&rowse...
B_EASYMODE Set the VPN Client Manager to &Easy Mode when Installation
PREFIX D_UPDATE_NOTICE
CAPTION Updates of %s
IDOK &Show the Update Information...
B_CONFIG &Configure Update...
IDCANCEL &Do Not Show this Message Again
S_INFO The latest version of %s is released. You can download it and update now.
S_PRODUCT Software:
S_CURRENT Current Version:
S_CURRENT_STR Ver %u.%02u.%04u%s
S_LATEST Latest Version:
S_LATEST_STR Ver %S%s
PREFIX D_UPDATE_CONFIG
CAPTION Configuration of Update Notification
S_INFO Checks the new versions of %s periodically and popup a notification when a new version will be released.\r\n\r\nHTTPS packets will be used between this computer and the SoftEther Update server located in Tsukuba-city, Ibaraki-prefecture, Japan in order to check updates. No personal information will be sent.
S_TITLE %s Update and Notify Settings
S_ENABLE &Enable Update Checks
S_DISBLE &Disable Update Checks
IDCANCEL &Close
PREFIX D_SM_VMBRIDGE
CAPTION Instructions for Local Bridge on VM
S_TITLE Using Local Bridge Function on VM
S_1 It has been detected that the VPN Server might be running on a VM (Virtual Machine) suchlike VMware or Hyper-V. Read the following instructions carefully. If you are not using a VM, please ignore this message.
S_2 Some VMs prohibit the "Promiscuous Mode" (MAC Address Spoofing) on the network adapters by default.\r\n\r\nIf the Promiscuous Mode (MAC Address Spoofing) is administratively disabled, the Local Bridge function between a Virtual Hub on the VPN Server and a physical network adapter on the physical computer does not work well. You should allow the Promiscuous Mode (MAC Address Spoofing) by using the configuration tool of the VM.\r\n\r\nFor details please refer the documents of your VM. If it is a shared-VM and administrated by other person, please request the administrator to permit the use of the Promiscuous (MAC Address Spoofing) Mode to your VM.
S_BOLD Instructions
IDCANCEL &OK
PREFIX D_SM_AZURE
CAPTION VPN Azure Service Settings
S_TITLE VPN Azure Cloud VPN Service (Free)
S_1 VPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.
S_2 You don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.
S_3 VPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Press the right button to see details and how-to-use instructions.
B_BOLD VPN Azure Setting
R_ENABLE &Enable VPN Azure
R_DISABLE &Disable VPN Azure
S_HOSTNAME_BORDER Current VPN Azure Hostname
S_HOSTNAME_INFO The VPN Azure hostname is same to the Dynamic DNS hostname, but altering the domain suffix to "vpnazure.net".
B_CHANGE Change &Hostname
B_WEB How to Use VPN Azure\r\n(Visit the Web)
IDCANCEL &OK
PREFIX D_SM_PROXY
CAPTION Connect via Proxy Server
STATIC9 You can connect via a proxy server.
STATIC10 Proxy &Type:
R_DIRECT_TCP &Direct TCP/IP Connection (No Proxy)
R_HTTPS Connect via H&TTP Proxy Server
R_SOCKS Connect via S&OCKS Proxy Server
B_PROXY_CONFIG P&roxy Server Setting
IDOK &OK
IDCANCEL Cancel
PREFIX D_VGC_LIST
CAPTION VPN Gate Academic Experimental Project Plugin for SoftEther VPN Client
S_TITLE VPN Gate Public VPN Relay Servers
S_INFO1 Gain freedom access to Internet by using VPN connection via Public VPN Servers provided by volunteers abound the world. Bypass your local malfunctioning firewall's packet blocking, and hide your IP address safely.
IDOK &Connect to the VPN Server
B_PROXY &Proxy Settings
S_VLAN Virtual Network Adapter:
B_WEB VPN Gate Academic\r\nWeb Site
B_REFRESH &Refresh List
S_REFRESH Refreshing the List...
S_RESEARCH Academic project at University of Tsukuba, Japan.
S_INFO9 A VPN Server with higher Line Speed (measured by Mbps) and smaller Ping result are usually more comfortable to use. You might be able to browse websites which are normally unreachable from your area if you use VPN servers that are not in your area.
PREFIX D_VGC_PROTOCOL
CAPTION Select VPN Protocol to Connect
S_TITLE The Public VPN Relay Server "%S" (%S) supports both TCP and UDP as VPN protocol.
S_INFO Select preferred VPN Protocol to use in order to connect the VPN Server "%S" (%S). In general, the TCP protocol is easy to pass through the firewall. Try the UDP protocol only if the TCP has been failed.
R_TCP Use &TCP Protocol (Ethernet over HTTPS VPN) (Recommended)
R_UDP Use &UDP Protocol (Ethernet over UDP VPN)
IDOK &OK
IDCANCEL Cancel
PREFIX D_VGS_CONFIG
CAPTION VPN Gate Service Control Panel
R_ENABLE &Enable the VPN Gate Relay Service and Join the VPN Gate Research as a Volunteer.
S_TITLE Join the VPN Gate Academic Research Project?
S_INFO1 VPN Gate is an academic experiment for the research on the 'Distributed Public VPN Relay Server' technology, operated at the Graduate School on University of Tsukuba, Japan. VPN Gate Client users can connect to VPN Gate Services running on Public VPN Relay Servers, and enjoy unrestricted Internet access via the VPN Relay Server.
S_INFO9 When a VPN Gate Client user accesses to a server on Internet, the source IP address will be replaced to the IP address of the relaying Public VPN Server. Consequently, the VPN Gate Client user will be able to browse overseas web sites smoothly even if the user's local firewall is out of order by an unknown reason and unable to pass such an access.
S_WARNING If you check the above checkbox and press OK, the VPN Gate Relay Service will be activated on this computer. As the result, any VPN Gate Client will be able to communicate towards the Internet via the VPN Gate Relay Service. It is secure even if your computer is on the private network (e.g. corporate network) because any accesses to private IP addresses will not be permitted to pass via the VPN Gate Relay Service.
B_OPTION VPN Gate Service &Option Settings...
IDOK &OK
IDCANCEL Cancel
B_WEB &Browse http://www.vpngate.net/ ...
PREFIX D_VGS_OPTION
CAPTION VPN Gate Service Options
S_TITLE VPN Gate Service Options
S_1 This computer will be a Public VPN Server. Please fill the operator's information of the server. The information will be published on the list at www.vpngate.net and other related services. The contact address will be also used to contact from VPN Gate Academic Project operators.
S_2 Operator:
S_3 &Operator of Server:
S_19 (Up to 64 letters)
S_20 &Abuse Report Address\r\n(e-mail addresses etc.):
S_21 (Up to 64 letters)
S_22 The &Message to Users:\r\n(Up to 128 letters)
S_23 The message will be shown on the list of VPN Gate Servers. Enter an enjoyable message to let users feel pleasure.
S_24 VPN Settings:
R_LOG &Save VPN Packet Logs (Recommended)
R_2WEEKS Auto Delete or Archive with Encoding for Packet Logs After &Two Weeks (Recommended)
R_PERMANENT Make Packet Logs Occupy Free Disk Space &Permanently
R_L2TP Enable &L2TP/IPsec VPN Server Function (Recommended)
S_25 Allows Mac OS X, iPhone, iPad and Android clients to make a VPN connection.
B_MESSAGE Pop-up Your Advertisement Message on the VPN Client &Screen ...
IDOK &OK
IDCANCEL Cancel
PREFIX D_VGS_WARNING
CAPTION Caution before Joining VPN Gate Academic Experiment
S1 The VPN Gate Academic Experiment Service is operated as a research project at the graduate school on University of Tsukuba, Japan. The service is governed under the Japanese laws. Other countries' laws are none of our concerns nor responsibilities.
S2 By nature, there are almost 200 countries in the World, with different laws. It is impossible to verify every countries' laws and regulations and make the software comply with all countries' laws in advance to release the software. If a user uses VPN Gate service in a specific country, and damaged by public servants of the authority, the developer of either the service or software will never be liable to recover or compensate such damages or criminal responsibilities.
S3 By using this software and service, the user must observe all concerned laws and rules with user's own responsibility. The user will be completely liable to any damages and responsibilities which are results of using this software and service, regardless of either inside or outside of Japan's territory.
S4 If you don't agree nor understand the above warnings, do not use any of VPN Gate Academic Experiment Service functions.
S5 Note: VPN Gate is a research project for just academic purpose only. VPN Gate was developed as a plug-in for SoftEther VPN and UT-VPN. However, all parts of VPN Gate were developed on this research project at University of Tsukuba. Any parts of VPN Gate are not developed by SoftEther VPN Project. The VPN Gate Research Project is not a subject to be led, operated, promoted nor guaranteed by SoftEther VPN Project.
R_NEVER Do Not &Show This Message Again
B_WEB Visit VPN Gate &Web Site...
IDOK &Agree
IDCANCEL &Disagree
S_BOLD Caution! Do Not Use the VPN Gate Services in Countries where VPN Communications are Prohibited.
PREFIX D_NM_PUSH
CAPTION Edit the static routing table to push
S1 This Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients.
S2 Whether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software.
S3 You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage.
S4 You can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this screen.
S5 Edit the static routing table to push
S6 Example: 192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253\r\n\r\nSplit multiple entries (maximum: 64 entries) by comma or space characters.\r\nEach entry must be specified in the "IP network address/subnet mask/gateway IP address" format.
S7 See the RFC 3442 to understand the classless routes.
IDOK &OK
IDCANCEL Cancel
###########################################################################
# #
#String data of menus in software #
# #
###########################################################################
# Connection Manager menu
PREFIX CM_MENU
# [Connect] menu
CMD_TOP_CONNECT &Connect
CMD_CONNECT C&onnect\tEnter
CMD_STATUS View &Status...\tCtrl+S
CMD_DISCONNECT D&isconnect\tCtrl+D
CMD_DISCONNECT_ALL Disconnect &All\tCtrl+I
CMD_NEW &New VPN Connection Setting...\tCtrl+N
CMD_CLONE &Copy\tCtrl+C
CMD_SHORTCUT Create VPN Connection S&hortcut...
CMD_EXPORT_ACCOUNT E&xport VPN Connection Setting...
CMD_IMPORT_ACCOUNT Im&port VPN Connection Setting...
CMD_STARTUP Se&t as Startup Connection\tCtrl+T
CMD_NOSTARTUP R&emove Startup Connection
CMD_RECENT Recent &VPN Servers
CMD_RENAME Rena&me\tF2
CMD_DELETE &Delete\tDel
CMD_PROPERTY P&roperties...\tAlt+Enter
CMD_EXIT Cl&ose Connection Manager\tAlt+F4
CMD_QUIT E&xit Connection Manager Program\tAlt+Q
# [Edit] menu
CMD_TOP_EDIT &Edit
CMD_SELECT_ALL Select &All\tCtrl+A
CMD_SWITCH_SELECT Sw&itch Selection
# [View] menu
CMD_TOP_VIEW &View
CMD_STATUSBAR Show &Status Bar
CMD_VISTASTYLE Windows Vista / 7 / 8 / 10 Styles
CMD_SHOWPORT Show &Ports on Connection List
CMD_TRAYICON Show Icons on &Task Tray
CMD_ICON &Icon
CMD_DETAIL &Detail
CMD_GRID Display &Grid
CMD_REFRESH &Refresh\tF5
# [VLAN] menu
CMD_TOP_VLAN Virtua&l Adapter
CMD_NEW_VLAN &New Virtual Network Adapter...\tCtrl+L
CMD_ENABLE_VLAN &Enable Virtual Network Adapter\tCtrl+E
CMD_DISABLE_VLAN Dis&able Virtual Network Adapter\tCtrl+B
CMD_DELETE_VLAN &Delete Virtual Network Adapter\tDel
CMD_REINSTALL &Reinstall Driver...\tCtrl+U
CMD_WINNET Open Windows Network Connections...\tCtrl+W
# [Connect] menu
CMD_TOP_SECURE &Smart Card
CMD_SECURE_MANAGER Smart Card &Manager...\tCtrl+G
CMD_SECURE_SELECT &Select a Smart Card to Use...
# [Tools] menu
CMD_TOP_TOOL &Tools
CMD_PASSWORD Set &Password...\tCtrl+P
CMD_TRUST Manage &Trusted CA Certificate List\tCtrl+R
CMD_NETIF &Network Device Status...
CMD_TCPIP TCP Optimization &Utility...
CMD_MMCSS Optimization for Windows &Vista / 7 / 8 / 10...
CMD_TRAFFIC Network T&raffic Speed Test Tool...\tCtrl+Q
CMD_CM_SETTING Switch Operation &Mode...
CMD_LANGUAGE &Language Settings...
CMD_OPTION &Options...\tCtrl+O
# [Voice] menu
CMD_TOP_VOICE V&oice
CMD_VOIDE_NONE Voice Gui&de Off
CMD_VOICE_NORMAL &Normal Voice Guide
CMD_VOICE_ODD Extended V&oice Guide
# [Help] menu
CMD_TOP_HELP &Help
CMD_ABOUT &About...
###########################################################################
# #
# Command prompt string data #
# #
###########################################################################
PREFIX NULL
# Console system general
CON_INFILE_ERROR Error: Unable to open the specified input file "%s".
CON_OUTFILE_ERROR Error: Unable to create the specified output file "%s".
CON_INFILE_START The commands written in the file "%s" will be used instead of input from keyboard.
CON_OUTFILE_START The message output to the console will be saved in the file "%s".
CON_USER_CANCEL [EOF]
CON_UNKNOWN_CMD "%S": Command not found. \nYou can use the HELP command to view a list of the available commands.
CON_AMBIGIOUS_CMD "%S": The command-name is ambiguous.
CON_AMBIGIOUS_CMD_1 The specified command name matches the following multiple commands.
CON_AMBIGIOUS_CMD_2 Please re-specify the command name more strictly.
CON_INVALID_PARAM The parameter "/%S" has been specified. It is not possible to specify this parameter when using the command "%S". Input "%S /HELP" to see the list of what parameters can be used.
CON_AMBIGIOUS_PARAM "%S": The parameter name is ambiguous.
CON_AMBIGIOUS_PARAM_1 The specified parameter name matches with the following parameters that can be specified as a parameter of command "%S".
CON_AMBIGIOUS_PARAM_2 Please re-specify the parameter name more strictly.
# Unknown command
CMD_UNKNOWM There is no description for this command.
CMD_UNKNOWN_HELP There is no detailed description for this command. If you would like to know more detail about this command, please refer to the manual or online documentation.
CMD_UNKNOWN_ARGS There is no command execution example.
CMD_UNKNOWN_PARAM There is no description for this parameter.
# Strings being used within console system
CMD_HELP_1 You can use the following %u commands:
CMD_HELP_2 To reference the usage for each command, input "command name ?" to view a help.
CMD_EVAL_MIN_MAX You must specify an integer in the range from %u to %u for the value.
CMD_PROMPT Enter a value:
CMD_EVAL_NOT_EMPTY You cannot make a blank specification.
CMD_EVAL_SAFE The string contains unusable characters.
CMD_EVAL_INT You must specify an integer that is not less than 1.
CMD_HELP_TITLE Help for command "%S"
CMD_HELP_DESCRIPTION Purpose:
CMD_HELP_USAGE Usage:
CMD_HELP_HELP Description:
CMD_HELP_ARGS Parameters:
CMD_PROPMT_PORT Input the port number:
CMD_EVAL_PORT Port number is invalid. Specify a port number that is within the range of 1 to 65535.
CMD_CT_STD_COLUMN_1 Item
CMD_CT_STD_COLUMN_2 Value
CMD_CT_STD_COLUMN_3 Description
CMD_PARSE_IP_SUBNET_ERROR_1_6 Specify in the format of "IPv6 address/subnet mask". \nSpecify the IPv6 address by separating the hexadecimal values using colons such as "2001:200:0:1::". For the subnet mask, either specify hexadecimal values separated by colons such as "ffff:ffff:ffff:ffff::", or you can specify the bit length of subnet mask using a decimal value such as 64. \nTo specify a standalone host, specify the subnet mask as either "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff" or "128". \n(Example)\n2001:200:0:1::/64\n2001:200:0:1::/ffff:ffff:ffff:ffff::\n2001:200:0:1::5/12\n\n
CMD_PARSE_IP_SUBNET_ERROR_1 Specify in the format of "IPv4 address/subnet mask". \nSpecify the IPv4 address by separating the decimal values using dots such as "192.168.0.1". For the subnet mask, either specify decimal values separated by dots such as "255.255.255.0", or you can specify the bit length of subnet mask using a decimal value such as 24. \nTo specify a standalone host, specify the subnet mask as either "255.255.255.255" or "32". \n(Example)\n 192.168.0.1/24\n 192.168.0.1/255.255.255.0\n192.168.0.5/255.255.255.255\n\n
CMD_PARSE_IP_SUBNET_ERROR_2 The specified IP address is not a network address.
CMD_PARSE_IP_SUBNET_ERROR_3 The specified IP address is not a network prefix address.
CMD_EVAL_DATE_TIME_FAILED The date and time specification is invalid. \nThe date and time must be in the same format as "2005/10/08 19:30:00" where 6 integers are specified, representing year/month/day hour:minute:second separated by forward slashes, a space and then colons. Specify 4 digits for the year.
CMD_PARSE_IP_MASK_ERROR_1_6 Specify in the format of "IPv6 address/mask". \nSpecify the IPv6 address by separating the hexadecimal values using colons such as "2001:200:0:1::". For the mask, either specify hexadecimal values separated by colons such as "ffff:ffff:ffff:ffff::", or you can specify the bit length of mask using a decimal value such as 64. \nTo specify a standalone host, specify the mask as either "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff" or "128". \n(Example)\n2001:200:0:1::/64\n2001:200:0:1::/ffff:ffff:ffff:ffff::\n2001:200:0:1::5/12\n\n
CMD_PARSE_IP_MASK_ERROR_1 Specify in the format of "IPv4 address/mask". \nSpecify the IPv4 address by separating the decimal values using dots such as "192.168.0.1". For the mask, either specify decimal values separated by dots such as "255.255.255.0", or you can specify the bit length of mask using a decimal value such as 24. \nTo specify a standalone host, specify the mask as either "255.255.255.255" or "32". \n(Example)\n 192.168.0.1/24\n 192.168.0.1/255.255.255.0\n192.168.0.5/255.255.255.255\n\n
# Common messages
CMD_MSG_INVALID_HOSTNAME Specified host name is invalid.
CMD_MSG_OK The command completed successfully.
CMD_MSG_ALLOW Allow
CMD_MSG_DENY Deny
CMD_MSG_INFINITE Infinite
CMD_MSG_ENABLE Enable
CMD_MSG_DISABLE Disable
CMD_MSG_LOAD_CERT_FAILED Unable to read the specified X.509 certificate file.
CMD_MSG_SAVE_CERT_FAILED Failed to write the X.509 certificate file.
CMD_ACCOUNT_COLUMN_NAME VPN Connection Setting Name
CMD_ACCOUNT_COLUMN_HOSTNAME Destination VPN Server Host Name
CMD_ACCOUNT_COLUMN_PORT Destination VPN Server Port Number
CMD_ACCOUNT_COLUMN_HUBNAME Destination VPN Server Virtual Hub Name
CMD_ACCOUNT_COLUMN_PROXY_TYPE Proxy Server Type
CMD_ACCOUNT_COLUMN_PROXY_HOSTNAME Proxy Server Host Name
CMD_ACCOUNT_COLUMN_PROXY_PORT Proxy Server Port Number
CMD_ACCOUNT_COLUMN_PROXY_USERNAME Proxy Server User Name
CMD_ACCOUNT_COLUMN_SERVER_CERT_USE Verify Server Certificate
CMD_ACCOUNT_COLUMN_SERVER_CERT_NAME Registered Server Individual Certificate
CMD_ACCOUNT_COLUMN_DEVICE_NAME Device Name Used for Connection
CMD_ACCOUNT_COLUMN_AUTH_TYPE Authentication Type
CMD_ACCOUNT_COLUMN_AUTH_USERNAME User Name
CMD_ACCOUNT_COLUMN_AUTH_CERT_NAME Client Certificate for Authentication Use
CMD_ACCOUNT_COLUMN_NUMTCP Number of TCP Connections to Use in VPN Communication
CMD_ACCOUNT_COLUMN_TCP_INTERVAL Interval between Establishing Each TCP Connection
CMD_ACCOUNT_COLUMN_TCP_TTL Connection Life of Each TCP Connection
CMD_ACCOUNT_COLUMN_TCP_HALF Use Half Duplex Mode
CMD_ACCOUNT_COLUMN_ENCRYPT Encryption by SSL
CMD_ACCOUNT_COLUMN_COMPRESS Data Compression
CMD_ACCOUNT_COLUMN_BRIDGE_ROUTER Connect by Bridge / Router Mode
CMD_ACCOUNT_COLUMN_MONITOR Connect by Monitoring Mode
CMD_ACCOUNT_COLUMN_NO_TRACKING No Adjustment for Routing Table
CMD_ACCOUNT_COLUMN_QOS_DISABLE Do not Use QoS Control Function
# Debugging Information Collecting Tool
CMD_DEBUG_SOFTNAME Debugging Information Collecting Tool
CMD_DEBUG_PRINT Debugging Information Collecting Tool\r\n\r\n
CMD_DEBUG_NOT_2000 Windows 2000 or later is required.
CMD_DEBUG_NOT_ADMIN You must login as Administrators on Windows to execute this command.
CMD_DEBUG_UAC_FAILED Failed to obtain the Administrators privilege.
CMD_DEBUG_SAVE_TITLE Specify Destination Path to Save File
CMD_DEBUG_OK A debugging information file was saved as "%s".\r\n\r\nSend this file to your support staff.\r\nYou must verify the contents of this file before sending it to the support staff.\r\nRemove confidential information on this file with your responsibility and by yourself if there are some confidential information which you don't want to disclose it to the staff.\r\n\r\nIf you ignore the confidential information contained on the file, and you agree to send the entire file to the support staff, it means that you have agreed to disclose the entire contents of the file to the support staff.
CMD_DEBUG_NG Failed to save the debugging information as "%s".
# TEST command
CMD_TEST Executing test operation.
CMD_TEST_HELP This is a test command. Executing test operation. With the test command, you can specify a number of arguments. You can omit the number of arguments.
CMD_TEST_ARGS Test [/A1:a_str] [/A2:b_str] [/A3:int_value]
CMD_TEST_A1 Specifies parameter A1. This can be omitted.
CMD_TEST_A2 Specifies parameter A2. If this is omitted, a prompt will be displayed to input parameter A2 when the command is executed. You cannot make a blank specification.
CMD_TEST_A3 Specify a numeric value. You must specify an integer that is within the range of 1 to 100. Specifying an integer outside that range will cause an error message to be displayed.
CMD_TEST_EVAL_A2 You cannot make a blank specification for parameter A2.
CMD_IP_EVAL_FAILED The IP address is incorrectly specified.
CMD_HOSTPORT_EVAL_FAILED The host name and port number specification is invalid. \nPlease specify using the format of host name:port number, or IP address:port number.
CMD_PORTLIST_EVAL_FAILED The port number list specification is invalid. \nThe list must have at least one port number set, and it is also possible to set multiple port numbers. When specifying multiple port numbers, separate them using a comma such as "443,992,8888".
CMD_PROTOCOL_EVAL_FAILED The protocol is incorrectly specified. Specify either ip, tcp, udp, icmpv4, icmpv6 or a protocol number (0 to 255) for the protocol.
CMD_PORT_RANGE_EVAL_FAILED The port number or the port number range was incorrectly specified. If specifying only one port number, an integer must be used to specify that port number. If specifying multiple ports, specify the beginning port number and the end port number joined together by a hyphen like "80-443".
CMD_TCP_CONNECTION_STATE_EVAL_FAILED The TCP connection state specification is invalid. Specify either "Established" or "Unestablished" and specify TCP when selecting protocol.
CMD_MAC_ADDRESS_AND_MASK_EVAL_FAILED The MAC address and mask specification is invalid. Use hexadecimal number with the separators, "-" or ":", and without the separators. An example is "00-AC-84-EA-33-BC/FF-FF-FF-FF-FF-FF".
CMD_EXEC_MSG_NAME %S command - %s
CMD_ID ID
CMD_FILE_NOT_FOUND Cannot find specified file "%s".
CMD_FILE_NAME_EMPTY The file name is not specified.
CMD_SAVECERTPATH Save X.509 certificate to file name:
CMD_SAVECERT_FAILED Failed to save the certificate file.
CMD_SAVEKEYPATH Save private key to file name:
CMD_SAVEKEY_FAILED Failed to save the private key file.
CMD_SAVEFILE_FAILED Failed to save the file.
CMD_LOADFILE_FAILED Failed to open the file.
CMD_LOADCERTPATH Read X.509 certificate from file name:
CMD_LOADCERT_FAILED Failed to read certificate file.
CMD_LOADKEYPATH Read private key from file name:
CMD_LOADKEY_FAILED Failed to read private key file.
CMD_LOADKEY_ENCRYPTED_1 The specified private key file is protected by a passphrase.
CMD_LOADKEY_ENCRYPTED_2 Please enter the passphrase:
CMD_LOADKEY_ENCRYPTED_3 The passphrase is incorrect.
CMD_KEYPAIR_FAILED The X.509 certificate and private key combination has been incorrectly specified. \r\nA certificate and a private key that corresponds to that certificate is required.
CMD_CERT_NOT_EXISTS The certificate is not registered.
CMD_NO_SETTINGS -
CMD_DISCONNECTED_MSG \n--- Error ---\n\nThe communication session with the host you were managing has been disconnected. From now on, if you run any commands an error will occur. \n\nTo reconnect to the host you were managing, first leave the prompt by inputting "EXIT" and then reconnect. \n\n
# VPNCMD コマンド
CMD_VPNCMD SoftEther VPN Command Line Management Utility
CMD_VPNCMD_HELP The 'vpncmd' program is a utility that allows you to manage SoftEther VPN software by using command lines. By using vpncmd, you can connect to a VPN Client, a VPN Server or VPN Bridge that is running on a local or remote computer and manage these services. Moreover, by using VPN Tools mode, you can call the Network Traffic Speed Test Tool and the certificate creation function. These can be used even when not connected to the VPN Server or VPN Client. \nWhen using vpncmd, if the file name is specified by using the /IN and /OUT parameter, the command can be executed in a batch according to a file in which the executable commands are enumerated and the execution results can be written to a file. Normally a command prompt will appear after vpncmd is launched but when an input file is specified by the /IN parameter, the program will automatically terminate after the execution of all lines in the input file is complete. Also, when a command to execute is specified by the /CMD parameter, the program will automatically terminate after the execution of that command is complete. You cannot specify the /IN parameter and the /CMD parameter at the same time. The termination code of the vpncmd program will be the error code of the last executed command (0 in the case of successful execution). \nUnder a Windows environment, when vpncmd is launched once or more by a user with administrator privileges, it is possible to simply input 'vpncmd' to a Windows command prompt or [Run...] window to launch vpncmd. To achieve the same result under a UNIX system, you can manually set, as appropriate, the PATH environment variable.
CMD_VPNCMD_ARGS vpncmd [host:port] [/CLIENT|/SERVER|/TOOLS] [/HUB:hub] [/ADMINHUB:adminhub] [/PASSWORD:password] [/IN:infile] [/OUT:outfile] [/CMD commands...]
CMD_VPNCMD_[host:port] By specifying parameters in the format "host name:port number", a connection will automatically be made to that host. If this is not specified, a prompt will appear to input the connection destination. When connecting to a VPN Client, you cannot specify a port number.
CMD_VPNCMD_CLIENT This will connect to VPN Client to do management. You cannot specify it together with /SERVER.
CMD_VPNCMD_SERVER This will connect to VPN Server or VPN Bridge to do management. You cannot specify it together with /CLIENT.
CMD_VPNCMD_TOOLS This will enables use of VPN Tools commands. VPN Tools include the simple certificate creation tool (MakeCert command) and the Network Traffic Speed Test Tool (SpeedTest command).
CMD_VPNCMD_HUB When connecting to the VPN Server by "Virtual Hub Admin Mode", this specifies the Virtual Hub name 'hub'. If you specify the host name but not the /HUB parameter, connection will be by "Server Admin Mode".
CMD_VPNCMD_ADMINHUB This will specify the name of the Virtual Hub 'adminhub' that is automatically selected after connecting to the VPN Server. If the /HUB parameter was specified, the Virtual Hub will be selected automatically and this specification will not be necessary.
CMD_VPNCMD_PASSWORD If the administrator password is required when connecting, specify the password 'password'. When the password is not specified, a prompt to input the password will be displayed.
CMD_VPNCMD_IN This will specify the text file 'infile' that contains the list of commands that are automatically executed after the connection is completed. If the /IN parameter is specified, the vpncmd program will terminate automatically after the execution of all commands in the file are finished. If the file contains multiple-byte characters, the encoding must be Unicode (UTF-8). This cannot be specified together with /CMD (if /CMD is specified, /IN will be ignored).
CMD_VPNCMD_OUT You can specify the text file 'outfile' to write all strings such as onscreen prompts, message, error and execution results. Note that if the specified file already exists, the contents of the existing file will be overwritten. Output strings will be recorded using Unicode (UTF-8) encoding.
CMD_VPNCMD_CMD If the optional command 'commands...' is included after /CMD, that command will be executed after the connection is complete and the vpncmd program will terminate after that. This cannot be specified together with /IN (if specified together with /IN, /IN will be ignored). Specify the /CMD parameter after all other vpncmd parameters.
CMD_VPNCMD_CSV You can specify this option to enable CSV outputs. Results of each command will be printed in the CSV format. It is useful for processing the results by other programs.
CMD_VPNCMD_CS_1 By using vpncmd program, the following can be achieved. \n\n1. Management of VPN Server or VPN Bridge \n2. Management of VPN Client\n3. Use of VPN Tools (certificate creation and Network Traffic Speed Test Tool)\n\n
CMD_VPNCMD_CS_2 Select 1, 2 or 3:
CMD_VPNCMD_HOST_1 Specify the host name or IP address of the computer that the destination VPN Server or VPN Bridge is operating on. \nBy specifying according to the format 'host name:port number', you can also specify the port number. \n(When the port number is unspecified, 443 is used.)\nIf nothing is input and the Enter key is pressed, the connection will be made to the port number 8888 of localhost (this computer).
CMD_VPNCMD_HOST_2 Specify the host name or IP address of the computer that the destination VPN Client is operating on. \nIf nothing is input and Enter is pressed, connection will be made to localhost (this computer).
CMD_VPNCMD_HOST_3 Hostname of IP Address of Destination:
CMD_VPNCMD_HUB_1 If connecting to the server by Virtual Hub Admin Mode, please input the Virtual Hub name. \nIf connecting by server admin mode, please press Enter without inputting anything.
CMD_VPNCMD_HUB_2 Specify Virtual Hub Name:
CMD_VPNCMD_ABOUT SoftEther VPN Command Line Management Utility (vpncmd command)\n%S\n%S\nCopyright (c) SoftEther VPN Project. All Rights Reserved.\n
CMD_VPNCMD_PASSWORD_1 Access has been denied. Possibly the password is incorrect, or perhaps you are connecting by an incorrect admin mode. You can try inputting the password again. To cancel, press Ctrl+D.
CMD_VPNCMD_PASSWORD_2 Password:
CMD_VPNCMD_ERROR Error occurred. (Error code: %u)\n%s
CMD_VPNCMD_SERVER_CONNECTED Connection has been established with VPN Server "%S" (port %u).
CMD_VPNCMD_SERVER_CONNECTED_1 You have administrator privileges for the entire VPN Server.
CMD_VPNCMD_SERVER_CONNECTED_2 You have administrator privileges for Virtual Hub '%S' on the VPN Server.
CMD_VPNCMD_CLIENT_NO_REMODE The destination VPN Client server does not allow administrating connections from remote computers. Launch the command line management utility or VPN Client Manager on the computer that VPN Client is running on and connect to localhost.
CMD_VPNCMD_PWPROMPT_0 Please enter the password. To cancel press the Ctrl+D key.
CMD_VPNCMD_PWPROMPT_1 Password:
CMD_VPNCMD_PWPROMPT_2 Confirm input:
CMD_VPNCMD_PWPROMPT_3 The password and the password confirmation do not match. Please input the password and confirmation again.
CMD_VPNCMD_CLIENT_CONNECTED Connected to VPN Client "%S".
CMD_VPNCMD_TOOLS_CONNECTED VPN Tools has been launched. By inputting HELP, you can view a list of the commands that can be used.
#######################################################
# #
# Management commands for VPN Server are listed below #
# #
#######################################################
# About command
CMD_About Display the version information
CMD_About_HELP This displays the version information of this command line management utility. Included in the version information are the vpncmd version number, build number and build information.
CMD_About_ARGS About
# ServerInfoGet command
CMD_ServerInfoGet Get server information
CMD_ServerInfoGet_Help This allows you to obtain the server information of the currently connected VPN Server or VPN Bridge. Included in the server information are the version number, build number and build information. You can also obtain information on the current server operation mode and the information of operating system that the server is operating on.
CMD_ServerInfoGet_Args ServerInfoGet
# ServerStatusGet command
CMD_ServerStatusGet Get Current Server Status
CMD_ServerStatusGet_Help This allows you to obtain in real-time the current status of the currently connected VPN Server or VPN Bridge. You can get statistical information on data communication and the number of different kinds of objects that exist on the server. You can get information on how much memory is being used on the current computer by the OS.
CMD_ServerStatusGet_Args ServerStatusGet
# ListenerCreate command
CMD_ListenerCreate Create New TCP Listener
CMD_ListenerCreate_Help This allows you to create a new TCP Listener on the server. By creating the TCP Listener the server starts listening for a connection from clients at the specified TCP/IP port number. \nA TCP Listener that has been created can be deleted by the ListenerDelete command. \nYou can also get a list of TCP Listeners currently registered by using the ListenerList command. \nnTo execute this command, you must have VPN Server administrator privileges.
CMD_ListenerCreate_Args ListenerCreate [port]
CMD_ListenerCreate_[port] Using an integer, specify the newly added TCP/IP listener port number. You can also use a port number that is already being used by a different program; however the VPN Server will not be able to use it until that program ends the use of that port. Specify a port number that is within the range of 1 to 65535.
CMD_ListenerCreate_PortPrompt Port number of newly added TCP/IP Listener:
# ListenerDelete command
CMD_ListenerDelete Delete TCP Listener
CMD_ListenerDelete_Help This allows you to delete a TCP Listener that's registered on the server. When the TCP Listener is in a state of operation, the listener will automatically be deleted when its operation stops. \nYou can also get a list of TCP Listeners currently registered by using the ListenerList command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ListenerDelete_Args ListenerDelete [port]
CMD_ListenerDelete_[port] Using an integer, specify the TCP/IP listener port number you want to delete.
CMD_ListenerDelete_PortPrompt Port number of TCP/IP Listener:
# ListenerList command
CMD_ListenerList Get List of TCP Listeners
CMD_ListenerList_Help This allows you to get a list of TCP listeners registered on the current server. You can obtain information on whether the various TCP listeners have a status of operating or error. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ListenerList_Args ListenerList
CMD_ListenerList_Column1 TCP Port Number
CMD_ListenerList_Column2 Status
# ListenerEnable command
CMD_ListenerEnable Begin TCP Listener Operation
CMD_ListenerEnable_Help This starts the operation of stopped TCP Listeners registered on the current server. \nYou can also get a list of TCP Listeners currently registered by using the ListenerList command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ListenerEnable_Args ListenerEnable [port]
CMD_ListenerEnable_[port] Using an integer, specify the port number of the TCP/IP listener you want to start.
CMD_ListenerEnable_PortPrompt Port number of TCP/IP Listener to start:
# ListenerDisable command
CMD_ListenerDisable Stop TCP Listener Operation
CMD_ListenerDisable_Help This stops the operation of operating TCP Listeners registered on the current server. \nYou can also get a list of TCP Listeners currently registered by using the ListenerList command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ListenerDisable_Args ListenerDisable [port]
CMD_ListenerDisable_[port] Using an integer, specify the port number of the TCP/IP listener you want to stop.
CMD_ListenerDisable_PortPrompt Port number of TCP/IP Listener to start:
# ServerPasswordSet command
CMD_ServerPasswordSet Set VPN Server Administrator Password
CMD_ServerPasswordSet_Help This sets the VPN Server administrator password. You can specify the password as a parameter. If the password is not specified, a prompt will be displayed to input the password and password confirmation. If you include the password as a parameter, this password will be displayed momentarily on the screen, which poses a risk. We recommend that whenever possible, avoid specifying this parameter and input the password using the password prompt. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ServerPasswordSet_Args ServerPasswordSet [password]
CMD_ServerPasswordSet_[password] This specifies a new password setting.
# ClusterSettingGet command
CMD_ClusterSettingGet Get Clustering Configuration of Current VPN Server
CMD_ClusterSettingGet_Help You can use this to acquire the clustering configuration of the current VPN Server. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ClusterSettingGet_Args ClusterSettingGet
CMD_ClusterSettingGet_Current Current Configuration
CMD_ClusterSettingGet_None (No setting)
CMD_ClusterSettingGet_PublicIp Public IP Address
CMD_ClusterSettingGet_PublicPorts List of Public Ports
CMD_ClusterSettingGet_Controller Destination Controller
CMD_ClusterSettingGet_ControllerOnly Controller Function Only
CMD_ClusterSettingGet_Weight Performance Standard in Cluster
# ClusterSettingStandalone command
CMD_ClusterSettingStandalone Set VPN Server Type as Standalone
CMD_ClusterSettingStandalone_Help Use this to set the VPN Server type as Standalone Server. Standalone server means a VPN Server that does not belong to any cluster in its current state. When VPN Server is installed, by default it will be in standalone server mode. Unless you have particular plans to configure a cluster, we recommend the VPN Server be operated in standalone mode. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, when this command is executed, VPN Server will automatically restart. \nThis command cannot be run on VPN Bridge.
CMD_ClusterSettingStandalone_Args ClusterSettingStandalone
# ClusterSettingController command
CMD_ClusterSettingController Set VPN Server Type as Cluster Controller
CMD_ClusterSettingController_Help Use this to set the VPN Server type as Cluster Controller. A cluster controller is the central computer of all member servers of a cluster in the case where a clustering environment is made up of multiple VPN Servers. A cluster requires one computer to serve this role. The other cluster member servers that are configured in the same cluster begin operation as a cluster member by connecting to the cluster controller. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, when this command is executed, VPN Server will automatically restart. \nThis command cannot be run on VPN Bridge.
CMD_ClusterSettingController_Args ClusterSettingController [/WEIGHT:weight] [/ONLY:yes|no]
CMD_ClusterSettingController_WEIGHT This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. Normally it is 100. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members during load balancing. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used.
CMD_ClusterSettingController_ONLY By specifying "yes" here, the VPN Server will operate only as a controller on the cluster and it will always distribute general VPN Client connections to members other than itself. This function is used in high-load environments. If this parameter is left unspecified, "no" will be used.
# ClusterSettingMember command
CMD_ClusterSettingMember Set VPN Server Type as Cluster Member
CMD_ClusterSettingMember_Help Use this to set the VPN Server type as Cluster Member Server. A cluster member server is a member computer belonging to a clustering configuration made up of multiple VPN Servers with another existing cluster controller as the center. Multiple cluster members can be added to the cluster as required. \nBefore setting the VPN Server as a cluster member server, first ask the administrator of the cluster controller to be used for the controller's IP address and port number, the public IP address and public port number (when required) of this VPN Server and the password. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, when this command is executed, VPN Server will automatically restart. \nThis command cannot be run on VPN Bridge.
CMD_ClusterSettingMember_Args ClusterSettingMember [server:port] [/IP:ip] [/PORTS:ports] [/PASSWORD:password] [/WEIGHT:weight]
CMD_ClusterSettingMember_[server:port] Specify the host name or IP address, and port number of the destination cluster controller using the parameter with the format host name:port number.
CMD_ClusterSettingMember_IP Specify the public IP address of this server. If you wish to leave public IP address unspecified, specify it like this: "/IP:none". When a public IP address is not specified, the IP address of the network interface used when connecting to the cluster controller will be automatically used.
CMD_ClusterSettingMember_PORTS Use this to specify the list of public port numbers on this server. The list must have at least one public port number set, and it is also possible to set multiple public port numbers. When specifying multiple port numbers, separate them using a comma such as "/PORTS443,992,8888".
CMD_ClusterSettingMember_PASSWORD Specify the password required to connect to the destination controller. It needs to be the same as an administrator password on the destination controller.
CMD_ClusterSettingMember_WEIGHT This sets a value for the performance standard ratio of this VPN Server. This is the standard value for when load balancing is performed in the cluster. For example, making only one machine 200 while the other members have a status of 100, will regulate that machine to receive twice as many connections as the other members. Specify 1 or higher for the value. If this parameter is left unspecified, 100 will be used.
CMD_ClusterSettingMember_Prompt_IP_1 Specify a public IP address. \nIf you wish to leave this unspecified, press Enter without inputting anything.
CMD_ClusterSettingMember_Prompt_IP_2 Public IP Address:
CMD_ClusterSettingMember_Prompt_PORT_1 Please specify a list of public port numbers. \nWhen specifying 2 or more port numbers, separate each entry with a comma, like: 444,992,888.
CMD_ClusterSettingMember_Prompt_PORT_2 Public Port Number:
CMD_ClusterSettingMember_Prompt_HOST_1 Destination Controller Host Name and Port Number:
# ClusterMemberList command
CMD_ClusterMemberList Get List of Cluster Members
CMD_ClusterMemberList_Help Use this command when the VPN Server is operating as a cluster controller to get a list of the cluster member servers on the same cluster, including the cluster controller itself. \nFor each member, the following information is also listed. Type, Connection Start, Host Name, Points, Number of Session, Number of TCP Connections, Number of Operating Virtual Hubs, Using Client Connection License and Using Bridge Connection License. \nThis command cannot be run on VPN Bridge.
CMD_ClusterMemberList_Args ClusterMemberList
# ClusterMemberInfoGet command
CMD_ClusterMemberInfoGet Get Cluster Member Information
CMD_ClusterMemberInfoGet_Help When the VPN Server is operating as a cluster controller, you can get information on cluster member servers on that cluster by specifying the IDs of the member servers. \nYou can get the following information about the specified cluster member server: Server Type, Time Connection has been Established, IP Address, Host Name, Points, Public Port List, Number of Operating Virtual Hubs, First Virtual Hub, Number of Sessions and Number of TCP Connections. \nThis command cannot be run on VPN Bridge.
CMD_ClusterMemberInfoGet_Args ClusterMemberInfoGet [id]
CMD_ClusterMemberInfoGet_[id] Specify the ID of the cluster member whose information you want to get. You can obtain the cluster member server ID by using the ClusterMemberList command.
CMD_ClusterMemberInfoGet_PROMPT_ID Cluster Member ID to Get Info:
# ClusterMemberCertGet command
CMD_ClusterMemberCertGet Get Cluster Member Certificate
CMD_ClusterMemberCertGet_Help When the VPN Server is operating as a cluster controller, you can get the public X.509 certificate of cluster member servers on that cluster by specifying the IDs of those member servers. You can save the certificate as an X.509 format file. \nThis command cannot be run on VPN Bridge.
CMD_ClusterMemberCertGet_Args ClusterMemberCertGet [id] [/SAVECERT:cert]
CMD_ClusterMemberCertGet_[id] Specify the ID of the cluster member whose certificate you want to get. You can obtain the cluster member server ID by using the ClusterMemberList command.
CMD_ClusterMemberCertGet_SAVECERT Specify the file path name to save the certificate you obtained. You can save the certificate in X.509 format.
CMD_ClusterMemberCertGet_PROMPT_ID Cluster Member ID to Get Certificate:
# ClusterConnectionStatusGet command
CMD_ClusterConnectionStatusGet Get Connection Status to Cluster Controller
CMD_ClusterConnectionStatusGet_Help Use this command when the VPN Server is operating as a cluster controller to get the status of connection to the cluster controller. \nYou can get the following information: Controller IP Address, Port Number, Connection Status, Connection Start Time, First Connection Established Time, Current Connection Established Time, Number of Connection Attempts, Number of Successful Connections, Number of Failed Connections. \nThis command cannot be run on VPN Bridge.
CMD_ClusterConnectionStatusGet_Args ClusterConnectionStatusGet
# Debug command
CMD_Debug Execute a Debug Command
CMD_Debug_Help Runs a debug command on the running VPN Server / Bridge process.\nThis command should be executed wjen the support staff requests to do so.\nMisuse of this command might cause a crash of VPN Server / Bridge running.
CMD_Debug_Args Debug [id] [/ARG:arg]
CMD_Debug_[id] Specify a debug command number.
CMD_Debug_ARG Specify a string to pass to the debug command. If a string contains spaces, contains the whole command by " ".
CMD_Debug_Msg1 Sending the debug command...
CMD_Debug_Msg2 The debug command has executed.\nResults: \"%S\"
# Crash command
CMD_Crash Raise a error on the VPN Server / Bridge to terminate the process forcefully.
CMD_Crash_Help This command will raise a fatal error (memory access violation) on the VPN Server / Bridge running process in order to crash the process. As the result, VPN Server / Bridge will be terminated and restarted if it is running as a service mode. If the VPN Server is running as a user mode, the process will not automatically restarted.\nThis command is for a situation when the VPN Server / Bridge is under a non-recoverable error or the process is in an infinite loop. This command will disconnect all VPN Sessions on the VPN Server / Bridge. All unsaved settings in the memory of VPN Server / Bridge will be lost.\nBefore run this command, run the Flush command to try to save volatile data to the configuration file.\nTo execute this command, you must have VPN Server / VPN Bridge administrator privileges.
CMD_Crash_Args Crash [yes]
CMD_Crash_[yes] Input "yes" for confirmation.
CMD_Crash_Msg Sending the Crush command to the VPN Server. The VPN Server will be let to crash immediately, so you can never get the result value of this command. After this moment, vpncmd will be disconnected from the VPN Server.
CMD_Crash_Confirm Do you really want to crash the VPN Server?\nInput "yes" if it is ok:
CMD_Crash_Aborted The Crash command has been aborted.
# Flush command
CMD_Flush Save All Volatile Data of VPN Server / Bridge to the Configuration File
CMD_Flush_Help Normally, the VPN Server / VPN Bridge retains the volatile configuration data in memory. It is flushed to the disk as vpn_server.config or vpn_bridge.config periodically. The period is 300 seconds (5 minutes) by default. (The period can be altered by modifying the AutoSaveConfigSpan item in the configuration file.) The data will be saved on the timing of shutting down normally of the VPN Server / Bridge.\nExecute the Flush command to make the VPN Server / Bridge save the settings to the file immediately. The setting data will be stored on the disk drive of the server computer. Use the Flush command in a situation that you do not have an enough time to shut down the server process normally.\nTo execute this command, you must have VPN Server administrator privileges. \nTo execute this command, you must have VPN Server / VPN Bridge administrator privileges.
CMD_Flush_Args Flush
CMD_Flush_Msg1 Writing volatile data from memory to the disk...\n
CMD_Flush_Msg2 Saving completed. The file size is %S bytes.\n
# ServerCertGet command
CMD_ServerCertGet Get SSL Certificate of VPN Server
CMD_ServerCertGet_Help Use this to get the SSL certificate that the VPN Server provides to the connected client. You can save the certificate as an X.509 format file.
CMD_ServerCertGet_Args ServerCertGet [cert]
CMD_ServerCertGet_[cert] Specify the file path name to save the certificate you obtained. You can save the certificate in X.509 format.
# ServerKeyGet command
CMD_ServerKeyGet Get SSL Certificate Private Key of VPN Server
CMD_ServerKeyGet_Help Use this to get the SSL certificate private key that the VPN Server provides to the connected client. You can save the private key as a Base 64 encoded file. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ServerKeyGet_Args ServerKeyGet [key]
CMD_ServerKeyGet_[key] Specify the file path name to save the private key you obtained. You can save the private key in a Base 64 encoded format.
# ServerCertSet command
CMD_ServerCertSet Set SSL Certificate and Private Key of VPN Server
CMD_ServerCertSet_Help You can set the SSL certificate that the VPN Server provides to the connected client and the private key for that certificate. The certificate must be in X.509 format and the private key must be Base 64 encoded format. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ServerCertSet_Args ServerCertSet [/LOADCERT:cert] [/LOADKEY:key]
CMD_ServerCertSet_LOADCERT Specify the X.509 format certificate file to use.
CMD_ServerCertSet_LOADKEY Specify the Base 64 encoded private key file for the certificate to use.
# ServerCipherGet command
CMD_ServerCipherGet Get the Encrypted Algorithm Used for VPN Communication.
CMD_ServerCipherGet_Help Use this to get the current setting of the algorithm used for the electronic signature and encrypted for SSL connection to be used for communication between the VPN Server and the connected client and the list of algorithms that can be used on the VPN Server.
CMD_ServerCipherGet_Args ServerCipherGet
CMD_ServerCipherGet_SERVER Encrypted Algorithm Currently Used by VPN Server:
CMD_ServerCipherGet_CIPHERS List of Usable Encrypted Algorithm Names:
# ServerCipherSet command
CMD_ServerCipherSet Set the Encrypted Algorithm Used for VPN Communication.
CMD_ServerCipherSet_Help Use this to set the algorithm used for the electronic signature and encrypted for SSL connections to be used for communication between the VPN Server and the connected client. \nBy specifying the algorithm name, the specified algorithm will be used later between the VPN Client and VPN Bridge connected to this server and the data will be encrypted. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ServerCipherSet_Args ServerCipherSet [name]
CMD_ServerCipherSet_[name] This specifies the encrypted and electronic signature algorithm to set. You can obtain the list of usable algorithms by using the ServerCipherGet command.
CMD_ServerCipherSet_PROMPT_NAME Encrypted Algorithm Name to Specify:
# KeepEnable command
CMD_KeepEnable Enable the Keep Alive Internet Connection Function
CMD_KeepEnable_Help This allows you to enable the Keep Alive Internet Connection Function. By using the Keep Alive Internet Connection Function for network connection environments where connections will automatically be disconnected when there are periods of no communication that are longer than a set period, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. \nYou can set a destination host name etc, by using the KeepSet command. \nTo execute this command on a VPN Server or VPN Bridge, you must have administrator privileges.
CMD_KeepEnable_Args KeepEnable
# KeepDisable command
CMD_KeepDisable Disable the Keep Alive Internet Connection Function
CMD_KeepDisable_Help This allows you to disable the Keep Alive Internet Connection Function.\nTo execute this command on a VPN Server or VPN Bridge, you must have administrator privileges.
CMD_KeepDisable_Args KeepDisable
# KeepSet command
CMD_KeepSet Set the Keep Alive Internet Connection Function
CMD_KeepSet_Help Use this to set the destination host name etc. of the Keep Alive Internet Connection Function. For network connection environments where connections will automatically be disconnected where there are periods of no communication that are longer than a set period, by using the Keep Alive Internet Connection Function, it is possible to keep alive the Internet connection by sending packets to a nominated server on the Internet at set intervals. \nWhen using this command, you can specify the following: Host Name, Port Number, Packet Send Interval, and Protocol. \nPackets sent to keep alive the Internet connection will have random content and personal information that could identify a computer or user is not sent. \nYou can use the KeepEnable command or KeepDisable command to enable/disable the Keep Alive Internet Connection Function. KeepSet does not change the enabled/disabled status. \nTo execute this command on a VPN Server or VPN Bridge, you must have administrator privileges.
CMD_KeepSet_Args KeepSet [/HOST:host:port] [/PROTOCOL:tcp|udp] [/INTERVAL:interval]
CMD_KeepSet_HOST Specify the host name or IP address, and port number of the destination using the format "host name:port number".
CMD_KeepSet_PROTOCOL Specify either tcp or udp.
CMD_KeepSet_INTERVAL Specify, in seconds, the interval between the sending of packets.
CMD_KeepSet_PROMPT_HOST Destination Host Name/IP Address and Port Number:
CMD_KeepSet_PROMPT_PROTOCOL tcp or udp:
CMD_KeepSet_PROMPT_INTERVAL Interval Between Packets Sends (Seconds):
CMD_KeepSet_EVAL_TCP_UDP Please specify "tcp" or "udp".
# KeepGet command
CMD_KeepGet Get the Keep Alive Internet Connection Function
CMD_KeepGet_Help Use this to get the current setting contents of the Keep Alive Internet Connection Function. In addition to the destination's Host Name, Port Number, Packet Send Interval and Protocol, you can obtain the current enabled/disabled status of the Keep Alive Internet Connection Function.
CMD_KeepGet_Args KeepGet
CMD_KeepGet_COLUMN_1 Host Name
CMD_KeepGet_COLUMN_2 Port Number
CMD_KeepGet_COLUMN_3 Packet Send Interval (Sec)
CMD_KeepGet_COLUMN_4 Protocol
CMD_KeepGet_COLUMN_5 Current Status
# SyslogEnable command
CMD_SyslogEnable Set syslog Send Function
CMD_SyslogEnable_Help Use this to set the usage of syslog send function and which syslog server to use.
CMD_SyslogEnable_Args SyslogEnable [1|2|3] [/HOST:host:port]
CMD_SyslogEnable_[1|2|3] Specify, using an integer, 1, 2 or 3 for the setting to use the syslog send function. \n1: Send server log by syslog. \n2: Send server and Virtual Hub security logs by syslog. \n3: Send server, Virtual Hub security, and packet logs by syslog.
CMD_SyslogEnable_HOST Specify the host name or IP address, and port number of the syslog server using the format [host name:port number]. If the port number is omitted, 514 will be used.
CMD_SyslogEnable_MINMAX Specify, using an integer, 1, 2 or 3 for the setting to use the syslog send function.
CMD_SyslogEnable_Prompt_123 Setting to Use syslog Send Function (1-3):
CMD_SyslogEnable_Prompt_HOST Specify syslog Server:
# SyslogDisable command
CMD_SyslogDisable Disable syslog Send Function
CMD_SyslogDisable_Help Use this to disable the syslog send function.
CMD_SyslogDisable_Args SyslogDisable
# SyslogGet command
CMD_SyslogGet Get syslog Send Function
CMD_SyslogGet_Help This allows you to get the current setting contents of the syslog send function. You can get the usage setting of the syslog function and the host name and port number of the syslog server to use.
CMD_SyslogGet_Args SyslogGet
CMD_SyslogGet_COLUMN_1 Set the Use of syslog Send Function
CMD_SyslogGet_COLUMN_2 syslog Server Host Name
CMD_SyslogGet_COLUMN_3 syslog Server Port Number
# ConnectionList command
CMD_ConnectionList Get List of TCP Connections Connecting to the VPN Server
CMD_ConnectionList_Help Use this to get a list of TCP/IP connections that are currently connecting to the VPN Server. It does not display the TCP connections that have been established as VPN sessions. To get the list of TCP/IP connections that have been established as VPN sessions, you can use the SessionList command. \nYou can get the following: Connection Name, Connection Source, Connection Start and Type.\nTo execute this command, you must have VPN Server administrator privileges.
CMD_ConnectionList_Args ConnectionList
# ConnectionList command
CMD_ConnectionGet Get Information of TCP Connections Connecting to the VPN Server
CMD_ConnectionGet_Help Use this to get detailed information of a specific TCP/IP connection that is connecting to the VPN Server. \nYou can get the following information: Connection Name, Connection Type, Source Hostname, Source IP Address, Source Port Number (TCP), Connection Start, Server Product Name, Server Version, Server Build Number, Client Product Name, Client Version, and Client Build Number. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ConnectionGet_Args ConnectionGet [name]
CMD_ConnectionGet_[name] This allows you to specify the name of the connection whose information you want to get. To get a list of connection names, you can use the ConnectionList command.
CMD_ConnectionGet_PROMPT_NAME Connection Name to Get Info:
# ConnectionDisconnect command
CMD_ConnectionDisconnect Disconnect TCP Connections Connecting to the VPN Server
CMD_ConnectionDisconnect_Help Use this to forcefully disconnect specific TCP/IP connections that are connecting to the VPN Server. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ConnectionDisconnect_Args ConnectionDisconnect [name]
CMD_ConnectionDisconnect_[name] Specify the name of the connection to disconnect. To get a list of connection names, you can use the ConnectionList command.
CMD_ConnectionDisconnect_PROMPT_NAME Connection Name to Disconnect:
# BridgeDeviceList command
CMD_BridgeDeviceList Get List of Network Adapters Usable as Local Bridge
CMD_BridgeDeviceList_Help Use this to get a list of Ethernet devices (network adapters) that can be used as a bridge destination device as part of a Local Bridge connection. If possible, network connection name is displayed. \nYou can use a device displayed here by using the BridgeCreate command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_BridgeDeviceList_Args BridgeDeviceList
# BridgeList command
CMD_BridgeList Get List of Local Bridge Connection
CMD_BridgeList_Help Use this to get a list of the currently defined Local Bridge connections. \nYou can get the Local Bridge connection Virtual Hub name and the bridge destination Ethernet device (network adapter) name or tap device name, as well as the operating status.
CMD_BridgeList_Args BridgeList
# BridgeCreate command
CMD_BridgeCreate Create Local Bridge Connection
CMD_BridgeCreate_Help Use this to create a new Local Bridge connection on the VPN Server.\nBy using a Local Bridge, you can configure a Layer 2 bridge connection between a Virtual Hub operating on this VPN server and a physical Ethernet Device (Network Adapter). \nYou can create a tap device (virtual network interface) on the system and connect a bridge between Virtual Hubs (the tap device is only supported by Linux versions). \nIt is possible to establish a bridge to an operating network adapter of your choice for the bridge destination Ethernet device (network adapter), but in high load environments, we recommend you prepare a network adapter dedicated to serve as a bridge. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_BridgeCreate_Args BridgeCreate [hubname] [/DEVICE:device_name] [/TAP:yes|no]
CMD_BridgeCreate_[hubname] Specify the Virtual Hub to create bridge. To get a list of Virtual Hubs, you can use the HubList command. It is not essential that you specify a Virtual Hub that is currently operating. If you specify a Virtual Hub name that is not currently operating or that does not exist, the Local Bridge connection will become enabled when the actual operation of that Virtual Hub begins.
CMD_BridgeCreate_DEVICE Specify the bridge destination Ethernet device (network adapter) or tap device name. You can get the list of Ethernet device names by using the BridgeDeviceList command.
CMD_BridgeCreate_TAP Specify yes if you are using a tap device rather than a network adapter for the bridge destination (only supported for Linux versions). When this is omitted, it will be treated the same as when no is specified.
CMD_BridgeCreate_PROMPT_HUBNAME Virtual Hub Name to Create Bridge:
CMD_BridgeCreate_PROMPT_DEVICE Bridge Destination Device Name:
CMD_BridgeCreate_PROMPT_TAP Use tap device? (yes/no):
# BridgeDelete command
CMD_BridgeDelete Delete Local Bridge Connection
CMD_BridgeDelete_Help Use this to delete an existing Local Bridge connection. To get a list of current Local Bridge connections use the BridgeDeviceList command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_BridgeDelete_Args BridgeDelete [hubname] [/DEVICE:device_name]
CMD_BridgeDelete_[hubname] Specify the Virtual Hub of the Local Bridge to delete.
CMD_BridgeDelete_DEVICE Specify the device name (network adapter or tap device name) of the Local Bridge to delete.
CMD_BridgeDelete_PROMPT_HUBNAME Virtual Hub Name to Delete Bridge:
CMD_BridgeDelete_PROMPT_DEVICE Bridge Device Name to Delete:
# Caps command
CMD_Caps Get List of Server Functions/Capability
CMD_Caps_Help Use this get a list of functions and capability of the VPN Server currently connected and being managed. \nThe function and capability of VPN Servers are different depending on the operating VPN server's edition and version. Sometimes commands may be included in the command line management utility that cannot operate because of the function and capability of the destination VPN Server. Using this command, you can find out the capability of the target VPN Server and report it. \nIf the version of the VPN Server is newer than the command line management utility and there are functions that the command line management utility does not recognize, you can display the contents strings (variable names) as they are.
CMD_Caps_Args Caps
# Reboot command
CMD_Reboot Reboot VPN Server Service
CMD_Reboot_Help Use this to restart the VPN Server service. \nWhen you restart the VPN Server, all currently connected sessions and TCP connections will be disconnected and no new connections will be accepted until the restart process has completed. \nBy using this command, only the VPN Server service program will be restarted and the physical computer that VPN Server is operating on does not restart. This management session will also be disconnected, so you will need to reconnect to continue management. \nAlso, by specifying the /RESTCONFIG:yes parameter, the contents of the configuration file (.config) held by the current VPN Server will be initialized. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_Reboot_Args Reboot [/RESETCONFIG:yes|no]
CMD_Reboot_RESETCONFIG By specifying yes, the contents of the configuration file (.config) held by the current VPN Server will be initialized. Please carefully consider the implications when setting this parameter.
# ConfigGet command
CMD_ConfigGet Get the current configuration of the VPN Server
CMD_ConfigGet_Help Use this to get a text file (.config file) that contains the current configuration contents of the VPN server. You can get the status on the VPN Server at the instant this command is executed. \nWhen part of the contents of the configuration file does not specify a parameter, it will be displayed on screen as it is. By specifying a save destination file name by parameter, the contents will be saved by that file name. \nYou can edit the configuration file by using a regular text editor. To write an edited configuration to the VPN Server, use the ConfigSet command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ConfigGet_Args ConfigGet [path]
CMD_ConfigGet_[path] When you want to save the contents of the configuration file to a file, use this to specify the file name. If left unspecified, the configuration contents will be displayed on screen. If the configuration file contains multiple-byte characters, the encoding must be saved as Unicode (UTF-8).
CMD_ConfigGet_FILENAME Config name: "%S", Size: %u
CMD_ConfigGet_FILE_SAVE_FAILED Creation of specified file failed.
# ConfigSet command
CMD_ConfigSet Write Configuration File to VPN Server
CMD_ConfigSet_Help Use this to write the configuration file to the VPN Server. By executing this command, the contents of the specified configuration file will be applied to the VPN Server and the VPN Server program will automatically restart and upon restart, operate according to the new configuration contents. \nBecause it is difficult for an administrator to write all the contents of a configuration file, we recommend you use the ConfigGet command to get the current contents of the VPN Server configuration and save it to file. You can then edit these contents in a regular text editor and then use the ConfigSet command to rewrite the contents to the VPN Server. \nThis command is for people with a detailed knowledge of the VPN Server and if an incorrectly configured configuration file is written to the VPN Server, it not only could cause errors, it could also result in the lost of the current setting data. Take special care when carrying out this action. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_ConfigSet_Args ConfigSet [path]
CMD_ConfigSet_[path] Specify the file name of the write destination configuration file. If the write destination file contains multiple-byte characters, the encoding must be Unicode (UTF-8).
CMD_ConfigSet_PROMPT_PATH Config file path name to upload to server:
CMD_ConfigSet_FILE_LOAD_FAILED Reading from specified file failed.
# RouterList command
CMD_RouterList Get List of Virtual Layer 3 Switches
CMD_RouterList_Help Use this to get the list of Virtual Layer 3 Switches defined on the VPN Server. You can get the following information on the Virtual Layer 3 Switches: Switch Name, Operating Status, Number of Interfaces, and Number of Routing Tables. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge.
CMD_RouterList_Args RouterList
# RouterAdd command
CMD_RouterAdd Define New Virtual Layer 3 Switch
CMD_RouterAdd_Help Use this to define a new Virtual Layer 3 Switch on the VPN Server. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \n\n[Explanation on Virtual Layer 3 Switch Function]\nYou can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. \n\n[Caution about the Virtual Layer 3 Switch Function]\nThe Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. \nIf the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network.
CMD_RouterAdd_Args RouterAdd [name]
CMD_RouterAdd_[name] Use this to specify the name of the newly created Virtual Layer 3 Switch name. You cannot add a name that is identical to an existing Virtual Layer 3 Switch.
CMD_RouterAdd_PROMPT_NAME Name of Virtual Layer 3 Switch to Create:
# RouterDelete command
CMD_RouterDelete Delete Virtual Layer 3 Switch
CMD_RouterDelete_Help Use this to delete an existing Virtual Layer 3 Switch that is defined on the VPN Server. When the specified Virtual Layer 3 Switch is operating, it will be automatically deleted after operation stops. \nTo get a list of existing Virtual Layer 3 Switches, use the RouterList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge.
CMD_RouterDelete_Args RouterDelete [name]
CMD_RouterDelete_[name] Use this to specify the name of the Virtual Layer 3 Switch to be deleted.
CMD_RouterDelete_PROMPT_NAME Name of Virtual Layer 3 Switch to Delete:
# RouterStart command
CMD_RouterStart Start Virtual Layer 3 Switch Operation
CMD_RouterStart_Help Use this to start the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently stopped. \nTo get a list of existing Virtual Layer 3 Switches, use the RouterList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \n\n[Explanation on Virtual Layer 3 Switch Function]\nYou can define Virtual Layer 3 Switches between multiple Virtual Hubs operating on this VPN Server and configure routing between different IP networks. \n\n[Caution about the Virtual Layer 3 Switch Function]\nThe Virtual Layer 3 Switch functions are provided for network administrators and other people who know a lot about networks and IP routing. If you are using the regular VPN functions, you do not need to use the Virtual Layer 3 Switch functions. \nIf the Virtual Layer 3 Switch functions are to be used, the person who configures them must have sufficient knowledge of IP routing and be perfectly capable of not impacting the network.
CMD_RouterStart_Args RouterStart [name]
CMD_RouterStart_[name] Use this to specify the name of the Virtual Layer 3 Switch to start.
CMD_RouterStart_PROMPT_NAME Name of Virtual Layer 3 Switch to Start:
# RouterStop command
CMD_RouterStop Stop Virtual Layer 3 Switch Operation
CMD_RouterStop_Help Use this to stop the operation of an existing Virtual Layer 3 Switch defined on the VPN Server whose operation is currently operating. \nTo get a list of existing Virtual Layer 3 Switches, use the RouterList command. \nTo execute this command, you must have VPN Server administrator privileges.
CMD_RouterStop_Args RouterStop [name]
CMD_RouterStop_[name] Use this to specify the name of the Virtual Layer 3 Switch to stop.
CMD_RouterStop_PROMPT_NAME Name of Virtual Layer 3 Switch to Stop:
# RouterIfList command
CMD_RouterIfList Get List of Interfaces Registered on the Virtual Layer 3 Switch
CMD_RouterIfList_Help Use this to get a list of virtual interfaces when virtual interfaces have been defined on a specified Virtual Layer 3 Switch. \nYou can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. \nA virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge.
CMD_RouterIfList_Args RouterIfList [name]
CMD_RouterIfList_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterIfList_PROMPT_NAME Name of Virtual Layer 3 Switch:
# RouterIfAdd command
CMD_RouterIfAdd Add Virtual Interface to Virtual Layer 3 Switch
CMD_RouterIfAdd_Help Use this to add to a specified Virtual Layer 3 Switch, a virtual interface that connects to a Virtual Hub operating on the same VPN Server. \nYou can define multiple virtual interfaces and routing tables for a single Virtual Layer 3 Switch. \nA virtual interface is associated to a virtual Hub and operates as a single IP host on the Virtual Hub when that Virtual Hub is operating. When multiple virtual interfaces that respectively belong to a different IP network of a different Virtual Hub are defined, IP routing will be automatically performed between these interfaces. \nYou must define the IP network space that the virtual interface belongs to and the IP address of the interface itself. \nAlso, you must specify the name of the Virtual Hub that the interface will connect to. \nYou can specify a Virtual Hub that currently doesn't exist for the Virtual Hub name. \nThe virtual interface must have one IP address in the Virtual Hub. You also must specify the subnet mask of an IP network that the IP address belongs to. \nRouting via the Virtual Layer 3 Switches of IP spaces of multiple virtual Hubs operates based on the IP address is specified here. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \nTo execute this command, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the RouterStop command to stop it and then execute this command.
CMD_RouterIfAdd_Args RouterIfAdd [name] [/HUB:hub] [/IP:ip/mask]
CMD_RouterIfAdd_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterIfAdd_HUB Use this to specify the name of the Virtual Hub to be the connection destination of the virtual interface to be newly added. To get a list of Virtual Hubs, you can use the HubList command. It is not essential that you specify a Virtual Hub that is currently operating. If you specify a Virtual Hub name that is not currently operating or that does not exist, the Virtual Layer 3 Switch will become enabled when the actual operation of that Virtual Hub begins.
CMD_RouterIfAdd_IP Using the format: "IP address/subnet mask", specify the IP address and subnet mask held by the virtual interface to be newly added. Specify the IP address by separating the decimal values using dots such as 192.168.0.1 For the subnet mask, either specify decimal values separated by dots such as 255.255.255.0, or you can specify the bit length from the header using a decimal value such as 24.
CMD_RouterIfAdd_PROMPT_NAME Name of Virtual Layer 3 Switch:
CMD_RouterIfAdd_PROMPT_HUB Destination Virtual Hub Name of Virtual Interface:
CMD_RouterIfAdd_PROMPT_IP IP Address/Subnet Mask:
# RouterIfDel command
CMD_RouterIfDel Delete Virtual Interface of Virtual Layer 3 Switch
CMD_RouterIfDel_Help Use this to delete a virtual interface already defined in the specified Virtual Layer 3 Switch. \nYou can get a list of the virtual interfaces currently defined, by using the RouterIfList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \nTo execute this command, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the RouterStop command to stop it and then execute this command.
CMD_RouterIfDel_Args RouterIfDel [name] [/HUB:hub]
CMD_RouterIfDel_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterIfDel_HUB Use this to specify the name of the Virtual Hub to be the connection destination of the virtual interface to be deleted.
# RouterTableList command
CMD_RouterTableList Get List of Routing Tables of Virtual Layer 3 Switch
CMD_RouterTableList_Help Use this to get a list of routing tables when routing tables have been defined on a specified Virtual Layer 3 Switch. \nIf the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference this routing table and execute routing. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge.
CMD_RouterTableList_Args RouterTableList [name]
CMD_RouterTableList_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterTableList_PROMPT_NAME Name of Virtual Layer 3 Switch:
# RouterTableAdd command
CMD_RouterTableAdd Add Routing Table Entry for Virtual Layer 3 Switch
CMD_RouterTableAdd_Help Here you can add a new routing table entry to the routing table of the specified Virtual Layer 3 Switch. \nIf the destination IP address of the IP packet does not belong to any IP network that belongs to a virtual interface, the IP routing engine of the Virtual Layer 3 Switch will reference the routing table and execute routing. \nYou must specify the contents of the routing table entry to be added to the Virtual Layer 3 Switch. You must specify any IP address that belongs to the same IP network in the virtual interface of this Virtual Layer 3 Switch as the gateway address. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \nTo execute this command, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the RouterStop command to stop it and then execute this command.
CMD_RouterTableAdd_Args RouterTableAdd [name] [/NETWORK:ip/mask] [/GATEWAY:gwip] [/METRIC:metric]
CMD_RouterTableAdd_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterTableAdd_NETWORK Using the format: "IP address/subnet mask", specify the network address and subnet mask of the routing table entry to be newly added. Specify the network address by separating the decimal values using dots such as "192.168.0.1". For the subnet mask, either specify decimal values separated by dots such as 255.255.255.0, or you can specify the bit length from the header using a decimal value such as 24. If you specify 0.0.0.0/0.0.0.0, the default route will be used.
CMD_RouterTableAdd_GATEWAY Specify the gateway IP address.
CMD_RouterTableAdd_METRIC Specify a metric value. Specify an integer (1 or higher).
CMD_RouterTableAdd_PROMPT_NAME Name of Virtual Layer 3 Switch:
CMD_RouterTableAdd_PROMPT_NETWORK Network Address/Subnet Mask:
CMD_RouterTableAdd_PROMPT_GATEWAY Gateway Address:
CMD_RouterTableAdd_PROMPT_METRIC Metric Value:
# RouterTableDel command
CMD_RouterTableDel Delete Routing Table Entry of Virtual Layer 3 Switch
CMD_RouterTableDel_Help Use this to delete a routing table entry that is defined in the specified Virtual Layer 3 Switch. \nYou can get a list of the already defined routing table entries by using the RouterTableList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Bridge. \nTo execute this command, the target Virtual Layer 3 Switch must be stopped. If it is not stopped, first use the RouterStop command to stop it and then execute this command.
CMD_RouterTableDel_Args RouterTableDel [name] [/NETWORK:ip/mask] [/GATEWAY:gwip] [/METRIC:metric]
CMD_RouterTableDel_[name] Use this to specify the name of the Virtual Layer 3 Switch.
CMD_RouterTableDel_NETWORK Using the format: "IP address/subnet mask", specify the network address of the routing table entry to be deleted.
CMD_RouterTableDel_GATEWAY Specify the gateway IP address.
CMD_RouterTableDel_METRIC Specify a metric value. Specify an integer (1 or higher).
# LogFileList command
CMD_LogFileList Get List of Log Files
CMD_LogFileList_Help Use this to display a list of log files outputted by the VPN Server that have been saved on the VPN Server computer. By specifying a log file file name displayed here and calling it using the LogFileGet command you can download the contents of the log file. \nIf you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. \nWhen connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management.
CMD_LogFileList_Args LogFileList
CMD_LogFileList_START Getting list of log files. This may take a while. Please wait...
CMD_LogFileList_NUM_LOGS In total there are %u log files.
# LogFileGet command
CMD_LogFileGet Download Log file
CMD_LogFileGet_Help Use this to download the log file that is saved on the VPN Server computer. To download the log file first display the list of log files using the LogFileList command and then download the log file using the LogFileGet command. If you are connected to the VPN Server in server admin mode, you can display or download the packet logs and security logs of all Virtual Hubs and the server log of the VPN Server. When connected in Virtual Hub Admin Mode, you are able to view or download only the packet log and security log of the Virtual Hub that is the target of management. \nIf you have specified the file name as a parameter, the downloaded log file will be saved to the file of that file name. If the destination file is not specified, the log file will be displayed onscreen. \nThe size of the log file can get very big, so pay careful attention to this issue.
CMD_LogFileGet_Args LogFileGet [name] [/SERVER:server] [/SAVEPATH:savepath]
CMD_LogFileGet_[name] Specify the name of the log file to be downloaded. To get a list of downloadable log files, use the LogFileList command.
CMD_LogFileGet_SERVER Use this to specify the server name when making a download request to a cluster controller. Specify the server that will be displayed by the LogFileGet command.
CMD_LogFileGet_SAVEPATH Use this to specify the destination file name for when saving the downloaded log file. When this is left unspecified, the file will be displayed onscreen.
CMD_LogFileGet_PROMPT_NAME Name of log file to download:
CMD_LogFileGet_START Downloading log file. This may take a while. Please wait...
CMD_LogFileGet_FAILED The download failed.
CMD_LogFileGet_SAVE_FAILED Unable to write to the specified file.
CMD_LogFileGet_FILESIZE File size of log file: %u
# HubCreate command
CMD_HubCreate Create New Virtual Hub
CMD_HubCreate_Help Use this to create a new Virtual Hub on the VPN Server. \nThe created Virtual Hub will begin operation immediately. \nWhen the VPN Server is operating on a cluster, this command is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the HubSetStatic command. To get a list of Virtual Hubs that are already on the VPN Server, use the HubList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge or cluster member. \nWhen issuing the command to a cluster controller on a cluster to create a Virtual Hub, use either the HubCreateStatic command or the HubCreateDynamic command (issuing the HubCreate command to a cluster controller has the same operational effect as issuing the HubCreateDynamic command).
CMD_HubCreate_Args HubCreate [name] [/PASSWORD:password]
CMD_HubCreate_[name] Specify the name of the Virtual Hub to create.
CMD_HubCreate_PASSWORD Specify an administrator password when the administrator password is going to be set for the Virtual Hub to be created. If this is not specified, a prompt will appear to input the password.
CMD_HubCreate_PROMPT_NAME Name of Virtual Hub to be created:
# HubCreateDynamic command
CMD_HubCreateDynamic Create New Dynamic Virtual Hub (For Clustering)
CMD_HubCreateDynamic_Help Use this to create a new dynamic Virtual Hub on the VPN Server. \nThe created Virtual Hub will begin operation immediately. \nWhen the VPN Server is operating on a cluster, this command is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the HubSetStatic command. To get a list of Virtual Hubs that are already on the VPN Server, use the HubList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge, cluster member or standalone server.
CMD_HubCreateDynamic_Args HubCreateDynamic [name] [/PASSWORD:password]
CMD_HubCreateDynamic_[name] Specify the name of the Virtual Hub to create.
CMD_HubCreateDynamic_PASSWORD Specify an administrator password when the administrator password is going to be set for the Virtual Hub to be created. If this is not specified, a prompt will appear to input the password.
# HubCreateStatic command
CMD_HubCreateStatic Create New Static Virtual Hub (For Clustering)
CMD_HubCreateStatic_Help Use this to create a new static Virtual Hub on the VPN Server. \nThe created Virtual Hub will begin operation immediately. \nWhen the VPN Server is operating on a cluster, this command is only valid for the cluster controller. Also, the new Virtual Hub will operate as a dynamic Virtual Hub. You can change it to a static Virtual Hub by using the HubSetStatic command. To get a list of Virtual Hubs that are already on the VPN Server, use the HubList command. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge, cluster member or standalone server.
CMD_HubCreateStatic_Args HubCreateStatic [name] [/PASSWORD:password]
CMD_HubCreateStatic_[name] Specify the name of the Virtual Hub to create.
CMD_HubCreateStatic_PASSWORD Specify an administrator password when the administrator password is going to be set for the Virtual Hub to be created. If this is not specified, a prompt will appear to input the password.
# HubDelete command
CMD_HubDelete Delete Virtual Hub
CMD_HubDelete_Help Use this to delete an existing Virtual Hub on the VPN Server. \nIf you delete the Virtual Hub, all sessions that are currently connected to the Virtual Hub will be disconnected and new sessions will be unable to connect to the Virtual Hub. \nAlso, this will also delete all the Hub settings, user objects, group objects, certificates and Cascade Connections. \nOnce you delete the Virtual Hub, it cannot be recovered. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge or cluster member.
CMD_HubDelete_Args HubDelete [name]
CMD_HubDelete_[name] Specify the name of the Virtual Hub to delete.
CMD_HubDelete_PROMPT_NAME Name of Virtual Hub to delete:
# HubSetStatic command
CMD_HubSetStatic Change Virtual Hub Type to Static Virtual Hub
CMD_HubSetStatic_Help Use this when a VPN Server is operating on a cluster and you want to change the type of the Virtual Hub to a static Virtual Hub. When the type of the Virtual Hub is changed, all sessions that are currently connected to the Virtual Hub will be disconnected. \nWhen there is a Virtual Hub operating as a static virtual Hub, a Virtual Hub with that name will be created on all the cluster member servers. A user who attempts to connect this Virtual Hub will be connected to one of the cluster members hosting this Virtual Hub as determined by an algorithm based on each server's load status. \nA static Virtual Hub, for example, could be used for a remote access VPN that allows thousands or tens of thousands of users to connect at the same time for the purpose of remotely accessing an internal company LAN from the Internet for business. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge, cluster member or standalone server. \nThis command cannot be used for VPN Servers that are newer than Build 5190.
CMD_HubSetStatic_Args HubSetStatic [name]
CMD_HubSetStatic_[name] Specify the name of the Virtual Hub to be set as the static Virtual Hub.
CMD_HubChange_PROMPT_NAME Name of Virtual Hub to change setting:
# HubSetDynamic command
CMD_HubSetDynamic Change Virtual Hub Type to Dynamic Virtual Hub
CMD_HubSetDynamic_Help Use this when a VPN Server is operating on a cluster and you want to change the type of the Virtual Hub to a dynamic Virtual Hub. When the type of the Virtual Hub is changed, all sessions that are currently connected to the Virtual Hub will be disconnected. \nWhen there is not even one client connected to a dynamic Virtual Hub defined on the cluster, then that Virtual Hub does not exist on any cluster member. When the first client to attempt to connect to the dynamic Virtual Hub does so, the server with the lowest load on the cluster starts hosting that Virtual Hub. When the second and subsequent clients attempt to connect to the same virtual Hub, they are automatically connected to the server hosting the Virtual Hub. When all the clients are disconnected from a particular dynamic Virtual Hub, the Virtual Hub will return to the original state of not existing on any of the servers. \nThere is a broad range of applications for dynamic Virtual Hubs, such as a Virtual Hub defined for each business section within a company so that employees can connect to the Virtual Hub of their own department to do their work in a centralized management environment that is deployed on a single cluster. \nTo execute this command, you must have VPN Server administrator privileges. \nAlso, this command does not operate on VPN Servers that are operating as a VPN Bridge, cluster member or standalone server. \nThis command cannot be used for VPN Servers that are newer than Build 5190.
CMD_HubSetDynamic_Args HubSetDynamic [name]
CMD_HubSetDynamic_[name] Specify the name of the Virtual Hub to be set as the dynamic Virtual Hub.
# HubList command
CMD_HubList Get List of Virtual Hubs
CMD_HubList_Help Use this to get a list of existing Virtual Hubs on the VPN Server. For each Virtual Hub, you can get the following information: Virtual Hub Name, Status, Type, Number of Users, Number of Groups, Number of Sessions, Number of MAC Tables, Number of IP Tables, Number of Logins, Last Login, and Last Communication.\nNote that when connecting in Virtual Hub Admin Mode, if in the options of a Virtual Hub that you do not have administrator privileges for, the option Don't Enumerate this Virtual Hub for Anonymous Users is enabled then that Virtual Hub will not be enumerated. If you are connected in Server Admin Mode, then the list of all Virtual Hubs will be displayed. \nWhen connecting to and managing a non-cluster-controller cluster member of a clustering environment, only the Virtual Hub currently being hosted by that VPN Server will be displayed. When connecting to a cluster controller for administration purposes, all the Virtual Hubs will be displayed.
CMD_HubList_Args HubList
# Hub command
CMD_Hub Select Virtual Hub to Manage
CMD_Hub_Help Use this to select the Virtual Hub to be the target of administration. For an administration utility with the status of being connected to a VPN Server, before executing a command to set or manage a Virtual Hub, you must use the Hub command to select the Virtual Hub to manage. \nWhen in the status of being connected to a VPN Server in Virtual Hub Admin Mode, you can select a single Virtual Hub to be the target of administration but you cannot select other Virtual Hubs. When having the status of being connected to the VPN Server in Server Admin Mode, you can make all Virtual Hubs the target of administration. \nTo get a list of Virtual Hubs that currently exist on the VPN Server, use the HubList command. \nFor the VPN Bridge, you can only select the Virtual Hub that has the name "BRIDGE".
CMD_Hub_Args Hub [name]
CMD_Hub_[name] Specify the name of the Virtual Hub to manage. If this parameter is left unspecified, the Select Virtual Hub to Manage will be cancelled.
CMD_Hub_Unselected The Virtual Hub selection has been unselected.
CMD_Hub_Selected The Virtual Hub "%S" has been selected.
CMD_Hub_Select_Failed When attempting to select Virtual Hub "%S" that has been specified by /ADMINHUB, the following error occurred.
CMD_Hub_Not_Selected Before executing this command, first select the Virtual Hub to manage using the Hub command.
# Online command
CMD_Online Switch Virtual Hub to Online
CMD_Online_Help Use this when the Virtual Hub currently being managed is offline to switch it to online. A Virtual Hub with an offline status cannot receive VPN connections from clients. By switching the Virtual Hub to online, that Virtual Hub becomes able to receive connections from users and provide services. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_Online_Args Online
# Offline command
CMD_Offline Switch Virtual Hub to Offline
CMD_Offline_Help Use this when the Virtual Hub currently being managed is online to switch it to offline. If there are sessions currently connected to the Virtual Hub, all sessions will be disconnected. A Virtual Hub with an offline status cannot receive VPN connections from clients. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_Offline_Args Offline
# SetMaxSession command
CMD_SetMaxSession Set the Max Number of Concurrently Connected Sessions for Virtual Hub
CMD_SetMaxSession_Help Use this to set the maximum number of sessions that can be concurrently connected to the Virtual Hub that is currently being managed. When there are more sessions than the maximum number of concurrently connected sessions that are being connected from the VPN Client or VPN Bridge, when the maximum number of sessions is reached, clients will no longer be able to connect. This limit on the maximum number of concurrently connected sessions does not include sessions generated in the Virtual Hub by Local Bridges, Virtual NAT, and Cascade Connections. \nYou can get the current setting for the max number of concurrently connected sessions by using the OptionsGet command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SetMaxSession_Args SetMaxSession [max_session]
CMD_SetMaxSession_[max_session] Using an integer, specify the maximum number of concurrently connected sessions to set. Specifying 0 results in a setting of unlimited.
CMD_SetMaxSession_Prompt Max Number of Sessions:
# SetHubPassword command
CMD_SetHubPassword Set Virtual Hub Administrator Password
CMD_SetHubPassword_Help Use this to set the Administrator Password for the Virtual Hub that is currently being managed. When a Virtual Hub administrator password has been set, you are able to connect to that Virtual Hub from a VPN Server connection utility in Virtual Hub Admin Mode, by specifying the password. It is also possible to make a VPN connection from a VPN client or VPN Bridge by specifying "Administrator" for the user name and the password for the Virtual Hub administrator password. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SetHubPassword_Args SetHubPassword [password]
CMD_SetHubPassword_[password] Specify the password you wish to set. If a password is not specified by parameter, a prompt will appear to input the password.
# SetEnumAllow command
CMD_SetEnumAllow Allow Enumeration by Virtual Hub Anonymous Users
CMD_SetEnumAllow_Help Use this to change the options setting of the Virtual Hub you are currently managing to allow anonymous users to enumerate this Virtual Hub. By setting this option, it makes it possible for VPN Client users to enumerate this Virtual Hub simply by inputting this VPN Server address. Also, by using the SetEnumDeny command, you can deny anonymous users the ability to enumerate. At the time a Virtual Hub is created, enumeration will be allowed. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SetEnumAllow_Args SetEnumAllow
# SetEnumDeny command
CMD_SetEnumDeny Deny Enumeration by Virtual Hub Anonymous Users
CMD_SetEnumDeny_Help Use this to change the options setting of the Virtual Hub you are currently managing to prevent anonymous users from enumerating this Virtual Hub. By setting this option, the VPN Client user will be unable to enumerate this Virtual Hub even if they send a Virtual Hub enumeration request to the VPN Server. Also, by using the SetEnumAllow command, you can allow anonymous users to enumerate. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SetEnumDeny_Args SetEnumDeny
# OptionsGet command
CMD_OptionsGet Get Options Setting of Virtual Hubs
CMD_OptionsGet_Help Use this to get a list of the Options setting of the Virtual Hub currently being managed. You can get the following: Allow/Deny Virtual Hub Enumeration, Maximum Concurrent Connections, Online/Offline Status, and Virtual Hub Type in Clustering Environment. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_OptionsGet_Args OptionsGet
CMD_OptionsGet_TITLE Options Setting List of Virtual Hub "%S"
CMD_OptionsGet_ENUM Enumeration of Virtual Hub for Anonymous User
CMD_OptionsGet_MAXSESSIONS Max Number of Sessions
CMD_OptionsGet_STATUS Status
CMD_OptionsGet_TYPE Virtual Hub Type
# RadiusServerSet command
CMD_RadiusServerSet Set RADIUS Server to use for User Authentication
CMD_RadiusServerSet_Help To accept users to the currently managed Virtual Hub in RADIUS server authentication mode, you can specify an external RADIUS server that confirms the user name and password. (You can specify multiple hostname by splitting with comma or semicolon.) \nThe RADIUS server must be set to receive requests from IP addresses of this VPN Server. Also, authentication by Password Authentication Protocol (PAP) must be enabled. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_RadiusServerSet_Args RadiusServerSet [server_name:port] [/SECRET:secret] [/RETRY_INTERVAL:interval]
CMD_RadiusServerSet_[server_name:port] Using the format "host name:port number", specify the host name or IP address, and the UDP port number of the RADIUS server being used. If the port number is omitted, 1812 will be used. You can specify multiple hostname by splitting with comma or semicolon.
CMD_RadiusServerSet_SECRET Specify the shared secret (password) used for communication with the RADIUS Server
CMD_RadiusServerSet_RETRY_INTERVAL Specify the retry interval between retries in milliseconds.
CMD_RadiusServerSet_Prompt_Host Host Number and Port Number of RADIUS Server to Use:
CMD_RadiusServerSet_Prompt_Secret Shared Secret:
CMD_RadiusServerSet_Prompt_RetryInterval Retry Interval (milliseconds):
CMD_RadiusServerSet_EVAL_NUMINTERVAL The retry interval must be in from 500 to 10000 milliseconds.
# RadiusServerDelete command
CMD_RadiusServerDelete Delete Setting to Use RADIUS Server for User Authentication
CMD_RadiusServerDelete_Help Use this to delete the setting related to using a RADIUS server when a user connects to the currently managed Virtual Hub in RADIUS Server Authentication Mode and disable the RADIUS authentication. To get the settings related to the current RADIUS server use the RadiusServerGet command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_RadiusServerDelete_Args RadiusServerDelete
# RadiusServerGet command
CMD_RadiusServerGet Get Setting of RADIUS Server Used for User Authentication
CMD_RadiusServerGet_Help Use this to get the current settings for the RADIUS server used when a user connects to the currently managed Virtual Hub using RADIUS Server Authentication Mode. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_RadiusServerGet_Args RadiusServerGet
CMD_RadiusServerGet_STATUS Use RADIUS Server
CMD_RadiusServerGet_HOST RADIUS Server Host Name or IP Address:
CMD_RadiusServerGet_PORT RADIUS Server Port Number
CMD_RadiusServerGet_SECRET Shared Secret
CMD_RadiusServerGet_RetryInterval Retry Interval (in milliseconds)
# StatusGet command
CMD_StatusGet Get Current Status of Virtual Hub
CMD_StatusGet_Help Use this to get the current status of the Virtual Hub currently being managed. You can get the following information: Virtual Hub Type, Number of Sessions, Number of Each Type of Object, Number of Logins, Last Login, Last Communication, and Communication Statistical Data.
CMD_StatusGet_Args StatusGet
# LogGet command
CMD_LogGet Get Log Save Setting of Virtual Hub
CMD_LogGet_Help Use this to get the log save setting for the Virtual Hub that is currently being managed. You can get the setting information such as the save setting related to security logs and packet logs and information on what has been saved.
CMD_LogGet_Args LogGet
CMD_Log_SecurityLog Save Security Log
CMD_Log_PacketLog Save Packet Log
CMD_Log_SwitchType Log File Switch Cycle
CMD_Log_0 TCP Connection Log
CMD_Log_1 TCP Packet Log
CMD_Log_2 DHCP Log
CMD_Log_3 UDP Log
CMD_Log_4 ICMP Log
CMD_Log_5 IP Log
CMD_Log_6 ARP Log
CMD_Log_7 Ethernet Log
# LogEnable command
CMD_LogEnable Enable Security Log or Packet Log
CMD_LogEnable_Help Use this to enable a security log or packet log of the Virtual Hub currently being managed. \nTo get the current setting, you can use the LogGet command.
CMD_LogEnable_Args LogEnable [security|packet]
CMD_LogEnable_[security|packet] Select the type of log to enable. Specify either "security" or "packet".
CMD_LogEnable_Prompt Select Security or Packet:
CMD_LogEnable_Prompt_Error Invalid specification.
# LogDisable command
CMD_LogDisable Disable Security Log or Packet Log
CMD_LogDisable_Help Use this to disable a security log or packet log of the Virtual Hub currently being managed. \nTo get the current setting, you can use the LogGet command.
CMD_LogDisable_Args LogDisable [security|packet]
CMD_LogDisable_[security|packet] Select the type of log to disable. Specify either "security" or "packet".
# LogSwitchSet command
CMD_LogSwitchSet Set Log File Switch Cycle
CMD_LogSwitchSet_Help Use this to set the log file switch cycle for the security log or packet log that the currently managed Virtual Hub saves. The log file switch cycle can be changed to switch in every second, every minute, every hour, every day, every month ,or not switch. \nTo get the current setting, you can use the LogGet command.
CMD_LogSwitchSet_Args LogSwitchSet [security|packet] [/SWITCH:sec|min|hour|day|month|none]
CMD_LogSwitchSet_[security|packet] Select the type of log to change setting. Specify either "security" or "packet".
CMD_LogSwitchSet_SWITCH Select the switch cycle to set. Specify sec, min, hour, day, month or none.
CMD_LogSwitchSet_Prompt Specify sec, min, hour, day, month or none:
# LogPacketSaveType command
CMD_LogPacketSaveType Set Save Contents and Type of Packet to Save to Packet Log
CMD_LogPacketSaveType_Help Use this to set the save contents of the packet log for each type of packet to be saved by the currently managed Virtual Hub. There are the following packet types: TCP Connection Log, TCP Packet Log, DHCP Packet Log, UDP Packet Log, ICMP Packet Log, IP Packet Log, ARP Packet Log, and Ethernet Packet Log.\nTo get the current setting, you can use the LogGet command.
CMD_LogPacketSaveType_Args LogPacketSaveType [/TYPE:tcpconn|tcpdata|dhcp|udp|icmp|ip|arp|ether] [/SAVE:none|header|full]
CMD_LogPacketSaveType_TYPE Specify tcpconn, tcpdata, dhcp, udp, icmp, ip, arp, or ether to specify the type of packet whose save contents are going to be changed.
CMD_LogPacketSaveType_SAVE Specify the save contents of the packet log. \nSpecify either none: save nothing\nheader: header information only\nfull: all packet contents
CMD_LogPacketSaveType_Prompt_TYPE Specify tcpconn, tcpdata, dhcp, udp, icmp, ip, arp, or ether:
CMD_LogPacketSaveType_Prompt_SAVE Specify none, header, or full:
# CAList command
CMD_CAList Get List of Trusted CA Certificates
CMD_CAList_Help Here you can manage the certificate authority certificates that are trusted by this currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_CAList_Args CAList
CMD_CAList_COLUMN_ID ID
# CAAdd command
CMD_CAAdd Add Trusted CA Certificate
CMD_CAAdd_Help Use this to add a new certificate to a list of CA certificates trusted by the currently managed Virtual Hub. The list of certificate authority certificates that are registered is used to verify certificates when a VPN Client is connected in signed certificate authentication mode. \nTo get a list of the current certificates you can use the CAList command. \nThe certificate you add must be saved in the X.509 file format. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_CAAdd_Args CAAdd [path]
CMD_CAAdd_[path] Specify the file name of the X.509 certificate to register.
CMD_CAAdd_PROMPT_PATH Name of X.509 Certificate File to Register:
# CADelete command
CMD_CADelete Delete Trusted CA Certificate
CMD_CADelete_Help Use this to delete an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub. \nTo get a list of the current certificates you can use the CAList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_CADelete_Args CADelete [id]
CMD_CADelete_[id] Specify the ID of the certificate to delete.
CMD_CADelete_PROMPT_ID ID of Certificate to Delete:
# CAGet command
CMD_CAGet Get Trusted CA Certificate
CMD_CAGet_Help Use this to get an existing certificate from the list of CA certificates trusted by the currently managed Virtual Hub and save it as a file in X.509 format. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_CAGet_Args CAGet [id] [/SAVECERT:path]
CMD_CAGet_[id] Specify the ID of the certificate to get.
CMD_CAGet_SAVECERT Specify the file name to save the certificate you obtained.
CMD_CAGet_PROMPT_ID ID of Certificate to Get:
CMD_CAGet_PROMPT_SAVECERT Name of File to Save:
# CascadeList command
CMD_CascadeList Get List of Cascade Connections
CMD_CascadeList_Help Use this to get a list of Cascade Connections that are registered on the currently managed Virtual Hub. \nBy using a Cascade Connection, you can connect this Virtual Hub by Layer 2 Cascade Connection to another Virtual Hub that is operating on the same or a different computer. \n\n[Warning About Cascade Connections]\nBy connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeList_Args CascadeList
# CascadeCreate command
CMD_CascadeCreate Create New Cascade Connection
CMD_CascadeCreate_Help Use this to create a new Cascade Connection on the currently managed Virtual Hub. \nBy using a Cascade Connection, you can connect this Virtual Hub by Cascade Connection to another Virtual Hub that is operating on the same or a different computer. \nTo create a Cascade Connection, you must specify the name of the Cascade Connection, destination server and destination Virtual Hub and user name. When a new Cascade Connection is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after a Cascade Connection has been created, use the other commands that begin with the name "Cascade". \n\n[Warning About Cascade Connections]\nBy connecting using a Cascade Connection you can create a Layer 2 bridge between multiple Virtual Hubs but if the connection is incorrectly configured, a loopback Cascade Connection could inadvertently be created. When using a Cascade Connection function please design the network topology with care. \n\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeCreate_Args CascadeCreate [name] [/SERVER:hostname:port] [/HUB:hubname] [/USERNAME:username]
CMD_CascadeCreate_[name] Specify the name of the Cascade Connection to create.
CMD_CascadeCreate_SERVER Specify the host name and port number of the destination VPN Server using the format [host name:port number]. You can also specify by IP address.
CMD_CascadeCreate_HUB Specify the Virtual Hub on the destination VPN Server.
CMD_CascadeCreate_USERNAME Specify the user name to use for user authentication when connecting to the destination VPN Server.
CMD_CascadeCreate_Prompt_Name Cascade Connection Name:
CMD_CascadeCreate_Prompt_Server Destination VPN Server Host Name and Port Number:
CMD_CascadeCreate_Prompt_Hub Destination Virtual Hub Name:
CMD_CascadeCreate_Prompt_Username Connecting User Name:
# CascadeSet command
CMD_CascadeSet Set the Destination for Cascade Connection
CMD_CascadeSet_Help Use this to set the destination VPN Server host name and port number, Virtual Hub name and the user name that will use the connection for the Cascade Connection registered on the currently managed virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeSet_Args CascadeSet [name] [/SERVER:hostname:port] [/HUB:hubname]
CMD_CascadeSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeSet_SERVER Specify the host name and port number of the destination VPN Server using the format [host name:port number]. You can also specify by IP address.
CMD_CascadeSet_HUB Specify the Virtual Hub on the destination VPN Server.
# CascadeGet command
CMD_CascadeGet Get the Cascade Connection Setting
CMD_CascadeGet_Help Use this to get the Connection Setting of a Cascade Connection that is registered on the currently managed Virtual Hub. \nTo change the Connection Setting contents of the Cascade Connection, use the other commands that begin with the name "Cascade" after creating the Cascade Connection. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeGet_Args CascadeGet [name]
CMD_CascadeGet_[name] Specify the name of the Cascade Connection whose setting you want to get.
CMD_CascadeGet_Policy [Cascade Session Security Policy Setting Value]
# CascadeDelete command
CMD_CascadeDelete Delete Cascade Connection Setting
CMD_CascadeDelete_Help Use this to delete a Cascade Connection that is registered on the currently managed Virtual Hub. If the specified Cascade Connection has a status of online, the connections will be automatically disconnected and then the Cascade Connection will be deleted. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeDelete_Args CascadeDelete [name]
CMD_CascadeDelete_[name] Specify the name of the Cascade Connection to delete.
# CascadeUsernameSet command
CMD_CascadeUsernameSet Set User Name to Use Connection of Cascade Connection
CMD_CascadeUsernameSet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to the VPN Server, use this to specify the user name required for user authentication. \nIn some cases it is necessary to specify the type of user authentication and specify the required parameters. To change this information you can use commands such as CascadeAnonymousSet, CascadePasswordSet, and CascadeCertSet. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeUsernameSet_Args CascadeUsernameSet [name] [/USERNAME:username]
CMD_CascadeUsernameSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeUsernameSet_USERNAME Specify the user name required for user authentication when the Cascade Connection connects to the VPN Server.
CMD_CascadeUsername_Notice The auth type for this Connection Setting is currently set as password authentication. After changing the user name, you must use the CascadePasswordSet command to reset the password.
# CascadeAnonymousSet command
CMD_CascadeAnonymousSet Set User Authentication Type of Cascade Connection to Anonymous Authentication
CMD_CascadeAnonymousSet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to the VPN Server, set the user authe type to [anonymous authentication]. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeAnonymousSet_Args CascadeAnonymousSet [name]
CMD_CascadeAnonymousSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadePasswordSet command
CMD_CascadePasswordSet Set User Authentication Type of Cascade Connection to Password Authentication
CMD_CascadePasswordSet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to the VPN Server, use this to set the user auth type to Password Authentication. Specify Standard Password Authentication and RADIUS or NT Domain Authentication as the password authentication type. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadePasswordSet_Args CascadePasswordSet [name] [/PASSWORD:password] [/TYPE:standard|radius]
CMD_CascadePasswordSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadePasswordSet_PASSWORD Specify the password to use for password authentication. If this is not specified, a prompt will appear to input the password.
CMD_CascadePasswordSet_TYPE Specify either "standard" (Standard Password Authentication) or "radius" (RADIUS or NT Domain Authentication) as the password authentication type.
CMD_CascadePasswordSet_Prompt_Type Specify standard or radius:
CMD_CascadePasswordSet_Type_Invalid The standard or radius specification is invalid.
# CascadeCertSet command
CMD_CascadeCertSet Set User Authentication Type of Cascade Connection to Client Certificate Authentication
CMD_CascadeCertSet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to the VPN Server, use this to set the user auth type to Client Certificate Authentication. For this certificate, you must specify a certificate file in the X.509 format and a private key file that is Base 64 encoded. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeCertSet_Args CascadeCertSet [name] [/LOADCERT:cert] [/LOADKEY:key]
CMD_CascadeCertSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeCertSet_LOADCERT Specify the X.509 format certificate file to provide for certificate authentication.
CMD_CascadeCertSet_LOADKEY Specify the Base-64-encoded private key file name for the certificate.
# CascadeCertGet command
CMD_CascadeCertGet Get Client Certificate to Use for Cascade Connection
CMD_CascadeCertGet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection uses client certificate authentication, use this to get the certificate that is provided as the client certificate and save the certificate file in X.509 format. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeCertGet_Args CascadeCertGet [name] [/SAVECERT:cert]
CMD_CascadeCertGet_[name] Specify the name of the Cascade Connection whose setting you want to get.
CMD_CascadeCertGet_SAVECERT Specify the file name to save the certificate you obtained in X.509 format.
CMD_CascadeCertSet_Not_Auth_Cert The specified Cascade Connection is not in client certificate authentication mode.
CMD_CascadeCertSet_Cert_Not_Exists The certificate is not stored in the Connection Setting of the specified Cascade Connection.
# CascadeEncryptEnable command
CMD_CascadeEncryptEnable Enable Encryption when Communicating by Cascade Connection
CMD_CascadeEncryptEnable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers to be encrypted by SSL. \nNormally communication between VPN Servers is encrypted by SSL to prevent eavesdropping of information and fraud. You can also disable encryption. When encryption is disabled, the communication throughput improves but the communication data flows over the network in plain text. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeEncryptEnable_Args CascadeEncryptEnable [name]
CMD_CascadeEncryptEnable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeEncryptDisable command
CMD_CascadeEncryptDisable Disable Encryption when Communicating by Cascade Connection
CMD_CascadeEncryptDisable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers not to be encrypted. \nNormally communication between VPN Servers is encrypted by SSL to prevent eavesdropping of information and fraud. You can also disable encryption. When encryption is disabled, the communication throughput improves but the communication data flows over the network in plain text. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeEncryptDisable_Args CascadeEncryptDisable [name]
CMD_CascadeEncryptDisable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeCompressEnable command
CMD_CascadeCompressEnable Enable Data Compression when Communicating by Cascade Connection
CMD_CascadeCompressEnable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers to be compressed. \nIt is possible to achieve a maximum of 80% compression. Compression however places higher loads on the CPU of both the client and server machines. When the line speed is about 10 Mbps or greater, compression can lower throughput, but sometimes it can have the opposite effect. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeCompressEnable_Args CascadeCompressEnable [name]
CMD_CascadeCompressEnable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeCompressDisable command
CMD_CascadeCompressDisable Disable Data Compression when Communicating by Cascade Connection
CMD_CascadeCompressDisable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers to be not compressed. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeCompressDisable_Args CascadeCompressDisable [name]
CMD_CascadeCompressDisable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeProxyNone command
CMD_CascadeProxyNone Specify Direct TCP/IP Connection as the Connection Method of Cascade Connection
CMD_CascadeProxyNone_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to set Direct TCP/IP Connection as the connection method to use, in which case the connection route will not be via a proxy server. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeProxyNone_Args CascadeProxyNone [name]
CMD_CascadeProxyNone_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeProxyHttp command
CMD_CascadeProxyHttp Set Connection Method of Cascade Connection to be via an HTTP Proxy Server
CMD_CascadeProxyHttp_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to set Connect via HTTP Proxy Server as the method of connection to use, which requires the specification of the host name and port number of the HTTP Proxy server to communicate via as well as a user name and password (when required). \nThe HTTP server that communication will travel via must be compatible with the CONNECT method to use HTTPS communication. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeProxyHttp_Args CascadeProxyHttp [name] [/SERVER:hostname:port] [/USERNAME:username] [/PASSWORD:password]
CMD_CascadeProxyHttp_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeProxyHttp_SERVER Specify the host name or IP address, and port number of the on-route HTTP proxy server using the format [host name:port number].
CMD_CascadeProxyHttp_USERNAME When user authentication is required to connect to the on-route HTTP proxy server, specify the user name. Also, specify the /PASSWORD parameter at the same time. If the parameters /USERNAME and /PASSWORD are not specified, the user authentication data will not be set.
CMD_CascadeProxyHttp_PASSWORD When user authentication is required to connect to the on-route HTTP proxy server, specify the password. Specify this together with the /USERNAME parameter.
CMD_CascadeProxyHttp_Prompt_Server Proxy Server Host Name and Port Number:
# CascadeProxySocks command
CMD_CascadeProxySocks Set Connection Method of Cascade Connection to be via an SOCKS Proxy Server
CMD_CascadeProxySocks_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to set Connect via SOCKS Proxy Server as the method of connection to use, which requires the specification of the host name and port number of the SOCKS Proxy server to communicate via as well as a user name and password (when required). \nThe on-route SOCKS server must be compatible with SOCKS Version 4. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeProxySocks_Args CascadeProxySocks [name] [/SERVER:hostname:port] [/USERNAME:username] [/PASSWORD:password]
CMD_CascadeProxySocks_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeProxySocks_SERVER Specify the host name or IP address, and port number of the on-route SOCKS proxy server using the format "host name:port number".
CMD_CascadeProxySocks_USERNAME When user authentication is required to connect to the on-route SOCKS proxy server, specify the user name. Also, specify the /PASSWORD parameter at the same time. If the parameters /USERNAME and /PASSWORD are not specified, the user authentication data will not be set.
CMD_CascadeProxySocks_PASSWORD When user authentication is required to connect to the on-route SOCKS proxy server, specify the password. Specify this together with the /USERNAME parameter.
# CascadeServerCertEnable command
CMD_CascadeServerCertEnable Enable Cascade Connection Server Certificate Verification Option
CMD_CascadeServerCertEnable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to enable the option to check whether the SSL certificate provided by the destination VPN Server can be trusted. \nIf this option is enabled you must either use the CascadeServerCertSet command to save the connection destination server SSL certificate beforehand in the Cascade Connection Settings beforehand, or use the CAAdd command etc. to register a root certificate containing the signed server SSL certificate in the list of Virtual Hub trusted CA certificates. \nIf the certificate of the connected VPN Server cannot be trusted under the condition where the option to verify server certificates was enabled for the Cascade Connection, the connection will be promptly cancelled and continual reattempts at connection will be made. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeServerCertEnable_Args CascadeServerCertEnable [name]
CMD_CascadeServerCertEnable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeServerCertDisable command
CMD_CascadeServerCertDisable Disable Cascade Connection Server Certificate Verification Option
CMD_CascadeServerCertDisable_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to disable the option to check whether the SSL certificate provided by the destination VPN Server can be trusted. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeServerCertDisable_Args CascadeServerCertDisable [name]
CMD_CascadeServerCertDisable_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeServerCertSet command
CMD_CascadeServerCertSet Set the Server Individual Certificate for Cascade Connection
CMD_CascadeServerCertSet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to a VPN Server, use this to register beforehand the same certificate as the SSL certificate provided by the destination VPN Server. \nIf the option to verify server certificates for Cascade Connections is enabled, you must either use this command to save the connection destination server SSL certificate beforehand in the Cascade Connection Settings beforehand, or use the CAAdd command etc. to register a root certificate containing the signed server SSL certificate in the list of Virtual Hub trusted CA certificates. \nIf the certificate of the connected VPN Server cannot be trusted under the condition where the option to verify server certificates was enabled for the Cascade Connection, the connection will be promptly cancelled and continual reattempts at connection will be made. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeServerCertSet_Args CascadeServerCertSet [name] [/LOADCERT:cert]
CMD_CascadeServerCertSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeServerCertSet_LOADCERT Specify X.509 format certificate file name that the server individual certificate you wish to set is saved under.
# CascadeServerCertDelete command
CMD_CascadeServerCertDelete Delete the Server Individual Certificate for Cascade Connection
CMD_CascadeServerCertDelete_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and a server individual certificate is registered for that Cascade Connection, use this to delete that server individual certificate. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeServerCertDelete_Args CascadeServerCertDelete [name]
CMD_CascadeServerCertDelete_[name] Specify the name of the Cascade Connection whose setting you want to change.
# CascadeServerCertGet command
CMD_CascadeServerCertGet Get the Server Individual Certificate for Cascade Connection
CMD_CascadeServerCertGet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and a server individual certificate is registered for that Cascade Connection, use this to get that certificate and save it as an X.509 format certificate file. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeServerCertGet_Args CascadeServerCertGet [name] [/SAVECERT:path]
CMD_CascadeServerCertGet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeServerCertGet_SAVECERT Specify the certificate file name to save the server individual certificate in X.509 format.
# CascadeDetailSet command
CMD_CascadeDetailSet Set Advanced Settings for Cascade Connection
CMD_CascadeDetailSet_Help Use this to customize the VPN protocol communication settings used when a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection connects to the VPN Server. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeDetailSet_Args CascadeDetailSet [name] [/MAXTCP:max_connection] [/INTERVAL:interval] [/TTL:disconnect_span] [/HALF:yes|no] [/NOQOS:yes|no]
CMD_CascadeDetailSet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadeDetailSet_MAXTCP Specify, using an integer in the range 1 to 32, the number of TCP connections to be used for VPN communication. By using data transmission by multiple TCP connections for VPN communication sessions with VPN Servers it is sometimes possible to increase communication speed. \nNote: We recommend about 8 lines when the connection lines to the server are fast, and 1 line when using a slow connection such as dialup.
CMD_CascadeDetailSet_INTERVAL When communicating by VPN by establishing multiple TCP connections, specify in seconds, the establishing interval for each TCP connection. The standard value is 1 second.
CMD_CascadeDetailSet_TTL When specifying connection life of each TCP connection specify in seconds the keep-alive time from establishing a TCP connection until disconnection. If 0 is specified, keep-alive will not be set.
CMD_CascadeDetailSet_HALF Specify "yes" when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction.
CMD_CascadeDetailSet_NOQOS Specify "yes" when disabling VoIP / QoS functions. Normally "no" is specified.
CMD_CascadeDetailSet_Eval_MaxTcp Specify an integer in the range 1 to 32 for the number of TCP connections.
CMD_CascadeDetailSet_Eval_Interval Set at least 1 second for the interval to establish a TCP connection.
CMD_CascadeDetailSet_Prompt_MaxTcp Number of TCP Connections to Use in VPN Communication:
CMD_CascadeDetailSet_Prompt_Interval Interval between Establishing Each TCP Connection:
CMD_CascadeDetailSet_Prompt_TTL Connection Life of Each TCP Connection (0 for no keep-alive):
CMD_CascadeDetailSet_Prompt_HALF Enable half-duplex mode (yes/no):
# CascadePolicySet command
CMD_CascadePolicySet Set Cascade Connection Session Security Policy
CMD_CascadePolicySet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is established, use this to change the security policy contents that are applied to the session generated by the Virtual Hub. \nWhen a Virtual Hub makes a Cascade Connection to another VPN Server, a Cascade Session will be newly generated on the Virtual Hub that is the Cascade Connection source. You can use this command to set the security policy contents that will set this Cascade session. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadePolicySet_Args [name] [/NAME:policy_name] [/VALUE:num|yes|no]
CMD_CascadePolicySet_[name] Specify the name of the Cascade Connection whose setting you want to change.
CMD_CascadePolicySet_NAME Specify the name of policy whose values you want to change. You can use the PolicyList command to display a list of policy names and values that can be set.
CMD_CascadePolicySet_VALUE Specify a new policy value. If the policy is an integer value, specify an integer. Specify yes or no for Boolean types. You can view the type and value that can be set by using the PolicyList command.
CMD_CascadePolicySet_PROMPT_POLNAME Name of Policy Whose Value you want to Change:
CMD_CascadePolicySet_PROMPT_POLVALUE Value to newly set:
CMD_CascadePolicySet_Invalid_Name The specified policy name "%S" is invalid. \nCheck the list of policy names that can be set using the PolicyList command.
CMD_CascadePolicySet_Invalid_Name_For_Cadcade The specified policy name "%S" cannot be used for a Cascade Connection security policy setting.
CMD_CascadePolicySet_Invalid_Range Specify policy "%S" within the range of %s.
# PolicyList command
CMD_PolicyList Display List of Security Policy Types and Settable Values
CMD_PolicyList_Help Use this to display a list of item names, descriptions, and settable values in the security policies that can be set for VPN Server users and groups and Cascade Connections. \nBy running the PolicyList command without specifying any parameters, a list of all supported security policy names and descriptions will be displayed. \nBy specifying the name using the PolicyList command parameter, a detailed description related to this value and the type and range of the settable value will be displayed.
CMD_PolicyList_Args PolicyList [name]
CMD_PolicyList_[name] This allows you to specify the policy name whose description you want to display. If you don't specify a name, a list of all supported security names and descriptions will be displayed.
CMD_PolicyList_Invalid_Name The specified policy name is invalid.
CMD_PolicyList_Column_1 Policy name
CMD_PolicyList_Column_2 Simple description of policy
CMD_PolicyList_Column_3 Setting value
CMD_PolicyList_Help_1 [Policy Name]
CMD_PolicyList_Help_2 [Simple Description of Policy]
CMD_PolicyList_Help_3 [Range of Settable Values]
CMD_PolicyList_Help_4 [Default Value]
CMD_PolicyList_Help_5 [Detailed Description of Policy]
CMD_PolicyList_Range_Bool yes or no
CMD_PolicyList_Range_Int_1 Range from %s to %s (0 cannot be specified)
CMD_PolicyList_Range_Int_2 Range from %s to %s (if 0 is specified, nothing is set)
# CascadeStatusGet command
CMD_CascadeStatusGet Get Current Cascade Connection Status
CMD_CascadeStatusGet_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified and that Cascade Connection is currently online, use this to get its connection status and other information. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeStatusGet_Args CascadeStatusGet [name]
CMD_CascadeStatusGet_[name] Specify the name of the Cascade Connection whose information you want to get.
# CascadeRename command
CMD_CascadeRename Change Name of Cascade Connection
CMD_CascadeRename_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to change the name of that Cascade Connection. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeRename_Args CascadeRename [name] [/NEW:new_name]
CMD_CascadeRename_[name] Specify the current name of the Cascade Connection whose name you want to change.
CMD_CascadeRename_NEW Specify the new name after the change.
CMD_CascadeRename_PROMPT_OLD Current Name:
CMD_CascadeRename_PROMPT_NEW New Name:
# CascadeOnline command
CMD_CascadeOnline Switch Cascade Connection to Online Status
CMD_CascadeOnline_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to online status. The Cascade Connection that is switched to online status begins the process of connecting to the destination VPN Server in accordance with the Connection Setting. The Cascade Connection that is switched to online status will establish normal connection to the VPN Server or continue to attempt connection until it is switched to offline status. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeOnline_Args CascadeOnline [name]
CMD_CascadeOnline_[name] Specify the name of the Cascade Connection to switch to online status.
# CascadeOffline command
CMD_CascadeOffline Switch Cascade Connection to Offline Status
CMD_CascadeOffline_Help When a Cascade Connection registered on the currently managed Virtual Hub is specified, use this to switch that Cascade Connection to offline status. The Cascade Connection that is switched to offline will not connect to the VPN Server until next time it is switched to the online status using the CascadeOnline command \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CascadeOffline_Args CascadeOffline [name]
CMD_CascadeOffline_[name] Specify the name of the Cascade Connection to switch to offline status.
# AccessAdd command
CMD_AccessAdd Add Access List Rules (IPv4)
CMD_AccessAdd_Help Use this to add a new rule to the access list of the currently managed Virtual Hub. \nThe access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the AccessAddEx command to generate delays, jitters and packet losses. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessAdd_Args AccessAdd [pass|discard] [/MEMO:memo] [/PRIORITY:priority] [/SRCUSERNAME:username] [/DESTUSERNAME:username] [/SRCMAC:mac/mask] [/DESTMAC:mac/mask] [/SRCIP:ip/mask] [/DESTIP:ip/mask] [/PROTOCOL:tcp|udp|icmpv4|icmpv6|ip|num] [/SRCPORT:start-end] [/DESTPORT:start-end] [/TCPSTATE: established|unestablished]
CMD_AccessAdd_[pass|discard] When a packet matches this rule condition, this operation is decided. When pass is specified, the packet is allowed to pass, and when discard is specified, the packet is discarded.
CMD_AccessAdd_MEMO Specify a description (memo) for this rule.
CMD_AccessAdd_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values.
CMD_AccessAdd_SRCIP Specify a source IPv4 address as a rule condition. Specify the IPv4 address in the format of "IP Address/Mask" by separating the decimal values using dots such as "192.168.0.1". For the mask, either specify decimal values separated by dots such as "255.255.255.0", or you can specify the bit length from the header using a decimal value such as "24". If you specify "0.0.0.0/0.0.0.0", this means all hosts.
CMD_AccessAdd_DESTIP Specify a destination IPv4 address as a rule condition in the format of "IP Address/Mask". Use the same method of specification as for the /SRCIP parameter.
CMD_AccessAdd_PROTOCOL Specify a protocol type as a rule condition. Input the IP protocol number using decimal values or specify one of the keywords "tcp" (TCP/IP protocol, no.6), "udp" (UDP/IP protocol, no.17), "icmpv4" (ICMPv4 protocol, no.1), "icmpv6" (ICMPv6 protocol, no.58) or "ip" (all protocols, no.0). Specify 0 to make the rule apply to all IP protocols.
CMD_AccessAdd_SRCPORT If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. When specifying, do so using the following method "1-1024" (1 to 1024), "23" (only 23).
CMD_AccessAdd_DESTPORT If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. Use the same method of specification as for the /SRCPORT parameter.
CMD_AccessAdd_SRCUSERNAME You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAdd_DESTUSERNAME You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAdd_SRCMAC Specify destination MAC address as a rule. Specify MAC address with "-" or ":" separators and hexadecimal number like "00-AC-84-EA-33-BC/FF-FF-FF-FF-FF-00". The separators are skippable.
CMD_AccessAdd_DESTMAC Specify destination MAC address as a rule. Use the same method of specification as for the /SRCMAC parameter.
CMD_AccessAdd_TCPSTATE Specify TCP connection state as a rule. Use Established or Unestablished.
CMD_AccessAdd_Prompt_TYPE Pass or Discard:
CMD_AccessAdd_Prompt_MEMO Rule Description (Memo):
CMD_AccessAdd_Prompt_PRIORITY Rule Priority:
CMD_AccessAdd_Eval_PRIORITY Specify an integer of 1 or higher for the priority.
CMD_AccessAdd_Prompt_SRCIP Source IP Address ("0.0.0.0/0" specifies all):
CMD_AccessAdd_Prompt_DESTIP Destination IP Address ("0.0.0.0/0" specifies all):
CMD_AccessAdd_Prompt_PROTOCOL Protocol No. or Protocol Name (tcp/udp/icmpv4/icmpv6/ip):
CMD_AccessAdd_Prompt_SRCPORT Source Port Number Range (tcp/udp only):
CMD_AccessAdd_Prompt_DESTPORT Destination Port Number Range (tcp/udp only):
CMD_AccessAdd_Prompt_SRCUSERNAME Source User Name (all when unspecified):
CMD_AccessAdd_Prompt_DESTUSERNAME Destination User Name (all when unspecified):
CMD_AccessAdd_Prompt_SRCMAC Source MAC Address and Mask (all when unspecified):
CMD_AccessAdd_Prompt_DESTMAC Destination MAC Address and Mask (all when unspecified):
CMD_AccessAdd_Prompt_TCPSTATE TCP Connection State (Established/Unestablished):
# AccessAddEx command
CMD_AccessAddEx Add Extended Access List Rules (IPv4: Delay, Jitter and Packet Loss Generating)
CMD_AccessAddEx_Help Use this to add a new rule to the access list of the currently managed Virtual Hub. You can set to generate delays, jitters and packet losses when a packet is passing via the Virtual Hub. \nThe access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the AccessAddEx command to generate delays, jitters and packet losses. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessAddEx_Args AccessAddEx [pass|discard] [/MEMO:memo] [/PRIORITY:priority] [/SRCUSERNAME:username] [/DESTUSERNAME:username] [/SRCMAC:mac/mask] [/DESTMAC:mac/mask] [/SRCIP:ip/mask] [/DESTIP:ip/mask] [/PROTOCOL:tcp|udp|icmpv4|icmpv6|ip|num] [/SRCPORT:start-end] [/DESTPORT:start-end] [/TCPSTATE: established|unestablished] [/DELAY:delay_millisec] [/JITTER:jitter_percent] [/LOSS:loss_percent] [/REDIRECTURL:url]
CMD_AccessAddEx_[pass|discard] When a packet matches this rule condition, this operation is decided. When pass is specified, the packet is allowed to pass, and when discard is specified, the packet is discarded. The setting of delays, jitters and packet losses is applied if the action is pass.
CMD_AccessAddEx_MEMO Specify a description (memo) for this rule.
CMD_AccessAddEx_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values.
CMD_AccessAddEx_SRCIP Specify a source IPv4 address as a rule condition. Specify the IPv4 address in the format of "IP Address/Mask" by separating the decimal values using dots such as "192.168.0.1". For the mask, either specify decimal values separated by dots such as "255.255.255.0", or you can specify the bit length from the header using a decimal value such as "24". If you specify "0.0.0.0/0.0.0.0", this means all hosts.
CMD_AccessAddEx_DESTIP Specify a destination IPv4 address as a rule condition in the format of "IP Address/Mask". Use the same method of specification as for the /SRCIP parameter.
CMD_AccessAddEx_PROTOCOL Specify a protocol type as a rule condition. Input the IP protocol number using decimal values or specify one of the keywords "tcp" (TCP/IP protocol, no.6), "udp" (UDP/IP protocol, no.17), "icmpv4" (ICMPv4 protocol, no.1), "icmpv6" (ICMPv6 protocol, no.58) or "ip" (all protocols, no.0). Specify 0 to make the rule apply to all IP protocols.
CMD_AccessAddEx_SRCPORT If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. When specifying, do so using the following method "1-1024" (1 to 1024), "23" (only 23).
CMD_AccessAddEx_DESTPORT If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. Use the same method of specification as for the /SRCPORT parameter.
CMD_AccessAddEx_SRCUSERNAME You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAddEx_DESTUSERNAME You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAddEx_SRCMAC Specify destination MAC address as a rule. Specify MAC address with "-" or ":" separators and hexadecimal number like "00-AC-84-EA-33-BC/FF-FF-FF-FF-FF-00". The separators are skippable.
CMD_AccessAddEx_DESTMAC Specify destination MAC address as a rule. Use the same method of specification as for the /SRCMAC parameter.
CMD_AccessAddEx_TCPSTATE Specify TCP connection state as a rule. Use Established or Unestablished.
CMD_AccessAddEx_DELAY Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most.
CMD_AccessAddEx_JITTER Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate.
CMD_AccessAddEx_LOSS Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate.
CMD_AccessAddEx_REDIRECTURL The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address.
CMD_AccessAddEx_Prompt_DELAY Delays to Generate (in milliseconds: 0 - 10000):
CMD_AccessAddEx_Prompt_JITTER Fluctuation of Jitters to Generate (Percent: 0 - 100):
CMD_AccessAddEx_Prompt_LOSS Ratio of Packet Losses (Percent: 0 - 100):
CMD_AccessAddEx_Eval_DELAY Delays must be 10000 at maximum.
CMD_AccessAddEx_Eval_JITTER Fluctuation of Jitters must be 100 at maximum.
CMD_AccessAddEx_Eval_LOSS Ratio of Packet Losses must be 100 at maximum.
# AccessAdd6 command
CMD_AccessAdd6 Add Access List Rules (IPv6)
CMD_AccessAdd6_Help Use this to add a new rule to the access list of the currently managed Virtual Hub. \nThe access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define an priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the AccessAddEx6 command to generate delays, jitters and packet losses. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessAdd6_Args AccessAdd6 [pass|discard] [/MEMO:memo] [/PRIORITY:priority] [/SRCUSERNAME:username] [/DESTUSERNAME:username] [/SRCMAC:mac/mask] [/DESTMAC:mac/mask] [/SRCIP:ip/mask] [/DESTIP:ip/mask] [/PROTOCOL:tcp|udp|icmpv4|icmpv6|ip|num] [/SRCPORT:start-end] [/DESTPORT:start-end] [/TCPSTATE: established|unestablished]
CMD_AccessAdd6_[pass|discard] When a packet matches this rule condition, this operation is decided. When pass is specified, the packet is allowed to pass, and when discard is specified, the packet is discarded.
CMD_AccessAdd6_MEMO Specify a description (memo) for this rule.
CMD_AccessAdd6_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values.
CMD_AccessAdd6_SRCIP Specify a source IPv6 address as a rule condition. Specify the IPv6 address in the format of "IP Address/Mask" by separating the hexadecimal values using colons such as "2001:200:0:1::". For the mask, either specify hexadecimal values separated by colons such as ffff:ffff:ffff:ffff::, or you can specify the bit length from the header using a decimal value such as "64". If you specify "::/0", this means all hosts.
CMD_AccessAdd6_DESTIP Specify a destination IPv6 address as a rule condition in the format of "IP Address/Mask". Use the same method of specification as for the /SRCIP parameter.
CMD_AccessAdd6_PROTOCOL Specify a protocol type as a rule condition. Input the IP protocol number using decimal values or specify one of the keywords "tcp" (TCP/IP protocol, no.6), "udp" (UDP/IP protocol, no.17), "icmpv4" (ICMPv4 protocol, no.1), "icmpv6" (ICMPv6 protocol, no.58) or "ip" (all protocols, no.0). Specify 0 to make the rule apply to all IP protocols.
CMD_AccessAdd6_SRCPORT If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. When specifying, do so using the following method "1-1024" (1 to 1024), "23" (only 23).
CMD_AccessAdd6_DESTPORT If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. Use the same method of specification as for the /SRCPORT parameter.
CMD_AccessAdd6_SRCUSERNAME You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAdd6_DESTUSERNAME You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAdd6_SRCMAC Specify destination MAC address as a rule. Specify MAC address with "-" or ":" separators and hexadecimal number like "00-AC-84-EA-33-BC/FF-FF-FF-FF-FF-00". The separators can be skipped.
CMD_AccessAdd6_DESTMAC Specify destination MAC address as a rule. Use the same method of specification as for the /SRCMAC parameter.
CMD_AccessAdd6_TCPSTATE Specify TCP connection state as a rule. Use Established or Unestablished.
CMD_AccessAdd6_Prompt_TYPE Pass or Discard:
CMD_AccessAdd6_Prompt_MEMO Rule Description (Memo):
CMD_AccessAdd6_Prompt_PRIORITY Rule Priority:
CMD_AccessAdd6_Eval_PRIORITY Specify an integer of 1 or higher for the priority.
CMD_AccessAdd6_Prompt_SRCIP Source IP Address ("::/0" specifies all):
CMD_AccessAdd6_Prompt_DESTIP Destination IP Address ("::/0" specifies all):
CMD_AccessAdd6_Prompt_PROTOCOL Protocol No. or Protocol Name (tcp/udp/icmpv4/icmpv6/ip):
CMD_AccessAdd6_Prompt_SRCPORT Source Port Number Range (tcp/udp only):
CMD_AccessAdd6_Prompt_DESTPORT Destination Port Number Range (tcp/udp only):
CMD_AccessAdd6_Prompt_SRCUSERNAME Source User Name (all when unspecified):
CMD_AccessAdd6_Prompt_DESTUSERNAME Destination User Name (all when unspecified):
CMD_AccessAdd6_Prompt_SRCMAC Source MAC Address and Mask (all when unspecified):
CMD_AccessAdd6_Prompt_DESTMAC Destination MAC Address and Mask (all when unspecified):
CMD_AccessAdd6_Prompt_TCPSTATE TCP Connection State (Established/Unestablished):
# AccessAddEx6 command
CMD_AccessAddEx6 Add Extended Access List Rules (IPv6: Delay, Jitter and Packet Loss Generating)
CMD_AccessAddEx6_Help Use this to add a new rule to the access list of the currently managed Virtual Hub. You can set to generate delays, jitters and packet losses when a packet is passing via the Virtual Hub. \nThe access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. You can also use the AccessAddEx6 command to generate delays, jitters and packet losses. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessAddEx6_Args AccessAddEx6 [pass|discard] [/MEMO:memo] [/PRIORITY:priority] [/SRCUSERNAME:username] [/DESTUSERNAME:username] [/SRCMAC:mac/mask] [/DESTMAC:mac/mask] [/SRCIP:ip/mask] [/DESTIP:ip/mask] [/PROTOCOL:tcp|udp|icmpv4|icmpv6|ip|num] [/SRCPORT:start-end] [/DESTPORT:start-end] [/TCPSTATE: established|unestablished] [/DELAY:delay_millisec] [/JITTER:jitter_percent] [/LOSS:loss_percent] [/REDIRECTURL:url]
CMD_AccessAddEx6_[pass|discard] When a packet matches this rule condition, this operation is decided. When pass is specified, the packet is allowed to pass, and when discard is specified, the packet is discarded. The setting of delays, jitters and packet losses is applied if the action is pass.
CMD_AccessAddEx6_MEMO Specify a description (memo) for this rule.
CMD_AccessAddEx6_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. Higher priority is given to rules with the lower priority values.
CMD_AccessAddEx6_SRCIP Specify a source IPv6 address as a rule condition. Specify the IPv6 address in the format of "IP Address/Mask" by separating the hexadecimal values using colons such as "2001:200:0:1::". For the mask, either specify hexadecimal values separated by colons such as "ffff:ffff:ffff:ffff::", or you can specify the bit length from the header using a decimal value such as 64. If you specify "::/0", this means all hosts.
CMD_AccessAddEx6_DESTIP Specify a destination IPv6 address as a rule condition in the format of "IP Address/Mask". Use the same method of specification as for the /SRCIP parameter.
CMD_AccessAddEx6_PROTOCOL Specify a protocol type as a rule condition. Input the IP protocol number using decimal values or specify one of the keywords "tcp" (TCP/IP protocol, no.6), "udp" (UDP/IP protocol, no.17), "icmpv4" (ICMPv4 protocol, no.1), "icmpv6" (ICMPv6 protocol, no.58) or "ip" (all protocols, no.0). Specify 0 to make the rule apply to all IP protocols.
CMD_AccessAddEx6_SRCPORT If the specified protocol is TCP/IP or UDP/IP, specify the source port number as the rule condition. Protocols other than this will be ignored. When this parameter is not specified, the rules will apply to all port numbers. When specifying, do so using the following method "1-1024" (1 to 1024), "23" (only 23).
CMD_AccessAddEx6_DESTPORT If the specified protocol is TCP/IP or UDP/IP, specify the destination port number as the rule condition. Protocols other than this will be ignored. Use the same method of specification as for the /SRCPORT parameter.
CMD_AccessAddEx6_SRCUSERNAME You can apply this rule to only the packets sent by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAddEx6_DESTUSERNAME You can apply this rule to only the packets received by a user session of a user name that has been specified as a rule condition. In this case, specify the user name.
CMD_AccessAddEx6_SRCMAC Specify destination MAC address as a rule. Specify MAC address with "-" or ":" separators and hexadecimal number like "00-AC-84-EA-33-BC/FF-FF-FF-FF-FF-00". The separators can be skipped.
CMD_AccessAddEx6_DESTMAC Specify destination MAC address as a rule. Use the same method of specification as for the /SRCMAC parameter.
CMD_AccessAddEx6_TCPSTATE Specify TCP connection state as a rule. Use Established or Unestablished.
CMD_AccessAddEx6_DELAY Set this value to generate delays when packets is passing. Specify the delay period in milliseconds. Specify 0 means no delays to generate. The delays must be 10000 milliseconds at most.
CMD_AccessAddEx6_JITTER Set this value to generate jitters when packets is passing. Specify the ratio of fluctuation of jitters within 0% to 100% range. Specify 0 means no jitters to generate.
CMD_AccessAddEx6_LOSS Set this value to generate packet losses when packets is passing. Specify the ratio of packet losses within 0% to 100% range. Specify 0 means no packet losses to generate.
CMD_AccessAddEx6_REDIRECTURL The specified URL will be mandatory replied to the client as a response for TCP connecting request packets which matches the conditions of this access list entry via this Virtual Hub. To use this setting, you can enforce the web browser of the VPN Client computer to show the specified web site when that web browser tries to access the specific IP address.
CMD_AccessAddEx6_Prompt_DELAY Delays to Generate (in milliseconds: 0 - 10000):
CMD_AccessAddEx6_Prompt_JITTER Fluctuation of Jitters to Generate (Percent: 0 - 100):
CMD_AccessAddEx6_Prompt_LOSS Ratio of Packet Losses (Percent: 0 - 100):
CMD_AccessAddEx6_Eval_DELAY Delays must be 10000 at maximum.
CMD_AccessAddEx6_Eval_JITTER Fluctuation of Jitters must be 100 at maximum.
CMD_AccessAddEx6_Eval_LOSS Ratio of Packet Losses must be 100 at maximum.
# AccessList command
CMD_AccessList Get Access List Rule List
CMD_AccessList_Help Use this to get a list of packet filter rules that are registered on access list of the currently managed Virtual Hub. \nThe access list is a set of packet file rules that are applied to packets that flow through the Virtual Hub. You can register multiple rules in an access list and you can also define a priority for each rule. All packets are checked for the conditions specified by the rules registered in the access list and based on the operation that is stipulated by the first matching rule, they either pass or are discarded. Packets that do not match any rule are implicitly allowed to pass. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessList_Args AccessList
# AccessDelete command
CMD_AccessDelete Delete Rule from Access List
CMD_AccessDelete_Help Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and delete it. \nTo delete a rule, you must specify that rule's ID. You can display the ID by using the AccessList command. \nIf you wish not to delete the rule but to only temporarily disable it, use the AccessDisable command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessDelete_Args AccessDelete [id]
CMD_AccessDelete_[id] Specify either the ID or the Unique ID of the rule to delete.
CMD_Access_Prompt_ID Access List Rule ID or Unique ID:
# AccessEnable command
CMD_AccessEnable Enable Access List Rule
CMD_AccessEnable_Help Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and enable it. The enabled rule will be used by packet filtering. \nTo enable a rule, you must specify that rule's ID. You can display the ID by using the AccessList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessEnable_Args AccessEnable [id]
CMD_AccessEnable_[id] Specify the ID of the rule to enable.
# AccessDisable command
CMD_AccessDisable Disable Access List Rule
CMD_AccessDisable_Help Use this to specify a packet filter rule registered on the access list of the currently managed Virtual Hub and disable it. The disabled rule will be used by packet filtering. \nTo disable a rule, you must specify that rule's ID. You can display the ID by using the AccessList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_AccessDisable_Args AccessDisable [id]
CMD_AccessDisable_[id] Specify the ID of the rule to disable.
# UserList command
CMD_UserList Get List of Users
CMD_UserList_Help Use this to get a list of users that are registered on the security account database of the currently managed Virtual Hub. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserList_Args UserList
# UserCreate command
CMD_UserCreate Create User
CMD_UserCreate_Help Use this to create a new user in the security account database of the currently managed Virtual Hub. \nBy creating a user, the VPN Client can connect to the Virtual Hub by using the authentication information of that user. \nWhen a user is created using the UserCreate command and the auth type of that user is registered as Password Authentication, a random string will be assigned as the password. Therefore, that user will not be able to connect to the Virtual Hub in that state. After creating the user, you must always use the UserPasswordSet command to specify the user password, or alternatively use the UserAnonymousSet command, UserCertSet command, UserSignedSet command, UserRadiusSet command or UserNTLMSet command to change the user's auth type. \nNote that a user whose user name has been created as "*" (a single asterisk character) will automatically be registered as a RADIUS authentication user. For cases where there are users with "*" as the name, when a user, whose user name that has been provided when a client connected to a VPN Server does not match existing user names, is able to be authenticated by a RADIUS server or NT domain controller by inputting a user name and password, the authentication settings and security policy settings will follow the setting for the user "*". \nTo change the user information of a user that has been created, use the UserSet command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserCreate_Args UserCreate [name] [/GROUP:group] [/REALNAME:realname] [/NOTE:note]
CMD_UserCreate_[name] Specify the user name of the user to be newly created.
CMD_UserCreate_GROUP When assigning a user in a group, specify the group name. When not assigning a user to any group, specify /GROUP:none.
CMD_UserCreate_REALNAME Specify the user's full name. If you are not specifying this, specify /REALNAME:none.
CMD_UserCreate_NOTE Specify a description of the user. If you are not specifying this, specify /NOTE:none
CMD_UserCreate_Prompt_NAME User Name:
CMD_UserCreate_Prompt_GROUP Assigned Group Name:
CMD_UserCreate_Prompt_REALNAME User Full Name:
CMD_UserCreate_Prompt_NOTE User Description:
# UserSet command
CMD_UserSet Change User Information
CMD_UserSet_Help Use this to change user information that is registered on the security account database of the currently managed Virtual Hub. \nThe user information that can be changed using this command are the three items that are specified when a new user is created using the UserCreate command: Group Name, Full Name, and Description. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserSet_Args UserSet [name] [/GROUP:group] [/REALNAME:realname] [/NOTE:note]
CMD_UserSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserSet_GROUP When assigning a user in a group, specify the group name. When not assigning a user to any group, specify /GROUP:none.
CMD_UserSet_REALNAME Specify the user's full name. If you are not specifying this, specify /REALNAME:none
CMD_UserSet_NOTE Specify a description of the user. If you are not specifying this, specify /NOTE:none.
# UserDelete command
CMD_UserDelete Delete User
CMD_UserDelete_Help Use this to delete a user that is registered on the security account database of the currently managed Virtual Hub. By deleting the user, that user will no long be able to connect to the Virtual Hub. \nYou can use the UserPolicySet command to instead of deleting a user, set the user to be temporarily denied from logging in. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserDelete_Args UserDelete [name]
CMD_UserDelete_[name] Specify the name of the user to delete.
# UserGet command
CMD_UserGet Get User Information
CMD_UserGet_Help Use this to get user registration information that is registered on the security account database of the currently managed Virtual Hub. \nThe information that you can get using this command are User Name, Full Name, Group Name, Expiration Date, Security Policy, and Auth Type, as well as parameters that are specified as auth type attributes and the statistical data of that user. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserGet_Args UserGet [name]
CMD_UserGet_[name] Specify the user name of the user whose information you want to get.
CMD_UserGet_Column_Name User Name
CMD_UserGet_Column_RealName Full Name
CMD_UserGet_Column_Note Description
CMD_UserGet_Column_Group Group Name
CMD_UserGet_Column_Expires Expiration Date
CMD_UserGet_Column_AuthType Auth Type
CMD_UserGet_Column_UserCert Registered User Individual Certificate
CMD_UserGet_Column_RadiusAlias External Authentication Server Authentication User Name
CMD_UserGet_Column_RootCert_CN Limit of Certificate CN Value
CMD_UserGet_Column_RootCert_SERIAL Limit of Certificate Serial Number
CMD_UserGet_Policy Security Policy Set for this User
# UserAnonymousSet command
CMD_UserAnonymousSet Set Anonymous Authentication for User Auth Type
CMD_UserAnonymousSet_Help Use this to set Anonymous Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. A VPN Client that has connected to a Virtual Hub using a user name of a user set to anonymous authentication can connect to a Virtual Hub without undergoing user authentication and without conditions. The anonymous authentication function is ideally suited to public VPN Servers that are setup to allow anyone to connect via the Internet etc. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserAnonymousSet_Args UserAnonymousSet [name]
CMD_UserAnonymousSet_[name] Specify the user name of the user whose setting you want to change.
# UserPasswordSet command
CMD_UserPasswordSet Set Password Authentication for User Auth Type and Set Password
CMD_UserPasswordSet_Help Use this to set Password Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. Password Authentication requires a user-defined password to be set for the user object in the security account database of the Virtual Hub and when a user attempts to connect to the Virtual Hub using this user name, they will be prompted to input a password and if it is the matching password, connection will be allowed. \nThe user password is actually saved in hash code which means even if the VPN Server setting file is analyzed, the original password cannot be deciphered. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserPasswordSet_Args UserPasswordSet [name] [/PASSWORD:password]
CMD_UserPasswordSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserPasswordSet_PASSWORD Specify the password to be set for the user. If this parameter is not specified a prompt will appear to input the password.
# UserCertSet command
CMD_UserCertSet Set Individual Certificate Authentication for User Auth Type and Set Certificate
CMD_UserCertSet_Help Use this to set Individual Certificate Authentication as the Auth Type for a user that is registered on the security account database of the currently managed Virtual Hub. Individual Certificate Authentication requires one X.509 format certificate to be set for the user object in the security account database of the Virtual Hub and when a user attempts to connect to the Virtual Hub using this user name, an RSA algorithm is used to verify if the provided certificate matches the registered certificate and whether the client holds a private key that corresponds to that certificate and if so, connection is allowed. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserCertSet_Args UserCertSet [name] [/LOADCERT:cert]
CMD_UserCertSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserCertSet_LOADCERT Specify the certificate to set for the user by specifying an X.509 format certificate file.
# UserCertGet command
CMD_UserCertGet Get Certificate Registered for Individual Certificate Authentication User
CMD_UserCertGet_Help Use this to get an X.509 format certificate registered for a user of Individual Certificate Authentication who is registered in the security account database of the currently managed Virtual Hub and save it to file. \nIf the specified user is not set as Individual Certificate Authentication an error will occur. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserCertGet_Args UserCertGet [name] [/SAVECERT:cert]
CMD_UserCertGet_[name] Specify the user name of the user whose information you want to get.
CMD_UserCertGet_SAVECERT Specify the file name to save, in X.509 format, the user certificate you obtained.
CMD_UserCertGet_Not_Cert Either the user is not set as individual certificate authentication or a unique certificate is not set.
# UserSignedSet command
CMD_UserSignedSet Set Signed Certificate Authentication for User Auth Type
CMD_UserSignedSet_Help Use this to set Signed Certificate Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. When a user connects to a Virtual Hub using a user name that is set for signed certificate authentication, an RSA algorithm is used to verify whether the certificate provided by the user is signed by any of the certificates in the list of trusted CA certificates of that Virtual Hub and whether the client holds a private key that corresponds with that certificate, and if so, connection is allowed. \nIt is also possible to set the connection to be allowed only when a certificate common name (CN) and serial number that is expected for each user is registered and the contents of the certificate after the abovementioned verification is passed matches the set value. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserSignedSet_Args UserSignedSet [name] [/CN:cn] [/SERIAL:serial]
CMD_UserSignedSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserSignedSet_CN When this parameter is set, after it has been verified that the certificate that the user provided has been signed by the trusted certificate authority, connection will only be allowed when the value of the common name (CN) of this certificate is compared with the value set by this parameter and the values match. When "none" is specified, this check is not made.
CMD_UserSignedSet_SERIAL When this parameter is set, after it has been verified that the certificate that the user provided has been signed by the trusted certificate authority, connection will only be allowed when the value of the serial number of this certificate is compared with the value set by this parameter and the values match. When "none" is specified, this check is not made.
CMD_UserSignedSet_Prompt_CN Limit of Common Name (CN) Value:
CMD_UserSignedSet_Prompt_SERIAL Limit of Serial Number Value:
# UserRadiusSet command
CMD_UserRadiusSet Set RADIUS Authentication for User Auth Type
CMD_UserRadiusSet_Help Use this to set RADIUS Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. When a user connects to a Virtual Hub using a user name that is set for RADIUS authentication, the user name and the user input password is sent to the RADIUS server where the RADIUS SERVER checks the user name and password, then if the verification is successful, that user is allowed VPN connection. \nIn order to user RADIUS authentication, the RADIUS server used for this verification must be set in the Virtual Hub beforehand by using the RadiusServerSet command. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserRadiusSet_Args UserRadiusSet [name] [/ALIAS:alias_name]
CMD_UserRadiusSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserRadiusSet_ALIAS When this parameter is set, it is possible to make the user name sent to the RADIUS server different to the user name on the Virtual Hub. When this is not set, please specify /ALIAS:none (the user name on the Virtual Hub will be used). If the user name is "*", the /ALIAS parameter will be ignored. To read an explanation of the "*" user, please input UserCreate/HELP to display this information.
CMD_UserRadiusSet_Prompt_ALIAS Alias Name for Authentication (Optional):
# UserNTLMSet コマンド
CMD_UserNTLMSet Set NT Domain Authentication for User Auth Type
CMD_UserNTLMSet_Help Use this to set NT Domain Authentication as the auth type for a user that is registered on the security account database of the currently managed Virtual Hub. When a user connects to a Virtual Hub using a user name that is set for NT Domain authentication, the user name and the user input password is sent to the Windows NT / 2000 / Server 2003 / Server 2008 / Server 2008 R2 / Server 2012 Domain Controller or Active Directory Server where the server checks the user name and password, then if the verification is successful, that user is allowed VPN connection. \nTo use NT Domain authentication, the VPN Server must be operating on a Windows NT 4.0, Windows 2000, Windows XP, Windows Vista, Windows Server 2008, Windows Server 2008 R2 or Windows Server 2012 operating system that is connected to that domain. For details please contact the VPN Server's administrator. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserNTLMSet_Args UserNTLMSet [name] [/ALIAS:alias_name]
CMD_UserNTLMSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserNTLMSet_ALIAS When this parameter is set, it is possible to make the user name sent to the NT Domain or Active Directory server different to the user name on the Virtual Hub. When this is not set, please specify /ALIAS:none (the user name on the Virtual Hub will be used). If the user name is "*", the /ALIAS parameter will be ignored. To read an explanation of the "*" user, please input UserCreate/HELP to display this information.
# UserPolicyRemove command
CMD_UserPolicyRemove Delete User Security Policy
CMD_UserPolicyRemove_Help Use this to delete the security policy setting that is set for a user that is registered on the security account database of the currently managed Virtual Hub. A user who has had their security policy setting deleted will be assigned the security policy setting of the group that user is assigned to. In the cases where the user is not assigned to a group or when a security policy setting has not been set for the group, the default values (Allow Access: Enabled, Maximum Number of TCP Connections: 32, Time-out Period: 20 seconds) will be applied. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserPolicyRemove_Args UserPolicyRemove [name]
CMD_UserPolicyRemove_[name] Specify the user name of the user whose setting you want to change.
# UserPolicySet command
CMD_UserPolicySet Set User Security Policy
CMD_UserPolicySet_Help Use this to set the security policy contents that are set for a user that is registered on the security account database of the currently managed Virtual Hub. \nWhen a user has not been set a security policy, use this to change the specified values after a new default security policy has been set. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserPolicySet_Args UserPolicySet [name] [/NAME:policy_name] [/VALUE:num|yes|no]
CMD_UserPolicySet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserPolicySet_NAME Specify the name of policy whose values you want to change. You can use the PolicyList command to display a list of policy names and values that can be set.
CMD_UserPolicySet_VALUE Specify a new policy value. If the policy is an integer value, specify an integer. Specify yes or no for Boolean types. You can view the type and value that can be set by using the PolicyList command.
# UserExpiresSet command
CMD_UserExpiresSet Set User's Expiration Date
CMD_UserExpiresSet_Help Use this to set the user's expiration date that is registered on the security account database of the currently managed Virtual Hub. A user whose expiration date has expired cannot connect to the Virtual Hub. \nTo get the list of currently registered users, use the UserList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_UserExpiresSet_Args UserExpiresSet [name] [/EXPIRES:expires]
CMD_UserExpiresSet_[name] Specify the user name of the user whose setting you want to change.
CMD_UserExpiresSet_EXPIRES Specify the user expiration date and time. The date and time must be in the same format as "2005/10/08 19:30:00" where 6 integers are specified, representing year/month/day hour:minute:second separated by forward slashes, a space and then colons. Specify 4 digits for the year. If you put a space in a value, the entire value must be enclosed by "". For this specification, local time (standard time for the computer on which the command line management utility is running) can be specified. By specifying /EXPIRES:none, you can remove the expiration date restriction.
CMD_UserExpiresSet_Prompt_EXPIRES User Expiration Date (no expiration if nothing specified):
# GroupList command
CMD_GroupList Get List of Groups
CMD_GroupList_Help Use this to get a list of groups that are registered on the security account database of the currently managed Virtual Hub. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupList_Args GroupList
# GroupCreate command
CMD_GroupCreate Create Group
CMD_GroupCreate_Help Use this to create a new group in the security account database of the currently managed Virtual Hub. \nYou can register multiple users in a group. To register users in a group use the GroupJoin command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupCreate_Args GroupCreate [name] [/REALNAME:realname] [/NOTE:note]
CMD_GroupCreate_[name] Specify the name of the group to create.
CMD_GroupCreate_REALNAME Specify the group's full name. For example, if the group corresponds to an actual section or department name, specify that name. If you are not specifying this, specify /REALNAME:none
CMD_GroupCreate_NOTE Specify a description of the group. If you are not specifying this, specify /NOTE:none
CMD_GroupCreate_Prompt_NAME Group Name:
CMD_GroupCreate_Prompt_REALNAME Group Full Name:
CMD_GroupCreate_Prompt_NOTE Group Description:
# GroupSet command
CMD_GroupSet Set Group Information
CMD_GroupSet_Help Use this to set group information that is registered on the security account database of the currently managed Virtual Hub. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupSet_Args GroupSet [name] [/REALNAME:realname] [/NOTE:note]
CMD_GroupSet_[name] Specify the group name of the group whose setting you want to change.
CMD_GroupSet_REALNAME Specify the group's Full name. For example, if the group corresponds to an actual section or department name, specify that name. If you are not specifying this, specify /REALNAME:none
CMD_GroupSet_NOTE Specify a description of the group. If you are not specifying this, specify /NOTE:none.
# GroupDelete command
CMD_GroupDelete Delete Group
CMD_GroupDelete_Help Use this to delete a group that is registered on the security account database of the currently managed Virtual Hub. \nWhen you delete a group all users assigned to that group will become unassigned. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupDelete_Args GroupDelete [name]
CMD_GroupDelete_[name] Specify the name of the group to delete.
# GroupGet command
CMD_GroupGet Get Group Information and List of Assigned Users
CMD_GroupGet_Help Use this to get the information of a group that is registered on the security account database of the currently managed Virtual Hub as well as a list of users assigned to that group. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupGet_Args GroupGet [name]
CMD_GroupGet_[name] Specify the group name of the group whose information you want to get.
CMD_GroupGet_Column_NAME Group Name
CMD_GroupGet_Column_REALNAME Full Name
CMD_GroupGet_Column_NOTE Description
CMD_GroupGet_Column_POLICY This is the security policy that is set for this group.
CMD_GroupGet_Column_MEMBERS This is a list of user names of users who are assigned to this group.
# GroupJoin command
CMD_GroupJoin Add User to Group
CMD_GroupJoin_Help Use this to add a user in the security account database of the currently managed Virtual Hub to a group that is registered on that security account database. \nTo get a list of users and groups that are currently registered, use the UserList command and the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupJoin_Args GroupJoin [name] [/USERNAME:username]
CMD_GroupJoin_[name] Specify the group name of the group to which you want to add a user.
CMD_GroupJoin_USERNAME Specify the user name of the user you want to add to the group specified by "name".
CMD_GroupJoin_Prompt_USERNAME Name of User to Join Group:
# GroupUnjoin command
CMD_GroupUnjoin Delete User from Group
CMD_GroupUnjoin_Help Use this to delete a specified user from the group that is registered on the security account database of the currently managed Virtual Hub. By deleting a user from the group, that user becomes unassigned. \nTo get a list of users that are currently assigned to a group, use the GroupGet command. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupUnjoin_Args GroupUnjoin [name]
CMD_GroupUnjoin_[name] Specify the name of the user to delete from the group.
CMD_GroupUnjoin_Prompt_name Name of User to Delete from Group:
# GroupPolicyRemove command
CMD_GroupPolicyRemove Delete Group Security Policy
CMD_GroupPolicyRemove_Help Use this to delete the security policy setting that is set for a group that is registered on the security account database of the currently managed Virtual Hub. Users who do not have a security policy set for the user themselves or for the group they are assigned to, will have the default values (Allow Access: Enabled, Maximum Number of TCP Connections: 32, Time-out Period: 20 seconds) applied to them. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupPolicyRemove_Args GroupPolicyRemove [name]
CMD_GroupPolicyRemove_[name] Specify the group name of the group whose setting you want to change.
# GroupPolicySet command
CMD_GroupPolicySet Set Group Security Policy
CMD_GroupPolicySet_Help Use this to set the security policy contents that are set for a group that is registered on the security account database of the currently managed Virtual Hub. \nWhen a group has not been set a security policy, use this to change the specified values after a new default security policy has been set. \nTo get the list of currently registered groups, use the GroupList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a member server on a cluster.
CMD_GroupPolicySet_Args GroupPolicySet [name] [/NAME:policy_name] [/VALUE:num|yes|no]
CMD_GroupPolicySet_[name] Specify the group name of the group whose setting you want to change.
CMD_GroupPolicySet_NAME Specify the name of policy whose values you want to change. You can use the PolicyList command to display a list of policy names and values that can be set.
CMD_GroupPolicySet_VALUE Specify a new policy value. If the policy is an integer value, specify an integer. Specify yes or no for Boolean types. You can view the type and value that can be set by using the PolicyList command.
# SessionList command
CMD_SessionList Get List of Connected Sessions
CMD_SessionList_Help Use this to get a list of the sessions connected to the Virtual Hub currently being managed. In the list of sessions, the following information will be displayed for each connection: Session Name, Session Site, User Name, Source Host Name, TCP Connection, Transfer Bytes and Transfer Packets. \nIf the currently connected VPN Server is a cluster controller and the currently managed Virtual Hub is a static Virtual Hub, you can get an all-linked-together list of all sessions connected to that Virtual Hub on all cluster members. \nIn all other cases, only the list of sessions that are actually connected to the currently managed VPN Server will be obtained.
CMD_SessionList_Args SessionList
# SessionGet command
CMD_SessionGet Get Session Information
CMD_SessionGet_Help Use this to specify a session currently connected to the currently managed Virtual Hub and get the session information. The session information includes the following: source host name and user name, version information, time information, number of TCP connections, communication parameters, session key, statistical information on data transferred, and other client and server information. \nTo get the list of currently connected sessions, use the SessionList command.
CMD_SessionGet_Args SessionGet [name]
CMD_SessionGet_[name] Specify the session name of the session whose information you want to get.
CMD_SessionGet_Prompt_NAME Session name:
# SessionDisconnect command
CMD_SessionDisconnect Disconnect Session
CMD_SessionDisconnect_Help Use this to specify a session currently connected to the currently managed Virtual Hub and forcefully disconnect that session using manager privileges. \nNote that when communication is disconnected by settings on the source client side and the automatically reconnect option is enabled, it is possible that the client will reconnect. \nTo get the list of currently connected sessions, use the SessionList command.
CMD_SessionDisconnect_Args SessionDisconnect [name]
CMD_SessionDisconnect_[name] Specify the session name of the session to disconnect.
# MacTable command
CMD_MacTable Get the MAC Address Table Database
CMD_MacTable_Help Use this to get the MAC address table database that is held by the currently managed Virtual Hub. \nThe MAC address table database is a table that the Virtual Hub requires to perform the action of switching Ethernet frames and the Virtual Hub decides the sorting destination session of each Ethernet frame based on the MAC address table database. The MAC address database is built by the Virtual Hub automatically analyzing the contents of the communication throughput. \nBy specifying the session name you can get the MAC address table entry that has been associated with that session.
CMD_MacTable_Args MacTable [session_name]
CMD_MacTable_[session_name] By specifying the session name as a parameter, you can display only the MAC address table entry that is associated with that session. When this is left unspecified, all the entries will be displayed.
# MacDelete command
CMD_MacDelete Delete MAC Address Table Entry
CMD_MacDelete_Help Use this command to operate the MAC address table database held by the currently managed Virtual Hub and delete a specified MAC address table entry from the database. \nTo get the contents of the current MAC address table database use the MacTable command.
CMD_MacDelete_Args MacDelete [id]
CMD_MacDelete_[id] Specify the ID of the MAC address table entry to delete.
CMD_MacDelete_Prompt ID to Delete:
# IpTable command
CMD_IpTable Get the IP Address Table Database
CMD_IpTable_Help Use this to get the IP address table database that is held by the currently managed Virtual Hub. \nThe IP address table database is a table that is automatically generated by analyzing the contents of communication so that the Virtual Hub can always know which session is using which IP address and it is frequently used by the engine that applies the Virtual Hub security policy. \nBy specifying the session name you can get the IP address table entry that has been associated with that session.
CMD_IpTable_Args IpTable [session_name]
CMD_IpTable_[session_name] By specifying the session name as a parameter, you can display only the IP address table entry that is associated with that session. When this is left unspecified, all the entries will be displayed.
# IpDelete command
CMD_IpDelete Delete IP Address Table Entry
CMD_IpDelete_Help Use this command to operate the IP address table database held by the currently managed Virtual Hub and delete a specified IP address table entry from the database. \nTo get the contents of the current IP address table database use the IpTable command.
CMD_IpDelete_Args IpDelete [id]
CMD_IpDelete_[id] Specify the ID of the IP address table entry to delete.
# SecureNatEnable command
CMD_SecureNatEnable Enable the Virtual NAT and DHCP Server Function (SecureNat Function)
CMD_SecureNatEnable_Help Use this to enable the Virtual NAT and DHCP Server function (SecureNat Function) on the currently managed Virtual Hub and begin its operation. Before executing this command, you must first check the setting contents of the current Virtual NAT function and DHCP Server function using the SecureNatHostGet command, NatGet command and DhcpGet command. \nBy enabling the SecureNAT function, you can virtually operate a NAT router (IP masquerade) and the DHCP Server function on a virtual network on the Virtual Hub. \n\n[Warning about SecureNAT Function]\nThe SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. \nIf you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrator's permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SecureNatEnable_Args SecureNatEnable
# SecureNatDisable command
CMD_SecureNatDisable Disable the Virtual NAT and DHCP Server Function (SecureNat Function)
CMD_SecureNatDisable_Help Use this to disable the Virtual NAT and DHCP Server function (SecureNat Function) on the currently managed Virtual Hub. By executing this command the Virtual NAT function immediately stops operating and the Virtual DHCP Server function deletes the DHCP lease database and stops the service. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SecureNatDisable_Args SecureNatDisable
# SecureNatStatusGet command
CMD_SecureNatStatusGet Get the Operating Status of the Virtual NAT and DHCP Server Function (SecureNat Function)
CMD_SecureNatStatusGet_Help Use this to get the operating status of the Virtual NAT and DHCP Server function (SecureNat Function) when it is operating on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SecureNatStatusGet_Args SecureNatStatusGet
# SecureNatHostGet command
CMD_SecureNatHostGet Get Network Interface Setting of Virtual Host of SecureNAT Function
CMD_SecureNatHostGet_Help Use this to get the virtual host network interface setting from the setting items of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. \nThe SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. \n\n[Warning about SecureNAT Function]\nThe SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. \nIf you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SecureNatHostGet_Args SecureNatHostGet
CMD_SecureNatHostGet_Column_MAC MAC Address
CMD_SecureNatHostGet_Column_IP IP Address
CMD_SecureNatHostGet_Column_MASK Subnet Mask
CMD_SecureNatHostGet_Column_LOG Save NAT and DHCP Operation Log
# SecureNatHostSet command
CMD_SecureNatHostSet Change Network Interface Setting of Virtual Host of SecureNAT Function
CMD_SecureNatHostSet_Help Use this to change and save the virtual host network interface setting in the setting items of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. \nThe SecureNAT function holds one virtual network adapter on the L2 segment inside the Virtual Hub and it has been assigned a MAC address and an IP address. By doing this, another host connected to the same L2 segment is able to communicate with the SecureNAT virtual host as if it is an actual IP host existing on the network. \n\n[Warning about SecureNAT Function]\nThe SecureNAT function is recommended only for system administrators and people with a detailed knowledge of networks. \nIf you use the SecureNAT function correctly, it is possible to achieve a safe form of remote access via a VPN. However when used in the wrong way, it can put the entire network in danger. Anyone who does not have a thorough knowledge of networks and anyone who does not have the network administrators permission must not enable the SecureNAT function. For a detailed explanation of the SecureNAT function, please refer to the VPN Server's manual and online documentation. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SecureNatHostSet_Args SecureNatHostSet [/MAC:mac] [/IP:ip] [/MASK:mask]
CMD_SecureNatHostSet_MAC Specify the MAC address to assign for the virtual interface. Specify a MAC address using a string like "00-AC-01-23-45-67". When /MAC:none is specified, no changes will be made to the current setting.
CMD_SecureNatHostSet_IP Specify the IP address to assign for the virtual interface. When /IP:none is specified, no changes will be made to the current setting.
CMD_SecureNatHostSet_MASK Specify the subnet mask to assign for the virtual interface. When /MASK:none is specified, no changes will be made to the current setting.
CMD_SecureNatHostSet_Prompt_MAC MAC Address:
CMD_SecureNatHostSet_Prompt_IP IP Address:
CMD_SecureNatHostSet_Prompt_MASK Subnet Mask:
# NatGet command
CMD_NatGet Get Virtual NAT Function Setting of SecureNAT Function
CMD_NatGet_Help Use this to get the virtual NAT setting from the setting items of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_NatGet_Args NatGet
CMD_NatGet_Column_USE Use Virtual NAT Function
CMD_NetGet_Column_MTU MTU Value
CMD_NatGet_Column_TCP TCP Session Timeout (Seconds)
CMD_NatGet_Column_UDP UDP Session Timeout (Seconds)
# NatEnable command
CMD_NatEnable Enable Virtual NAT Function of SecureNAT Function
CMD_NatEnable_Help Use this to enable the Virtual NAT function on the currently managed Virtual Hub. \nIf the SecureNAT function is still not operating even after this command has been used to enable the Virtual NAT function, Virtual NAT is not operating. To start the operation of the SecureNAT Function, use the SecureNatEnable command. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_NatEnable_Args NatEnable
# NatDisable command
CMD_NatDisable Disable Virtual NAT Function of SecureNAT Function
CMD_NatDisable_Help Use this to disable the Virtual NAT function on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_NatDisable_Args NatDisable
# NatSet command
CMD_NatSet Change Virtual NAT Function Setting of SecureNAT Function
CMD_NatSet_Help Use this to change the Virtual NAT setting of the currently managed Virtual Hub. The contents of the Virtual NAT setting includes: MTU value, TCP session timeout and UDP session timeout \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_NatSet_Args NatSet [/MTU:mtu] [/TCPTIMEOUT:tcp_timeout] [/UDPTIMEOUT:udp_timeout] [/LOG:yes|no]
CMD_NatSet_MTU Set the MTU (Maximum transferable unit size) using an integer to specify the byte length unit. This value is the maximum payload length excluding the MAC header of the Ethernet frame that the Virtual NAT sends and the default is 1500 bytes.
CMD_NatSet_TCPTIMEOUT This sets how many seconds a condition of non-communication continues in a TCP session that the Virtual NAT is relaying before a timeout occurs and the session is discarded.
CMD_NatSet_UDPTIMEOUT This sets how many seconds a condition of non-communication continues in a UDP session that the Virtual NAT is relaying before a timeout occurs and the session is discarded.
CMD_NatSet_LOG Specify whether or not to save the Virtual NAT operation in the Virtual Hub security log. Specify "yes" to save it, and "no" to not save it.
CMD_NatSet_Prompt_MTU MTU Value:
CMD_NatSet_Prompt_TCPTIMEOUT TCP Session Timeout (Seconds):
CMD_NatSet_Prompt_UDPTIMEOUT UDP Session Timeout (Seconds):
CMD_NatSet_Prompt_LOG Save Log (yes / no):
CMD_NatSet_Eval_MTU Specify a value in the range %d to %d for the MTU value.
CMD_NatSet_Eval_TCP Specify the number of seconds in the range %d to %d for the TCP session timeout.
CMD_NatSet_Eval_UDP Specify the number of seconds in the range %d to %d for the UDP session timeout.
# NatTable command
CMD_NatTable Get Virtual NAT Function Session Table of SecureNAT Function
CMD_NatTable_Help Use this to get the table of TCP and UDP sessions currently communicating via the Virtual NAT (NAT table) in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_NatTable_Args NatTable
# DhcpGet command
CMD_DhcpGet Get Virtual DHCP Server Function Setting of SecureNAT Function
CMD_DhcpGet_Help Use this to get the virtual DHCP Server setting from the setting items of the Virtual NAT and DHCP Server function (SecureNAT function) on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_DhcpGet_Args DhcpGet
CMD_DhcpGet_Column_Log Record Log of NAT and DHCP Operation
CMD_DhcpGet_Column_USE Use Virtual DHCP Function
CMD_DhcpGet_Column_IP1 Start Distribution Address Band
CMD_DhcpGet_Column_IP2 End Distribution Address Band
CMD_DhcpGet_Column_MASK Subnet Mask
CMD_DhcpGet_Column_LEASE Lease Limit (Seconds)
CMD_DhcpGet_Column_GW Default Gateway Address
CMD_DhcpGet_Column_DNS DNS Server Address 1
CMD_DhcpGet_Column_DNS2 DNS Server Address 2
CMD_DhcpGet_Column_DOMAIN Domain Name
CMD_DhcpGet_Column_PUSHROUTE Static Routing Table to Push
# DhcpEnable command
CMD_DhcpEnable Enable Virtual DHCP Server Function of SecureNAT Function
CMD_DhcpEnable_Help Use this to enable the Virtual DHCP Server function on the currently managed Virtual Hub. \nIf the SecureNAT function is still not operating even after this command has been used to enable the Virtual DHCP function, Virtual DHCP Server is not operating. To start the operation of the SecureNAT Function, use the SecureNatEnable command. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_DhcpEnable_Args DhcpEnable
# DhcpDisable command
CMD_DhcpDisable Disable Virtual DHCP Server Function of SecureNAT Function
CMD_DhcpDisable_Help Use this to disable the Virtual DHCP Server function on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_DhcpDisable_Args DhcpDisable
# DhcpSet command
CMD_DhcpSet Change Virtual DHCP Server Function Setting of SecureNAT Function
CMD_DhcpSet_Help Use this to change the Virtual DHCP Server setting of the currently managed Virtual Hub. The Virtual DHCP Server settings include the following items: distribution address band, subnet mask, lease limit, and option values assigned to clients. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_DhcpSet_Args DhcpSet [/START:start_ip] [/END:end_ip] [/MASK:subnetmask] [/EXPIRE:sec] [/GW:gwip] [/DNS:dns] [/DNS2:dns2][/DOMAIN:domain] [/LOG:yes|no] [/PUSHROUTE:"routing_table"]
CMD_DhcpSet_START Specify the start point of the address band to be distributed to the client. (Example: 192.168.30.10)
CMD_DhcpSet_END Specify the end point of the address band to be distributed to the client. (Example: 192.168.30.200)
CMD_DhcpSet_MASK Specify the subnet mask to be specified for the client. (Example: 255.255.255.0)
CMD_DhcpSet_EXPIRE Specify the expiration date in second units for leasing an IP address to a client.
CMD_DhcpSet_GW Specify the IP address of the default gateway to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the default gateway.
CMD_DhcpSet_DNS Specify the IP address of the primary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the DNS Server address.
CMD_DhcpSet_DNS2 Specify the IP address of the secondary DNS Server to be notified to the client. You can specify a SecureNAT Virtual Host IP address for this when the SecureNAT Function's Virtual NAT Function has been enabled and is being used also. If you specify 0 or none, then the client will not be notified of the DNS Server address.
CMD_DhcpSet_DOMAIN Specify the domain name to be notified to the client. If you specify none, then the client will not be notified of the domain name.
CMD_DhcpSet_LOG Specify whether or not to save the Virtual DHCP Server operation in the Virtual Hub security log. Specify "yes" to save it. This value is interlinked with the Virtual NAT Function log save setting.
CMD_DhcpSet_PUSHROUTE Specify the static routing table to push.\nExample: "192.168.5.0/255.255.255.0/192.168.4.254, 10.0.0.0/255.0.0.0/192.168.4.253"\nSplit multiple entries (maximum: 64 entries) by comma or space characters. Each entry must be specified in the "IP network address/subnet mask/gateway IP address" format.\nThis Virtual DHCP Server can push the classless static routes (RFC 3442) with DHCP reply messages to VPN clients.\nWhether or not a VPN client can recognize the classless static routes (RFC 3442) depends on the target VPN client software. SoftEther VPN Client and OpenVPN Client are supporting the classless static routes. On L2TP/IPsec and MS-SSTP protocols, the compatibility depends on the implementation of the client software. You can realize the split tunneling if you clear the default gateway field on the Virtual DHCP Server options. On the client side, L2TP/IPsec and MS-SSTP clients need to be configured not to set up the default gateway for the split tunneling usage.\nYou can also push the classless static routes (RFC 3442) by your existing external DHCP server. In that case, disable the Virtual DHCP Server function on SecureNAT, and you need not to set up the classless routes on this command.\nSee the RFC 3442 to understand the classless routes.
CMD_DhcpSet_Prompt_START Start Point for Distributed Address Band:
CMD_DhcpSet_Prompt_END End Point for Distributed Address Band:
CMD_DhcpSet_Prompt_MASK Subnet Mask:
CMD_DhcpSet_Prompt_EXPIRE Lease Limit (Seconds):
CMD_DhcpSet_Prompt_GW Default Gateway ('none' to not set this):
CMD_DhcpSet_Prompt_DNS DNS Server 1 ('none' to not set this):
CMD_DhcpSet_Prompt_DNS2 DNS Server 2 ('none' to not set this):
CMD_DhcpSet_Prompt_DOMAIN Domain Name:
# DhcpTable command
CMD_DhcpTable Get Virtual DHCP Server Function Lease Table of SecureNAT Function
CMD_DhcpTable_Help Use this to get the lease table of IP addresses, held by the Virtual DHCP Server, that are assigned to clients in cases when the Virtual NAT function is operating on the currently managed Virtual Hub. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_DhcpTable_Args DhcpTable
# AdminOptionList command
CMD_AdminOptionList Get List of Virtual Hub Administration Options
CMD_AdminOptionList_Help Use this to get a list of Virtual Hub administration options that are set on the currently managed Virtual Hub. \nThe purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. \nOnly an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. \nThere is an exception however. If allow_hub_admin_change_option is set to "1", even Virtual Hub administrators are able to edit the administration options. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster member.
CMD_AdminOptionList_Args AdminOptionList
# AdminOptionSet command
CMD_AdminOptionSet Set Values of Virtual Hub Administration Options
CMD_AdminOptionSet_Help Use this to change the values of Virtual Hub administration options that are set on the currently managed Virtual Hub. \nThe purpose of the Virtual Hub administration options is for the VPN Server Administrator to set limits for the setting ranges when the administration of the Virtual Hub is to be trusted to each Virtual Hub administrator. \nOnly an administrator with administration privileges for this entire VPN Server is able to add, edit and delete the Virtual Hub administration options. The Virtual Hub administrators are unable to make changes to the administration options, however they are able to view them. \nThere is an exception however. If allow_hub_admin_change_option is set to "1", even Virtual Hub administrators are able to edit the administration options. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster member.
CMD_AdminOptionSet_Args AdminOptionSet [name] [/VALUE:value]
CMD_AdminOptionSet_[name] Specify the name of the administration option whose value you want to change. You can get a list of names by using the AdminOptionList command.
CMD_AdminOptionSet_VALUE Specify an integer for the setting value.
CMD_AdminOptionSet_Prompt_name Name of Administration Option to Change Value:
CMD_AdminOptionSet_Prompt_VALUE Setting Value (Integer):
# ExtOptionList command
CMD_ExtOptionList Get List of Virtual Hub Extended Options
CMD_ExtOptionList_Help Use this to get a Virtual Hub Extended Options List that is set on the currently managed Virtual Hub.\nVirtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub.\nBy default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options.\nHowever, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options.\nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster member.
CMD_ExtOptionList_Args ExtOptionList
# ExtOptionSet command
CMD_ExtOptionSet Set a Value of Virtual Hub Extended Options
CMD_ExtOptionSet_Help Use this to set a value in the Virtual Hub Extended Options List that is set on the currently managed Virtual Hub.\nVirtual Hub Extended Option enables you to configure more detail settings of the Virtual Hub.\nBy default, both VPN Server's global administrators and individual Virtual Hub's administrators can modify the Virtual Hub Extended Options.\nHowever, if the deny_hub_admin_change_ext_option is set to 1 on the Virtual Hub Admin Options, the individual Virtual Hub's administrators cannot modify the Virtual Hub Extended Options.\nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster member.
CMD_ExtOptionSet_Args ExtOptionSet [name] [/VALUE:value]
CMD_ExtOptionSet_[name] Specify the name of the Virtual Hub Extended Options whose value you want to change. You can get a list of names by using the ExtOptionList command.
CMD_ExtOptionSet_VALUE Specify an integer for the setting value.
CMD_ExtOptionSet_Prompt_name Name of Extended Option to Change Value:
CMD_ExtOptionSet_Prompt_VALUE Setting Value (Integer):
# CrlList command
CMD_CrlList Get List of Certificates Revocation List
CMD_CrlList_Help Use this to get a Certificates Revocation List that is set on the currently managed Virtual Hub. \nBy registering certificates in the Certificates Revocation List, the clients who provide these certificates will be unable to connect to this Virtual Hub using certificate authentication mode. \nNormally with this function, in cases where the security of a private key has been compromised or where a person holding a certificate has been stripped of their privileges, by registering that certificate as invalid on the Virtual Hub, it is possible to deny user authentication when that certificate is used by a client to connect to the Virtual Hub. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CrlList_Args CrlList
# CrlAdd command
CMD_CrlAdd Add a Revoked Certificate
CMD_CrlAdd_Help Use this to add a new revoked certificate definition in the Certificate Revocation List that is set on the currently managed Virtual Hub. \nSpecify the contents to be registered in the Certificate Revocation List by using the parameters of this command. When a user connects to a Virtual Hub in certificate authentication mode and that certificate matches 1 or more of the contents registered in the certificates revocation list, the user is denied connection. \nA certificate that matches all the conditions that are defined by the parameters specified by this command will be judged as invalid. \nThe items that can be set are as follows: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number (hexadecimal), MD5 Digest Value (hexadecimal, 128 bit), and SHA-1 Digest Value (hexadecimal, 160 bit). For the specification of a digest value (hash value) a certificate is optionally specified depending on the circumstances. Normally when a MD5 or SHA-1 digest value is input, it is not necessary to input the other items. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CrlAdd_Args CrlAdd [/SERIAL:serial] [/MD5:md5] [/SHA1:sha1] [/CN:cn] [/O:o] [/OU:ou] [/C:c] [/ST:st] [/L:l]
CMD_CrlAdd_SERIAL Use this parameter to specify the value for the certificate serial number (hexadecimal) when it is set as a condition.
CMD_CrlAdd_MD5 Use this parameter to specify the value for the certificate MD5 digest value (hexadecimal, 128 bits) when it is set as a condition. If this parameter specification is other than a hexadecimal value of 32 characters (16 bytes), it will be ignored.
CMD_CrlAdd_SHA1 Use this parameter to specify the value for the certificate SHA1 digest value (hexadecimal, 160 bits) when it is set as a condition. If this parameter specification is other than a hexadecimal value of 40 characters (16 bytes), it will be ignored.
CMD_CrlAdd_CN Use this parameter to specify the name (CN) of the certificate when it is set as a condition.
CMD_CrlAdd_O Use this parameter to specify the organization (O) of the certificate when it is set as a condition.
CMD_CrlAdd_OU Use this parameter to specify the organization unit (OU) of the certificate when it is set as a condition.
CMD_CrlAdd_C Use this parameter to specify the country (C) of the certificate when it is set as a condition.
CMD_CrlAdd_ST Use this parameter to specify the state (ST) of the certificate when it is set as a condition.
CMD_CrlAdd_L Use this parameter to specify the locale (L) of the certificate when it is set as a condition.
# CrlDel command
CMD_CrlDel Delete a Revoked Certificate
CMD_CrlDel_Help Use this to specify and delete a revoked certificate definition from the certificate revocation list that is set on the currently managed Virtual Hub. \nTo get the list of currently registered revoked certificate definitions, use the CrlList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CrlDel_Args CrlDel [id]
CMD_CrlDel_[id] Specify the ID of the revoked certificate definition you want to delete.
CMD_CrlDel_Prompt_ID ID to Delete:
# CrlGet command
CMD_CrlGet Get a Revoked Certificate
CMD_CrlGet_Help Use this to specify and get the contents of a revoked certificate definition from the Certificates Revocation List that is set on the currently managed Virtual Hub. \nTo get the list of currently registered revoked certificate definitions, use the CrlList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_CrlGet_Args CrlGet [id]
CMD_CrlGet_[id] Specify the ID of the revoked certificate definition you want to get.
CMD_CrlGet_Prompt_ID ID to Get:
CMD_CrlGet_CN Common Name (CN)
CMD_CrlGet_O Organization (O)
CMD_CrlGet_OU Organization Unit (OU)
CMD_CrlGet_C Country (C)
CMD_CrlGet_ST State (ST)
CMD_CrlGet_L Locale (L)
CMD_CrlGet_SERI Serial Number (Hexadecimal)
CMD_CrlGet_MD5_HASH MD5 Digest Value (Hexadecimal, 128 bit)
CMD_CrlGet_SHA1_HASH SHA-1 Digest Value (Hexadecimal, 160 bit)
# AcList command
CMD_AcList Get List of Rule Items of Source IP Address Limit List
CMD_AcList_Help Use this to get a list of Source IP Address Limit List rules that is set on the currently managed Virtual Hub. \nYou can allow or deny VPN connections to this Virtual Hub according to the client computer's source IP address. You can define multiple rules and set a priority for each rule. The search proceeds from the rule with the highest order or priority and based on the action of the rule that the IP address first matches, the connection from the client is either allowed or denied. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_AcList_Args AcList
# AcAdd command
CMD_AcAdd Add Rule to Source IP Address Limit List (IPv4)
CMD_AcAdd_Help Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. \nThe items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. \nYou can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. \nYou can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. \nTo get a list of the currently registered Source IP Address Limit List, use the AcList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_AcAdd_Args AcAdd [allow|deny] [/PRIORITY:priority] [/IP:ip/mask]
CMD_AcAdd_[allow|deny] Set whether to "allow" or "deny" the connection from a client that matches the rule.
CMD_AcAdd_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. The smaller the value the higher the priority.
CMD_AcAdd_IP Using the format: "IP Address/Mask", specify the range of client IPv4 addresses. Specify the IPv4 address by separating the decimal values using dots such as "192.168.0.1". For the mask, either specify decimal values separated by dots such as "255.255.255.0", or you can specify the bit length from the header using a decimal value such as "24". To specify a single IPv4 host, specify the mask as "32" or "255.255.255.255".
CMD_AcAdd_Prompt_AD allow or deny:
CMD_AcAdd_Prompt_PRIORITY Priority:
CMD_AcAdd_Prompt_IP IPv4 Address/Mask:
CMD_AcAdd_Eval_PRIORITY Specify 1 or higher for the priority.
# AcAdd6 command
CMD_AcAdd6 Add Rule to Source IP Address Limit List (IPv6)
CMD_AcAdd6_Help Use this to add a new rule to the Source IP Address Limit List that is set on the currently managed Virtual Hub. \nThe items set here will be used to decide whether to allow or deny connection from a VPN Client when this client attempts connection to the Virtual Hub. \nYou can specify a client IP address, or IP address or mask to match the rule as the contents of the rule item. By specifying an IP address only, there will only be one specified computer that will match the rule, but by specifying an IP net mask address or subnet mask address, all the computers in the range of that subnet will match the rule. \nYou can specify the priority for the rule. You can specify an integer of 1 or greater for the priority and the smaller the number, the higher the priority. \nTo get a list of the currently registered Source IP Address Limit List, use the AcList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_AcAdd6_Args AcAdd6 [allow|deny] [/PRIORITY:priority] [/IP:ip/mask]
CMD_AcAdd6_[allow|deny] Set whether to "allow" or "deny" the connection from a client that matches the rule.
CMD_AcAdd6_PRIORITY Specify an integer of 1 or higher to indicate the priority of the rule. The smaller the value the higher the priority.
CMD_AcAdd6_IP Using the format: "IP Address/Mask", specify the range of client IPv6 addresses. Specify the IPv6 address by separating the hexadecimal values using colons such as "2001:200:0:1::". For the mask, either specify hexadecimal values separated by colons such as "ffff:ffff:ffff:ffff::", or you can specify the bit length from the header using a decimal value such as "64". To specify a single IPv6 host, specify the mask as "128" or "ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff".
CMD_AcAdd6_Prompt_AD allow or deny:
CMD_AcAdd6_Prompt_PRIORITY Priority:
CMD_AcAdd6_Prompt_IP IPv6 Address/Mask:
CMD_AcAdd6_Eval_PRIORITY Specify 1 or higher for the priority.
# AcDel command
CMD_AcDel Delete Rule from Source IP Address Limit List
CMD_AcDel_Help Use this to delete a rule from the Source IP Address Limit List that is set on the currently managed Virtual Hub. \nTo get a list of the currently registered IP access control list, use the AcList command. \nThis command cannot be run on VPN Bridge. \nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_AcDel_Args AcDel [id]
CMD_AcDel_[id] Specify the ID of the rule in the Source IP Address Limit List that you want to delete.
CMD_AcDel_Prompt_ID ID of Rule to Delete:
# LicenseAdd command
CMD_LicenseAdd Add License Key Registration
CMD_LicenseAdd_Help Use this to register a new license key on the SoftEther VPN Server. \nTo use SoftEther VPN Server you must acquire a valid license and register the license key. The license keys are 36 alphanumeric characters in length plus hyphens. They are key codes that certify the ownership of a license. \nWhen a license certificate is received together with this software, the license key is printed on this license certificate. If the license for this software has been purchased online, the license key is provided by email and on the website window at the time the license is purchased. The license key may also be written down by some other method. If you don't know where the license key is written down, ask the vendor who sold you the license. \n\nTo get the list of currently registered licenses, use the LicenseList command. \nTo display the license status of the current VPN Server, use the LicenseStatus command. \nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_LicenseAdd_Args LicenseAdd [key]
CMD_LicenseAdd_[key] Specify the license key to register. Specify 36 digits of alphanumeric characters and group the digits in groups of 6 separating them by hyphen.
CMD_LicenseAdd_Prompt_Key License Key:
# LicenseDel command
CMD_LicenseDel Delete Registered License
CMD_LicenseDel_Help Use this to delete a specified license from the license list that is currently registered on the SoftEther VPN Server. \n\nTo get the list of currently registered licenses, use the LicenseList command. \nTo display the license status of the current VPN Server, use the LicenseStatus command. \nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_LicenseDel_Args LicenseDel [id]
CMD_LicenseDel_[id] Specify the license number to delete.
CMD_LicenseDel_Prompt_ID License Number to Delete:
# LicenseList command
CMD_LicenseList Get List of Registered Licenses
CMD_LicenseList_Help Use this to display a list of license information currently registered on the SoftEther VPN Server including: license key, license type name, status, expiration date, license ID, license type ID, server ID and serial ID. \n\nTo display the license status of the current VPN Server, use the LicenseStatus command. \nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_LicenseList_Args LicenseList
# LicenseStatus command
CMD_LicenseStatus Get License Status of Current VPN Server
CMD_LicenseStatus_Help Use this to get and display the license status of the current SoftEther VPN Server. \nThe following current information on the SoftEther VPN Server will be displayed: product edition, server ID, product license expiration date, number of usable Client Connection Licenses and number of Bridge Connection Licenses. \n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_LicenseStatus_Args LicenseStatus
# Commands added after SoftEther VPN 4.0
# IPsecEnable command
CMD_IPsecEnable Enable or Disable IPsec VPN Server Function
CMD_IPsecEnable_Help Enable or Disable IPsec VPN Server Function on SoftEther VPN Server.\nIf you enable this function, Virtual Hubs on the VPN Server will be able to accept Remote-Access VPN connections from L2TP-compatible PCs, Mac OS X and Smartphones, and also can accept EtherIP Site-to-Site VPN Connection. VPN Connections from Smartphones suchlike iPhone, iPad and Android, and also from native VPN Clients on Mac OS X and Windows can be accepted.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_IPsecEnable_Args IPsecEnable [/L2TP:yes|no] [/L2TPRAW:yes|no] [/ETHERIP:yes|no] [/PSK:pre-shared-key] [/DEFAULTHUB:default_hub]
CMD_IPsecEnable_L2TP Enable or Disable the L2TP over IPsec Server Function. To accept VPN connections from iPhone, iPad, Android, Windows or Mac OS X, enable this option.
CMD_IPsecEnable_L2TPRAW Enable or Disable the L2TP Server Function (Raw L2TP with No Encryptions). To accept special VPN clients, enable this option.
CMD_IPsecEnable_ETHERIP Enable or Disable the EtherIP / L2TPv3 over IPsec Server Function (for site-to-site VPN Server function). Router Products which are compatible with EtherIP over IPsec can connect to Virtual Hubs on the VPN Server and establish Layer-2 (Ethernet) Bridging.
CMD_IPsecEnable_PSK Specify the IPsec Pre-Shared Key. An IPsec Pre-Shared Key is also called as "PSK" or "secret". Specify it equal or less than 8 letters, and distribute it to every users who will connect to the VPN Server. Please note: Google Android 4.0 has a bug which a Pre-Shared Key with 10 or more letters causes a unexpected behavior. For that reason, the letters of a Pre-Shared Key should be 9 or less characters.
CMD_IPsecEnable_DEFAULTHUB Specify the default Virtual HUB in a case of omitting the name of HUB on the Username. Users should specify their username such as "Username@Target Virtual HUB Name" to connect this L2TP Server. If the designation of the Virtual Hub is omitted, the above HUB will be used as the target.
CMD_IPsecEnable_Prompt_L2TP Enable L2TP over IPsec Server Function (yes / no):
CMD_IPsecEnable_Prompt_L2TPRAW Enable Raw L2TP Server Function (yes / no):
CMD_IPsecEnable_Prompt_ETHERIP Enable EtherIP / L2TPv3 over IPsec Server Function (yes / no):
CMD_IPsecEnable_Prompt_PSK Pre Shared Key for IPsec (Recommended: 9 letters at maximum):
CMD_IPsecEnable_Prompt_DEFAULTHUB Default Virtual HUB in a case of omitting the HUB on the Username:
# IPsecGet command
CMD_IPsecGet Get the Current IPsec VPN Server Settings
CMD_IPsecGet_Help Get and view the current IPsec VPN Server settings on the SoftEther VPN Server.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_IPsecGet_Args IPsecGet
CMD_IPsecGet_PRINT_L2TP L2TP over IPsec Server Function Enabled
CMD_IPsecGet_PRINT_L2TPRAW Raw L2TP Server Function Enabled
CMD_IPsecGet_PRINT_ETHERIP EtherIP / L2TPv3 over IPsec Server Function Enabled
CMD_IPsecGet_PRINT_PSK IPsec Pre-Shared Key String
CMD_IPsecGet_PRINT_DEFAULTHUB Name of Default Virtual Hub
# EtherIpClientAdd command
CMD_EtherIpClientAdd Add New EtherIP / L2TPv3 over IPsec Client Setting to Accept EthreIP / L2TPv3 Client Devices
CMD_EtherIpClientAdd_Help Add a new setting entry to enable the EtherIP / L2TPv3 over IPsec Server Function to accept client devices.\nIn order to accept connections from routers by the EtherIP / L2TPv3 over IPsec Server Function, you have to define the relation table between an IPsec Phase 1 string which is presented by client devices of EtherIP / L2TPv3 over IPsec compatible router, and the designation of the destination Virtual Hub.\nAfter you add a definition entry by EtherIpClientAdd command, the defined connection setting to the Virtual Hub will be applied on the login-attepting session from an EtherIP / L2TPv3 over IPsec client device.\nThe username and password in an entry must be registered on the Virtual Hub. An EtherIP / L2TPv3 client will be regarded as it connected the Virtual HUB with the identification of the above user information.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_EtherIpClientAdd_Args EtherIpClientAdd [ID] [/HUB:hubname] [/USERNAME:username] [/PASSWORD:password]
CMD_EtherIpClientAdd_[ID] Specify an ISAKMP Phase 1 ID. The ID must be exactly same as a ID in the configuration of the EtherIP / L2TPv3 Client. You can specify IP address as well as characters as ID, if the EtherIP Client uses IP address as Phase 1 ID. If you specify '*' (asterisk), it will be a wildcard to match any clients which doesn't match other explicit rules.
CMD_EtherIpClientAdd_HUB Specify the name of the Virtual Hub to connect.
CMD_EtherIpClientAdd_USERNAME Specify the username to login to the destination Virtual Hub.
CMD_EtherIpClientAdd_PASSWORD Specify the password to login to the destination Virtual Hub.
CMD_EtherIpClientAdd_Prompt_ID ISAKMP Phase 1 ID ('*' is a wildcard):
CMD_EtherIpClientAdd_Prompt_HUB Virtual Hub Name:
CMD_EtherIpClientAdd_Prompt_USERNAME Username to Login Virtual Hub:
CMD_EtherIpClientAdd_Prompt_PASSWORD Password to Login Virtual Hub:
# EtherIpClientDelete command
CMD_EtherIpClientDelete Delete an EtherIP / L2TPv3 over IPsec Client Setting
CMD_EtherIpClientDelete_Help This command deletes an entry to accept VPN clients by EtherIP / L2TPv3 over IPsec Function. \n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_EtherIpClientDelete_Args EtherIpClientDelete [ID]
CMD_EtherIpClientDelete_[ID] Specify the ISAKMP Phase 1 ID to delete.
CMD_EtherIpClientDelete_Prompt_ID ISAKMP Phase 1 ID:
# EtherIpClientList command
CMD_EtherIpClientList Get the Current List of EtherIP / L2TPv3 Client Device Entry Definitions
CMD_EtherIpClientList_Help This command gets and shows the list of entries to accept VPN clients by EtherIP / L2TPv3 over IPsec Function.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_EtherIpClientList_Args EtherIpClientList
# OpenVpnEnable command
CMD_OpenVpnEnable Enable / Disable OpenVPN Clone Server Function
CMD_OpenVpnEnable_Help This VPN Server has the clone functions of OpenVPN software products by OpenVPN Technologies, Inc. Any OpenVPN Clients can connect to this VPN Server.\n\nThe manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. For details, please see the help of the IPsecEnable command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_OpenVpnEnable_Args OpenVpnEnable [yes|no] [/PORTS:udp_port_list]
CMD_OpenVpnEnable_[yes|no] Specify yes to enable the OpenVPN Clone Server Function. Specify no to disable.
CMD_OpenVpnEnable_PORTS Specify UDP ports to listen for OpenVPN. Multiple UDP ports can be specified with splitting by space or comma letters, for example: "1194, 2001, 2010, 2012". The default port for OpenVPN is UDP 1194. You can specify any other UDP ports.
CMD_OpenVpnEnable_Prompt_[yes|no] Enables OpenVPN Clone Server Function (yes / no):
CMD_OpenVpnEnable_Prompt_PORTS UDP Ports to Listen for OpenVPN (Default: 1194 / Multiple Accepted):
# OpenVpnGet command
CMD_OpenVpnGet Get the Current Settings of OpenVPN Clone Server Function
CMD_OpenVpnGet_Help Get and show the current settings of OpenVPN Clone Server Function.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_OpenVpnGet_Args OpenVpnGet
CMD_OpenVpnGet_PRINT_Enabled OpenVPN Clone Server Enabled
CMD_OpenVpnGet_PRINT_Ports UDP Port List
# OpenVpnMakeConfig command
CMD_OpenVpnMakeConfig Generate a Sample Setting File for OpenVPN Client
CMD_OpenVpnMakeConfig_Help Originally, the OpenVPN Client requires a user to write a very difficult configuration file manually. This tool helps you to make a useful configuration sample. What you need to generate the configuration file for the OpenVPN Client is to run this command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_OpenVpnMakeConfig_Args OpenVpnMakeConfig [ZIP_FileName]
CMD_OpenVpnMakeConfig_[ZIP_FileName] Specify the output setting files to be saved as ZIP compression format. If no file extension is specified, the ".zip" extension will be appended to the filename.
CMD_OpenVpnMakeConfig_Prompt_ZIP Output Filename of Setting Files (ZIP compressed file):
CMD_OpenVpnMakeConfig_OK The sample setting file was saved as "%s". You can unzip this file to extract setting files.\n
CMD_OpenVpnMakeConfig_ERROR The sample setting files were unable to be saved as "%s". The filename might be invalid.\n
# SstpEnable command
CMD_SstpEnable Enable / Disable Microsoft SSTP VPN Clone Server Function
CMD_SstpEnable_Help This VPN Server has the clone functions of MS-SSTP VPN Server which is on Windows Server 2008 / 2012 by Microsoft Corporation. Standard MS-SSTP Clients in Windows Vista / 7 / 8 / RT / 10 can connect to this VPN Server.\n\n[Caution]\nThe value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the client, and that certificate must be in the trusted list on the SSTP VPN client. For details refer the Microsoft's documents.\nYou can use the ServerCertRegenerate command to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields. In that case, you have to register such a new self-signed certificate on the SSTP VPN Client as a trusted root certificate. If you do not want to do such a bother tasks, please consider to purchase a SSL certificate provided by commercial authority such as VeriSign or GlobalSign.\n\nThe manner to specify a username to connect to the Virtual Hub, and the selection rule of default Hub by using this clone server functions are same to the IPsec Server functions. For details, please see the help of the IPsecEnable command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SstpEnable_Args SstpEnable [yes|no]
CMD_SstpEnable_[yes|no] Specify yes to enable the Microsoft SSTP VPN Clone Server Function. Specify no to disable.
CMD_SstpEnable_Prompt_[yes|no] Enables SSTP VPN Clone Server Function (yes / no):
CMD_SstpEnable_PRINT_Enabled SSTP VPN Clone Server Enabled
# SstpGet command
CMD_SstpGet Get the Current Settings of Microsoft SSTP VPN Clone Server Function
CMD_SstpGet_Help Get and show the current settings of Microsoft SSTP VPN Clone Server Function.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_SstpGet_Args SstpGet
# ServerCertRegenerate command
CMD_ServerCertRegenerate Generate New Self-Signed Certificate with Specified CN (Common Name) and Register on VPN Server
CMD_ServerCertRegenerate_Help You can use this command to replace the current certificate on the VPN Server to a new self-signed certificate which has the CN (Common Name) value in the fields.\n\nThis command is convenient if you are planning to use Microsoft SSTP VPN Clone Server Function. Because of the value of CN (Common Name) on the SSL certificate of VPN Server must match to the hostname specified on the SSTP VPN client.\nFor details please see the help of SstpEnable command.\n\nThis command will delete the existing SSL certificate of the VPN Server. It is recommended to backup the current SSL certificate and private key by using the ServerKeyGet command beforehand.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_ServerCertRegenerate_Args ServerCertRegenerate [CN]
CMD_ServerCertRegenerate_[CN] Specify a Common Name (CN) which the new certificate will have.
CMD_ServerCertRegenerate_Prompt_CN Value of Common Name (CN):
# VpnOverIcmpDnsEnable command
CMD_VpnOverIcmpDnsEnable Enable / Disable the VPN over ICMP / VPN over DNS Server Function
CMD_VpnOverIcmpDnsEnable_Help You can establish a VPN only with ICMP or DNS packets even if there is a firewall or routers which blocks TCP/IP communications. You have to enable the following functions beforehand.\n\nWarning: Use this function for emergency only. It is helpful when a firewall or router is misconfigured to blocks TCP/IP, but either ICMP or DNS is not blocked. It is not for long-term stable using.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_VpnOverIcmpDnsEnable_Args VpnOverIcmpDnsEnable [/ICMP:yes|no] [/DNS:yes|no]
CMD_VpnOverIcmpDnsEnable_ICMP Specify yes to enable the VPN over ICMP Server. Specify no to disable.
CMD_VpnOverIcmpDnsEnable_DNS Specify yes to enable the VPN over DNS Server. Specify no to disable.
CMD_VpnOverIcmpDnsEnable_Prompt_ICMP Enable VPN over ICMP Server (yes / no):
CMD_VpnOverIcmpDnsEnable_Prompt_DNS Enable VPN over DNS Server (yes / no):
# VpnOverIcmpDnsGet command
CMD_VpnOverIcmpDnsGet Get Current Setting of the VPN over ICMP / VPN over DNS Function
CMD_VpnOverIcmpDnsGet_Help Get and show the current VPN over ICMP / VPN over DNS Function status.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_VpnOverIcmpDnsGet_Args VpnOverIcmpDnsGet
CMD_VpnOverIcmpDnsGet_PRINT_ICMP VPN over ICMP Server Enabled
CMD_VpnOverIcmpDnsGet_PRINT_DNS VPN over DNS Server Enabled
# DynamicDnsGetStatus command
CMD_DynamicDnsGetStatus Show the Current Status of Dynamic DNS Function
CMD_DynamicDnsGetStatus_Help Get and show the current status of the Dynamic DNS function.\n\nThe Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name.\nAlso, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address.\r\nTherefore, you need not any longer to keep static global IP addresses with expenses monthly costs.\n[Caution]\nTo disable the Dynamic DNS Function, modify the configuration file of VPN Server.\r\n\r\nThe "declare root" directive has the "declare DDnsClient" directive. In this directive, you can switch "bool Disable" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled.\r\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_DynamicDnsGetStatus_Args DynamicDnsGetStatus
CMD_DynamicDnsGetStatus_PRINT_FQDN Assigned Dynamic DNS Hostname (Full)
CMD_DynamicDnsGetStatus_PRINT_HOSTNAME Assigned Dynamic DNS Hostname (Hostname)
CMD_DynamicDnsGetStatus_PRINT_SUFFIX DNS Suffix
CMD_DynamicDnsGetStatus_PRINT_IPv4 Global IPv4 Address
CMD_DynamicDnsGetStatus_PRINT_IPv6 Global IPv6 Address
# DynamicDnsSetHostname command
CMD_DynamicDnsSetHostname Set the Dynamic DNS Hostname
CMD_DynamicDnsSetHostname_Help You can use this command to change the hostname assigned by the Dynamic DNS function. The currently assigned hostname can be showen by the DynamicDnsGetStatus command.\n\nThe Dynamic DNS assigns a unique and permanent DNS hostname for this VPN Server. You can use that hostname to specify this VPN Server on the settings for VPN Client and VPN Bridge. You need not to register and keep a domain name.\nAlso, if your ISP assignes you a dynamic (not-fixed) IP address, the corresponding IP address of your Dynamic DNS hostname will be automatically changed. It enables you to keep running the VPN Server by using only a dynamic IP address.\r\nTherefore, you need not any longer to keep static global IP addresses with expenses monthly costs.\n[Caution]\nTo disable the Dynamic DNS Function, modify the configuration file of VPN Server.\r\n\r\nThe "declare root" directive has the "declare DDnsClient" directive. In this directive, you can switch "bool Disable" from false to true, and reboot the VPN Server, then the Dynamic DNS Function will be disabled.\r\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.
CMD_DynamicDnsSetHostname_Args DynamicDnsSetHostname [hostname]
CMD_DynamicDnsSetHostname_[hostname] Specify the new hostname with 3 letters at least and 31 letters at most. Only alphabets and numerics can be used.
CMD_DynamicDnsSetHostname_Prompt_hostname Dynamic DNS Hostname (3 - 31 letters):
# VpnAzureGetStatus command
CMD_VpnAzureGetStatus Show the current status of VPN Azure function
CMD_VpnAzureGetStatus_Help Get and show the current status of the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_VpnAzureGetStatus_Args VpnAzureGetStatus
CMD_VpnAzureGetStatus_PRINT_ENABLED VPN Azure Function is Enabled
CMD_VpnAzureGetStatus_PRINT_CONNECTED Connection to VPN Azure Cloud Server is Established
CMD_VpnAzureGetStatus_PRINT_HOSTNAME Hostname of this VPN Server on VPN Azure Service
# VpnAzureSetStatus command
CMD_VpnAzureSetEnable Enable / Disable VPN Azure Function
CMD_VpnAzureSetEnable_Help Enable or disable the VPN Azure function.\n\nVPN Azure makes it easier to establish a VPN Session from your home PC to your office PC. While a VPN connection is established, you can access to any other servers on the private network of your company.\nYou don't need a global IP address on the office PC (VPN Server). It can work behind firewalls or NATs. No network administrator's configuration required. You can use the built-in SSTP-VPN Client of Windows in your home PC.\nVPN Azure is a cloud VPN service operated by SoftEther VPN Project. VPN Azure is free of charge and available to anyone. Visit http://www.vpnazure.net/ to see details and how-to-use instructions.\n\nThe VPN Azure hostname is same to the hostname of the Dynamic DNS setting, but altering the domain suffix to "vpnazure.net". To change the hostname use the DynamicDnsSetHostname command.\n\nTo execute this command, you must have VPN Server administrator privileges. \nThis command cannot be run on VPN Bridge.\nYou cannot execute this command for Virtual Hubs of VPN Servers operating as a cluster.
CMD_VpnAzureSetEnable_Args VpnAzureSetEnable [yes|no]
CMD_VpnAzureSetEnable_[yes|no] Specify 'yes' to enable VPN Azure. 'no' to disable it.
CMD_VpnAzureSetEnable_PROMPT Enable VPN Azure (yes / no):
#######################################################
# #
# Management commands for VPN Client are listed below #
# #
#######################################################
# VersionGet command
CMD_VersionGet Get Version Information of VPN Client Service
CMD_VersionGet_Help Use this to get the version information of the currently managed VPN Client Service program.
CMD_VersionGet_Args VersionGet
CMD_VersionGet_1 Product Name
CMD_VersionGet_2 Version Information
CMD_VersionGet_3 Build Information
CMD_VersionGet_4 Process ID
CMD_VersionGet_5 OS Type
# PasswordSet command
CMD_PasswordSet Set the password to connect to the VPN Client service.
CMD_PasswordSet_Help You can make it mandatory to input a password for occasions when the Command Line Management Utility and the VPN Client Manager connect to a VPN Client service to control it. You can use this command to set the password that must be input. \nYou can also make it mandatory for this password to be input when doing remote operations (from a computer that is not localhost)
CMD_PasswordSet_Args PasswordSet [password] [/REMOTEONLY:yes|no]
CMD_PasswordSet_[password] Specify the password you wish to set. You can delete the password setting by specifying "none".
CMD_PasswordSet_REMOTEONLY Specify "yes" to only require the password to be input when operation is done remotely (from a computer that is not localhost). This stops the password being required when the connection is from localhost. When this parameter is omitted, it will be regarded as "no".
# PasswordGet command
CMD_PasswordGet Get Password Setting to Connect to VPN Client Service
CMD_PasswordGet_Help Use this to get the setting that determines whether to input a password for occasions when the Command Line Management Utility and the VPN Client Manager connect to a VPN Client service to control it. \nIn the case when a password is requested, it also gets the setting that determines whether this password is only requested when operation is performed remotely (from a computer that is not localhost).
CMD_PasswordGet_Args PasswordGet
CMD_PasswordGet_1 Set Password
CMD_PasswordGet_2 Request Password for Remote Operation Only
# CertList command
CMD_CertList Get List of Trusted CA Certificates
CMD_CertList_Help Here you can manage the list of certificate authority certificates that are trusted by VPN client. You can use the registered CA certificate list to verify server certificates when connecting to VPN Servers.
CMD_CertList_Args CertList
# CertAdd command
CMD_CertAdd Add Trusted CA Certificate
CMD_CertAdd_Help Use this to add a new certificate to a list of CA certificates trusted by the VPN Client. You can use the registered CA certificate list to verify server certificates when connecting to VPN Servers. \nTo get a list of the current certificates you can use the CertList command. \nThe certificate you add must be saved in the X.509 file format.
CMD_CertAdd_Args CertAdd [path]
CMD_CertAdd_[path] Specify the file name of the X.509 certificate to register.
# CertDelete command
CMD_CertDelete Delete Trusted CA Certificate
CMD_CertDelete_Help Use this to delete an existing certificate from a list of CA certificates trusted by the VPN Client. \nTo get a list of the current certificates you can use the CertList command.
CMD_CertDelete_Args CertDelete [id]
CMD_CertDelete_[id] Specify the ID of the certificate to delete.
# CertGet command
CMD_CertGet Get Trusted CA Certificate
CMD_CertGet_Help Use this to get an existing certificate from the list of CA certificates trusted by the VPN Client and save it as a file in X.509 format.
CMD_CertGet_Args CertGet [id] [/SAVECERT:path]
CMD_CertGet_[id] Specify the ID of the certificate to get.
CMD_CertGet_SAVECERT Specify the file name to save the certificate you obtained.
# SecureList command
CMD_SecureList Get List of Usable Smart Card Types
CMD_SecureList_Help Use this to display a list of smart cards that are supported by VPN Client. \nThe types of smart cards listed in this list have had their drivers installed on the current computer and are supported by VPN software. \r\nIf there is a type of smart card that is currently being used that does not appear in the list, it may be possible to enable use by updating the VPN software to a newer version.
CMD_SecureList_Args SecureList
# SecureSelect command
CMD_SecureSelect Select the Smart Card Type to Use
CMD_SecureSelect_Help Use this to select the type of the smart card to be used by the VPN Client. \nTo get the list of usable smart card types, use the SecureList command.
CMD_SecureSelect_Args SecureSelect [id]
CMD_SecureSelect_[id] Specify the ID of the smart card type.
CMD_SecureSelect_PROMPT_ID ID of Smart Card Type to Use
# SecureGet command
CMD_SecureGet Get ID of Smart Card Type to Use
CMD_SecureGet_Help Use this to get the ID of the smart card type that is set to be used for the current VPN Client. By viewing the results of the SecureList command based on this ID, you can get the type of the currently selected smart card. \nIf there is no smart card that is currently selected, 0 will be displayed for the ID.
CMD_SecureGet_Args SecureGet
CMD_SecureGet_Print The currently selected smart card ID is %u.
CMD_SecureGet_NoPrint Currently, a smart card is not selected.
# NicCreate command
CMD_NicCreate Create New Virtual Network Adapter
CMD_NicCreate_Help Use this to add a new Virtual Network Adapter to the system. You can give the virtual network adapter a name of your choice. \nYou can set a name that consists of alphanumeric characters for the virtual network adapter. For Windows 2000 or newer systems, this name can be up to 31 characters, but for Windows 98, 98SE and ME it can be up to 4 characters. \nIf the NicCreate command was called, a new virtual network adapter device driver will be installed on the operating system that the VPN Client is operating on. \nIn this case, depending on the operating system, a dialog box may appear to confirm if it is OK to install the device driver.
CMD_NicCreate_Args NicCreate [name]
CMD_NicCreate_[name] Specify the name of the virtual network adapter.
CMD_NicCreate_PROMPT_NAME Virtual Network Adapter Name:
# NicDelete command
CMD_NicDelete Delete Virtual Network Adapter
CMD_NicDelete_Help Use this to delete an existing virtual network adapter from the system. \nWhen you delete a virtual network adapter from the system, all the connections which are using that virtual network adapter will be disconnected. \nAlso, the Connection Settings that are set to use a virtual network adapter that has been deleted will have their settings automatically changed to use another virtual network adapter. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicDelete_Args NicDelete [name]
CMD_NicDelete_[name] Specify the name of the virtual network adapter.
# NicUpgrade command
CMD_NicUpgrade Upgrade Virtual Network Adapter Device Driver
CMD_NicUpgrade_Help If the device driver version of the existing virtual network adapter is old, then this upgrades to the latest device driver that was bundled with the currently operating VPN client. Even if a upgrade is not performed, the device driver will be reinstalled. \nIn this case, depending on the operating system, a dialog box may appear to confirm if it is OK to install the device driver. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicUpgrade_Args NicUpgrade [name]
CMD_NicUpgrade_[name] Specify the name of the virtual network adapter.
# NicGetSetting command
CMD_NicGetSetting Get Virtual Network Adapter Setting
CMD_NicGetSetting_Help Use this to get the MAC address setting of the existing virtual network adapter. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicGetSetting_Args NicGetSetting [name]
CMD_NicGetSetting_[name] Specify the name of the virtual network adapter.
CMD_NicGetSetting_1 Device Name
CMD_NicGetSetting_2 Status
CMD_NicGetSetting_3 MAC Address
CMD_NicGetSetting_4 Version
CMD_NicGetSetting_5 Driver File Name
CMD_NicGetSetting_6 GUID
# NicSetSetting command
CMD_NicSetSetting Change Virtual Network Adapter Setting
CMD_NicSetSetting_Help Use this to change the MAC address setting of the existing virtual network adapter. When this command is executed, the currently operating virtual network adapter device drivers will be restarted. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicSetSetting_Args NicSetSetting [name] [/MAC:mac]
CMD_NicSetSetting_[name] Specify the name of the virtual network adapter.
CMD_NicSetSetting_MAC Specify the MAC address you wish to set. \nSpecify a 6-byte hexadecimal string for the MAC address. \nExample: 00:AC:01:23:45:67 or 00-AC-01-23-45-67
CMD_NicSetSetting_PROMPT_MAC MAC Address to Set:
# NicEnable command
CMD_NicEnable Enable Virtual Network Adapter
CMD_NicEnable_Help Use this to enable an existing, disabled virtual network adapter. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicEnable_Args NicEnable [name]
CMD_NicEnable_[name] Specify the name of the virtual network adapter.
# NicDisable command
CMD_NicDisable Disable Virtual Network Adapter
CMD_NicDisable_Help Use this to disable an existing, enabled virtual network adapter. \nThis command can be used when VPN Client is operating on Windows 2000 or newer operating systems.
CMD_NicDisable_Args NicDisable [name]
CMD_NicDisable_[name] Specify the name of the virtual network adapter.
# NicList command
CMD_NicList Get List of Virtual Network Adapters
CMD_NicList_Help This allows you to get a list of virtual network adapters registered on the current system.
CMD_NicList_Args NicList
# AccountList command
CMD_AccountList Get List of VPN Connection Settings
CMD_AccountList_Help Use this to get a list of VPN Connection Settings registered on the VPN Client.
CMD_AccountList_Args AccountList
# AccountCreate command
CMD_AccountCreate Create New VPN Connection Setting
CMD_AccountCreate_Help Use this to create a new VPN Connection Setting on the VPN Client. \nTo create a VPN Connection Setting, in addition to specifying the VPN Connection Setting name and destination server as initial parameters and the destination virtual Hub, and user name, you must also specify the name of the virtual network adapter to use. When a new VPN Connection Setting is created, the type of user authentication is initially set as Anonymous Authentication and the proxy server setting and the verification options of the server certificate is not set. To change these settings and other advanced settings after the VPN Connection Setting has been created, use the other commands that begin with the name "Account".
CMD_AccountCreate_Args AccountCreate [name] [/SERVER:hostname:port] [/HUB:hubname] [/USERNAME:username] [/NICNAME:nicname]
CMD_AccountCreate_[name] Specify the name of the VPN Connection Setting to create.
CMD_AccountCreate_SERVER Specify the host name and port number of the destination VPN Server using the format [host name:port number]. You can also specify by IP address.
CMD_AccountCreate_HUB Specify the Virtual Hub on the destination VPN Server.
CMD_AccountCreate_USERNAME Specify the user name to use for user authentication when connecting to the destination VPN Server.
CMD_AccountCreate_NICNAME Specify the virtual network adapter to use to connect.
CMD_AccountCreate_Prompt_Name Name of VPN Connection Setting:
CMD_AccountCreate_Prompt_Server Destination VPN Server Host Name and Port Number:
CMD_AccountCreate_Prompt_Hub Destination Virtual Hub Name:
CMD_AccountCreate_Prompt_Username Connecting User Name:
CMD_AccountCreate_Prompt_Nicname Used Virtual Network Adapter Name:
# AccountSet command
CMD_AccountSet Set the VPN Connection Setting Connection Destination
CMD_AccountSet_Help Use this to set, for the VPN Connection Setting registered on the VPN Client, the destination VPN Server host name and port number, Virtual Hub name, user name used for connection and virtual network adapter name to use.
CMD_AccountSet_Args AccountSet [name] [/SERVER:hostname:port] [/HUB:hubname]
CMD_AccountSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountSet_SERVER Specify the host name and port number of the destination VPN Server using the format "host name:port number". You can also specify by IP address.
CMD_AccountSet_HUB Specify the Virtual Hub on the destination VPN Server.
# AccountGet command
CMD_AccountGet Get Setting of VPN Connection Setting
CMD_AccountGet_Help Use this to get the VPN Connection Setting contents of a VPN Connection Setting registered on the VPN Client. \nTo change the VPN Connection Setting contents of the VPN Connection Setting, use the other commands that begin with the name "Account" after creating the VPN Connection Setting.
CMD_AccountGet_Args AccountGet [name]
CMD_AccountGet_[name] Specify the name of the VPN Connection Setting whose setting you want to get.
# AccountDelete command
CMD_AccountDelete Delete VPN Connection Setting
CMD_AccountDelete_Help Use this to delete VPN Connection Setting that is registered on the VPN Client. If the specified VPN Connection Setting has a status of online, the connections will be automatically disconnected and then the VPN Connection Setting will be deleted.
CMD_AccountDelete_Args AccountDelete [name]
CMD_AccountDelete_[name] Specify the name of the VPN Connection Setting to delete.
# AccountUsernameSet command
CMD_AccountUsernameSet Set User Name of User to Use Connection of VPN Connection Setting
CMD_AccountUsernameSet_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to the VPN Server, use this to specify the user name required for user authentication. \nIn some cases it is necessary to specify the type of user authentication and specify the required parameters. To change this information you can use commands such as AccountAnonymousSet, AccountPasswordSet, AccountCertSet and AccountSecureCertSet.
CMD_AccountUsernameSet_Args AccountUsernameSet [name] [/USERNAME:username]
CMD_AccountUsernameSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountUsernameSet_USERNAME Specify the user name required for user authentication when the VPN Connection Setting connects to the VPN Server.
CMD_AccountUsername_Notice The auth type for this VPN Connection Setting is currently set as password authentication. After changing the user name, you must use the AccountPasswordSet command to reset the password.
# AccountAnonymousSet command
CMD_AccountAnonymousSet Set User Authentication Type of VPN Connection Setting to Anonymous Authentication
CMD_AccountAnonymousSet_Help Use this to set the user auth type to [Anonymous Authentication] for when a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to the VPN Server.
CMD_AccountAnonymousSet_Args AccountAnonymousSet [name]
CMD_AccountAnonymousSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountPasswordSet command
CMD_AccountPasswordSet Set User Authentication Type of VPN Connection Setting to Password Authentication
CMD_AccountPasswordSet_Help Use this to set the user auth type to Password Authentication for when a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to the VPN Server. Specify Standard Password Authentication and RADIUS or NT Domain Authentication as the password authentication type.
CMD_AccountPasswordSet_Args AccountPasswordSet [name] [/PASSWORD:password] [/TYPE:standard|radius]
CMD_AccountPasswordSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountPasswordSet_PASSWORD Specify the password to use for password authentication. If this is not specified, a prompt will appear to input the password.
CMD_AccountPasswordSet_TYPE Specify either "standard" (Standard Password Authentication) or "radius" (RADIUS or NT Domain Authentication) as the password authentication type.
CMD_AccountPasswordSet_Prompt_Type Specify standard or radius:
CMD_AccountPasswordSet_Type_Invalid The standard or radius specification is invalid.
# AccountCertSet command
CMD_AccountCertSet Set User Authentication Type of VPN Connection Setting to Client Certificate Authentication
CMD_AccountCertSet_Help Use this to set the user auth type to Client Certificate Authentication for when a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to the VPN Server. For this certificate, you must specify a certificate file in the X.509 format and a private key file that is Base 64 encoded.
CMD_AccountCertSet_Args AccountCertSet [name] [/LOADCERT:cert] [/LOADKEY:key]
CMD_AccountCertSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountCertSet_LOADCERT Specify the X.509 format certificate file to provide for certificate authentication.
CMD_AccountCertSet_LOADKEY Specify the Base-64-encoded private key file name for the certificate.
# AccountCertGet command
CMD_AccountCertGet Get Client Certificate to Use for Cascade Connection
CMD_AccountCertGet_Help When a VPN Connection Setting registered on VPN Client is specified and that VPN Connection Setting uses client certificate authentication, use this to get the certificate that is provided as the client certificate and save the certificate file in X.509 format.
CMD_AccountCertGet_Args AccountCertGet [name] [/SAVECERT:cert]
CMD_AccountCertGet_[name] Specify the name of the VPN Connection Setting whose setting you want to get.
CMD_AccountCertGet_SAVECERT Specify the file name to save the certificate you obtained in X.509 format.
# AccountEncryptEnable command
CMD_AccountEncryptEnable Enable Encryption when Communicating by VPN Connection Setting
CMD_AccountEncryptEnable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers to be encrypted by SSL. \nNormally communication between VPN Servers is encrypted by SSL to prevent eavesdropping of information and fraud. You can also disable encryption. When encryption is disabled, the communication throughput improves but the communication data flows over the network in plain text.
CMD_AccountEncryptEnable_Args AccountEncryptEnable [name]
CMD_AccountEncryptEnable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountEncryptDisable command
CMD_AccountEncryptDisable Disable Encryption when Communicating by VPN Connection Setting
CMD_AccountEncryptDisable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers not to be encrypted. \nNormally communication between VPN Servers is encrypted by SSL to prevent eavesdropping of information and fraud. You can also disable encryption. When encryption is disabled, the communication throughput improves but the communication data flows over the network in plain text.
CMD_AccountEncryptDisable_Args AccountEncryptDisable [name]
CMD_AccountEncryptDisable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountCompressEnable command
CMD_AccountCompressEnable Enable Data Compression when Communicating by VPN Connection Setting
CMD_AccountCompressEnable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers to be compressed. \nIt is possible to achieve a maximum of 80% compression. Compression however places higher loads on the CPU of both the client and server machines. When the line speed is about 10 Mbps or greater, compression can lower throughput, but sometimes it can have the opposite effect.
CMD_AccountCompressEnable_Args AccountCompressEnable [name]
CMD_AccountCompressEnable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountCompressDisable command
CMD_AccountCompressDisable Disable Data Compression when Communicating by VPN Connection Setting
CMD_AccountCompressDisable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting is used for communication between VPN Servers via a VPN connection, use this to set the communication contents between the VPN Servers not to be compressed.
CMD_AccountCompressDisable_Args AccountCompressDisable [name]
CMD_AccountCompressDisable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountProxyNone command
CMD_AccountProxyNone Specify Direct TCP/IP Connection as the Connection Method of VPN Connection Setting
CMD_AccountProxyNone_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to set Direct TCP/IP Connection as the connection method to use, in which case the connection route will not be via a proxy server.
CMD_AccountProxyNone_Args AccountProxyNone [name]
CMD_AccountProxyNone_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountProxyHttp command
CMD_AccountProxyHttp Set Connection Method of VPN Connection Setting to be via an HTTP Proxy Server
CMD_AccountProxyHttp_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to set Connect via HTTP Proxy Server as the method of connection to use, which requires the specification of the host name and port number of the HTTP Proxy server to communicate via as well as a user name and password (when required). \nThe HTTP proxy server that communication will travel via must be compatible with the CONNECT method to use HTTPS communication.
CMD_AccountProxyHttp_Args AccountProxyHttp [name] [/SERVER:hostname:port] [/USERNAME:username] [/PASSWORD:password]
CMD_AccountProxyHttp_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountProxyHttp_SERVER Specify the host name or IP address, and port number of the on-route HTTP proxy server using the format [host name:port number].
CMD_AccountProxyHttp_USERNAME When user authentication is required to connect to the on-route HTTP proxy server, specify the user name. Also, specify the /PASSWORD parameter at the same time. If the parameters /USERNAME and /PASSWORD are not specified, the user authentication data will not be set.
CMD_AccountProxyHttp_PASSWORD When user authentication is required to connect to the on-route HTTP proxy server, specify the password. Specify this together with the /USERNAME parameter.
CMD_AccountProxyHttp_Prompt_Server Proxy Server Host Name and Port Number:
# AccountProxySocks command
CMD_AccountProxySocks Set Connection Method of VPN Connection Setting to be via an SOCKS Proxy Server
CMD_AccountProxySocks_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to set Connect via SOCKS Proxy Server as the method of connection to use, which requires the specification of the host name and port number of the SOCKS Proxy server to communicate via as well as a user name and password (when required). \nThe on-route SOCKS server must be compatible with SOCKS Version 4.
CMD_AccountProxySocks_Args AccountProxySocks [name] [/SERVER:hostname:port] [/USERNAME:username] [/PASSWORD:password]
CMD_AccountProxySocks_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountProxySocks_SERVER Specify the host name or IP address, and port number of the on-route SOCKS proxy server using the format [host name:port number].
CMD_AccountProxySocks_USERNAME When user authentication is required to connect to the on-route SOCKS proxy server, specify the user name. Also, specify the /PASSWORD parameter at the same time. If the parameters /USERNAME and /PASSWORD are not specified, the user authentication data will not be set.
CMD_AccountProxySocks_PASSWORD When user authentication is required to connect to the on-route SOCKS proxy server, specify the password. Specify this together with the /USERNAME parameter.
# AccountServerCertEnable command
CMD_AccountServerCertEnable Enable VPN Connection Setting Server Certificate Verification Option
CMD_AccountServerCertEnable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to enable the option to check whether the SSL certificate provided by the destination VPN Server can be trusted. \nIf this option is enabled, we recommend that you either use the AccountServerCertSet command to save the connection destination server SSL certificate beforehand in the VPN Connection Setting settings beforehand, or use the CertAdd command etc. to register a root certificate containing the signed server SSL certificate in the list of Virtual Hub trusted CA certificates. If it is not registered, a confirmation message sometimes is displayed on the initial connection. \nIf the certificate of the connected VPN Server cannot be trusted under the condition where the option to verify server certificates has been enabled for the VPN Connection Setting, the connection will be promptly cancelled and continual reattempts at connection will be made.
CMD_AccountServerCertEnable_Args AccountServerCertEnable [name]
CMD_AccountServerCertEnable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountServerCertDisable command
CMD_AccountServerCertDisable Disable VPN Connection Setting Server Certificate Verification Option
CMD_AccountServerCertDisable_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to disable the option to check whether the SSL certificate provided by the destination VPN Server can be trusted.
CMD_AccountServerCertDisable_Args AccountServerCertDisable [name]
CMD_AccountServerCertDisable_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountServerCertSet command
CMD_AccountServerCertSet Set Server Individual Certificate for VPN Connection Setting
CMD_AccountServerCertSet_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to a VPN Server, use this to register the same certificate as the SSL certificate provided by the destination VPN Server. \nIf the option to verify server certificates for VPN Connection Settings is enabled, you must either use this command to save the connection destination server SSL certificate beforehand in the VPN Connection Setting settings beforehand, or use the CAAdd command etc. to register a root certificate containing the signed server SSL certificate in the list of Virtual Hub trusted CA certificates. \nIf the certificate of the connected VPN Server cannot be trusted under the condition where the option to verify server certificates has been enabled for the VPN Connection Setting, the connection will be promptly cancelled and continual reattempts at connection will be made.
CMD_AccountServerCertSet_Args AccountServerCertSet [name] [/LOADCERT:cert]
CMD_AccountServerCertSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountServerCertSet_LOADCERT Specify X.509 format certificate file name that the server individual certificate which you wish to set is saved under.
# AccountServerCertDelete command
CMD_AccountServerCertDelete Delete Server Individual Certificate for VPN Connection Setting
CMD_AccountServerCertDelete_Help When a VPN Connection Setting registered on the VPN Client is specified and a server individual certificate is registered for that VPN Connection Setting, use this to delete that certificate.
CMD_AccountServerCertDelete_Args AccountServerCertDelete [name]
CMD_AccountServerCertDelete_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountServerCertGet command
CMD_AccountServerCertGet Get Server Individual Certificate for VPN Connection Setting
CMD_AccountServerCertGet_Help When a VPN Connection Setting is specified and a server Individual certificate is registered for that VPN Connection Setting, use this to get that certificate and save it as an X.509 format certificate file.
CMD_AccountServerCertGet_Args AccountServerCertGet [name] [/SAVECERT:path]
CMD_AccountServerCertGet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountServerCertGet_SAVECERT Specify the certificate file name to save the server individual certificate in X.509 format.
# AccountDetailSet command
CMD_AccountDetailSet Set Advanced Settings for VPN Connection Setting
CMD_AccountDetailSet_Help Use this to customize the VPN protocol communication settings used when a VPN Connection Setting registered on a VPN Client is specified and that VPN Connection Setting connects to the VPN Server.
CMD_AccountDetailSet_Args AccountDetailSet [name] [/MAXTCP:max_connection] [/INTERVAL:additional_interval] [/TTL:disconnect_span] [/HALF:yes|no] [/BRIDGE:yes|no] [/MONITOR:yes|no] [/NOTRACK:yes|no] [/NOQOS:yes|no]
CMD_AccountDetailSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountDetailSet_MAXTCP Specify, using an integer in the range 1 to 32, the number of TCP connections to be used for VPN communication. By using data transmission by multiple TCP connections for VPN communication sessions with VPN Servers it is sometimes possible to increase communication speed. \nNote: We recommend about 8 lines when the connection lines to the server are fast, and 1 line when using a slow connection such as dialup.
CMD_AccountDetailSet_INTERVAL When communicating by VPN by establishing multiple TCP connections, specify in seconds, the establishing interval for each TCP connection. The standard value is 1 second.
CMD_AccountDetailSet_TTL When specifying connection life of each TCP connection specify in seconds the keep-alive time from establishing a TCP connection until disconnection. If 0 is specified, keep-alive will not be set.
CMD_AccountDetailSet_HALF Specify "yes" when enabling half duplex mode. When using two or more TCP connections for VPN communication, it is possible to use Half Duplex Mode. By enabling half duplex mode it is possible to automatically fix data transmission direction as half and half for each TCP connection. In the case where a VPN using 8 TCP connections is established, for example, when half-duplex is enabled, communication can be fixes so that 4 TCP connections are dedicated to the upload direction and the other 4 connections are dedicated to the download direction.
CMD_AccountDetailSet_BRIDGE Specify "yes" when connecting to the VPN Server using Bridge / Router Mode. When using Bridge / Router Mode to connect, it is possible to provide bridging or routing to another network on the side of the virtual network adapter of the VPN Client. However, if the security policy of the user who is being used for connection denies the use of bridges or routing, then connection will fail.
CMD_AccountDetailSet_MONITOR Specify "yes" when connecting to the VPN Server using Monitoring Mode. When a connection is made using Monitoring Mode, you can receive all packets that flow through the Virtual Hub. However, if the security policy of the user who is being used for connection does not allow Monitoring Mode, then connection will fail.
CMD_AccountDetailSet_NOTRACK Specify "yes" will disable the adjustments of routing table. Normally "no" is specified.
CMD_AccountDetailSet_NOQOS Specify "yes" when disabling VoIP / QoS functions. Normally "no" is specified.
CMD_AccountDetailSet_Eval_MaxTcp Specify an integer in the range 1 to 32 for the number of TCP connections.
CMD_AccountDetailSet_Eval_Interval Set at least 1 second for the interval to establish a TCP connection.
CMD_AccountDetailSet_Prompt_MaxTcp Number of TCP Connections to Use in VPN Communication:
CMD_AccountDetailSet_Prompt_Interval Interval between Establishing Each TCP Connection:
CMD_AccountDetailSet_Prompt_TTL Connection Life of Each TCP Connection (0 for no keep-alive):
CMD_AccountDetailSet_Prompt_HALF Enable Half-Duplex Mode (yes/no):
CMD_AccountDetailSet_Prompt_BRIDGE Enable Bridge / Router Mode (yes/no):
CMD_AccountDetailSet_Prompt_MONITOR Enable Monitoring Mode (yes/no):
CMD_AccountDetailSet_Prompt_NOTRACK Disable Adjustment of Routing Table (yes/no):
CMD_AccountDetailSet_Prompt_NOQOS Disable QoS Control Function (yes/no):
# AccountRename command
CMD_AccountRename Change VPN Connection Setting Name
CMD_AccountRename_Help Use this to specify a VPN Connection Setting registered on the VPN Client and change its name.
CMD_AccountRename_Args AccountRename [name] [/NEW:new_name]
CMD_AccountRename_[name] Specify the current name of the VPN Connection Setting whose name you want to change.
CMD_AccountRename_NEW Specify the new name after the change.
CMD_AccountRename_PROMPT_OLD Current Name:
CMD_AccountRename_PROMPT_NEW New Name:
# AccountConnect command
CMD_AccountConnect Start Connection to VPN Server using VPN Connection Setting
CMD_AccountConnect_Help Use this to specify a VPN Connection Setting registered on the VPN Client and start a connection to the VPN Server using that VPN Connection Setting. A VPN Connection Setting that has a connecting status or a connected status will continue to be connected to the VPN Server, or continue to attempt to connect to the VPN Server until the AccountDisconnect command is used to disconnect the connection (Note however, if the AccountRetrySet command is used to specify the number of retries, connection attempts will be aborted when the specified value is reached.)
CMD_AccountConnect_Args AccountConnect [name]
CMD_AccountConnect_[name] Specify the name of the VPN Connection Setting whose connection you want to start.
# AccountDisconnect command
CMD_AccountDisconnect Disconnect VPN Connection Setting During Connection
CMD_AccountDisconnect_Help Use this to specify a VPN Connection Setting that is registered on the VPN Client and that is either in the condition of connecting or is connected, and immediately disconnect it.
CMD_AccountDisconnect_Args AccountDisconnect [name]
CMD_AccountDisconnect_[name] Specify the name of the VPN Connection Setting to disconnect.
# AccountStatusGet command
CMD_AccountStatusGet Get Current VPN Connection Setting Status
CMD_AccountStatusGet_Help When a VPN Connection Setting that is registered on the VPN Client is specified and that VPN Connection Setting is currently connected, use this to get its connection status and other information.
CMD_AccountStatusGet_Args AccountStatusGet [name]
CMD_AccountStatusGet_[name] Specify the name of the VPN Connection Setting whose information you want to get.
# AccountNicSet command
CMD_AccountNicSet Set Virtual Network Adapter for VPN Connection Setting to Use
CMD_AccountNicSet_Help Use this to change the Virtual Network Adapter name that the existing VPN Connection Settings registered on the VPN Client will use for the connection to a VPN Server.
CMD_AccountNicSet_Args AccountNicSet [name] [/NICNAME:nicname]
CMD_AccountNicSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountNicSet_NICNAME Specify the Virtual Network Adapter name to use when connecting to the VPN Server.
# AccountStatusShow command
CMD_AccountStatusShow Set Connection Status and Error Screen to Display when Connecting to VPN Server
CMD_AccountStatusShow_Help When a communication setting is registered on the VPN Client and that communication setting is being used to connect to the VPN Server, use this to set the connection status and error screen to be displayed on the computer display.
CMD_AccountStatusShow_Args AccountStatusShow [name]
CMD_AccountStatusShow_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountStatusHide command
CMD_AccountStatusHide Set Connection Status and Error Screen to be Hidden when Connecting to VPN Server
CMD_AccountStatusHide_Help When a communication setting is registered on the VPN Client and that communication setting is being used to connect to the VPN Server, use this to set the connection status and error screen to not be displayed on the computer display.
CMD_AccountStatusHide_Args AccountStatusHide [name]
CMD_AccountStatusHide_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountSecureCertSet command
CMD_AccountSecureCertSet Set User Authentication Type of VPN Connection Setting to Smart Card Authentication
CMD_AccountSecureCertSet_Help Use this to set the user auth type to Smart Card Authentication for when a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting connects to the VPN Server. Also, you must specify the names of the certificate object and the private key object stored on the smart card.
CMD_AccountSecureCertSet_Args AccountSecureCertSet [name] [/CERTNAME:cert] [/KEYNAME:key]
CMD_AccountSecureCertSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountSecureCertSet_CERTNAME Specify the name of the certificate object stored on the smart card.
CMD_AccountSecureCertSet_KEYNAME Specify the name of the private key object stored on the smart card. The private key must be compatible with the certificate specified by /CERTNAME.
CMD_AccountSecureCertSet_PROMPT_CERTNAME Name of Certificate Object on Smart Card:
CMD_AccountSecureCertSet_PROMPT_KEYNAME Name of Private Key Object on Smart Card:
# AccountRetrySet コマンド
CMD_AccountRetrySet Set Interval between Connection Retries for Connection Failures or Disconnections of VPN Connection Setting
CMD_AccountRetrySet_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting attempts to connect to a VPN Server, use this to specify the interval to wait between connection attempts and the limit of how many times to retry connecting when communication with the VPN Server has been disconnected or when the connection process failed. \nIf the user authentication type is Smart Card Authentication, no connection retry will be performed regardless of the Number of Connection Attempts setting.
CMD_AccountRetrySet_Args AccountRetrySet [name] [/NUM:num_retry] [/INTERVAL:retry_interval]
CMD_AccountRetrySet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
CMD_AccountRetrySet_NUM Specify the number of times to make consecutive retries. By specifying "999", there will be limitless attempts to reconection (always connect). By specifying "0", not attempt at reconnection will be made.
CMD_AccountRetrySet_INTERVAL When attempting a reconnection, this sets how many seconds to wait after the previous disconnection or connection failure before starting the reconnection process.
CMD_AccountRetrySet_PROMPT_NUM Reconection Count ("999" is unlimited):
CMD_AccountRetrySet_PROMPY_INTERVAL Reconection Interval (Seconds):
CMD_AccountRetrySet_EVAL_INTERVAL Specify 5 seconds or more for the retries interval.
# AccountStartupSet command
CMD_AccountStartupSet Set VPN Connection Setting as Startup Connection
CMD_AccountStartupSet_Help Use this to specify a VPN Connection Setting registered on the VPN Client and set it as the startup connection. The VPN Connection Setting that is set as the startup connection will automatically start the connection process when the VPN Client service starts.
CMD_AccountStartupSet_Args AccountStartupSet [name]
CMD_AccountStartupSet_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountStartupRemove command
CMD_AccountStartupRemove Remove Startup Connection of VPN Connection Setting
CMD_AccountStartupRemove_Help When a VPN Connection Setting registered on the VPN Client is specified and that VPN Connection Setting is currently set as a startup connection, use this to delete the startup connection.
CMD_AccountStartupRemove_Args AccountStartupRemove [name]
CMD_AccountStartupRemove_[name] Specify the name of the VPN Connection Setting whose setting you want to change.
# AccountExport command
CMD_AccountExport Export VPN Connection Setting
CMD_AccountExport_Help Use this to specify a VPN Connection Setting registered on the VPN Client and export its contents as a text file. By exporting a VPN Connection Setting file, and then later, importing it, you can duplicate the contents of a VPN Connection Setting. Also, because it gets saved as a text file, you can edit the contents using a conventional text editor. \nThe export destination file is saved as a UTF-8 format text file. Also, it is convenient to save the file name with the file extension .vpn as this file extension is associated to the Windows Edition VPN Client Manager.
CMD_AccountExport_Args AccountExport [name] [/SAVEPATH:savepath]
CMD_AccountExport_[name] Specify the name of the VPN Connection Setting to export.
CMD_AccountExport_SAVEPATH Specify a file name for the save destination.
CMD_AccountExport_PROMPT_SAVEPATH Save Destination File Name (recommended extension: vpn):
# AccountImport command
CMD_AccountImport Import VPN Connection Setting
CMD_AccountImport_Help Use this to import the VPN Connection Setting file that has been exported by the AccountExport command and add it to the VPN Client.
CMD_AccountImport_Args AccountImport [path]
CMD_AccountImport_[path] Specify the file name of the import source.
CMD_AccountImport_PROMPT_PATH Import Source File Name:
CMD_AccountImport_FAILED_PARSE Unable to correctly parse the specified file. Please check it if the file was exported correctly.
CMD_AccountImport_OK The VPN Connection Setting "%s" has been imported.
# RemoteEnable command
CMD_RemoteEnable Allow Remote Management of VPN Client Service
CMD_RemoteEnable_Help Use this to allow management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager.
CMD_RemoteEnable_Args RemoteEnable
# RemoteDisable command
CMD_RemoteDisable Deny Remote Management of VPN Client Service
CMD_RemoteDisable_Help Use this to deny management of a VPN Client service from a remote computer that is not localhost, via a remote connection by Command Line Management Utility or VPN Client Manager.
CMD_RemoteDisable_Args RemoteDisable
###################################################
# #
# Commands for VPN Tools are listed below #
# #
###################################################
# MakeCert command
CMD_MakeCert Create New X.509 Certificate and Private Key (1024 bit)
CMD_MakeCert_Help Use this to create a new X.509 certificate and private key and save it as a file. \nThe algorithm used to create the public key and private key of the certificate is RSA 1024 bit. \nYou can choose to create a root certificate (self-signed certificate) or a certificate signed by another certificate. To create a certificate that is signed by another certificate, you require a private key file (base 64 encoded) that is compatible with the certificate that uses the signature (X.509 format file). \n\nWhen creating a certificate, you can specify the following: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number, and Expiration Date. \nThe created certificate will be saved as an X.509 format file and the private key file will be saved in a Base 64 encoded RSA 1024 bit format file. \n\nThe MakeCert command is a tool that provides the most rudimentary function for creating certificates. If you want to create a more substantial certificate, we recommend that you use either free software such as OpenSSL, or commercial CA (certificate authority) software. \n\nNote: This command can be called from the SoftEther VPN Command Line Management Utility. You can also execute this command while connected to the current VPN Server or VPN Client in Administration Mode but, what actually performs the RSA computation, generates the certificate data and saves it to file is the computer on which the command is running, and all this is executed in a context that has absolutely no relationship to the computer that is the destination of the Administration Mode connection.
CMD_MakeCert_Args MakeCert [/CN:cn] [/O:o] [/OU:ou] [/C:c] [/ST:st] [/L:l] [/SERIAL:serial] [/EXPIRES:expires] [/SIGNCERT:signcert] [/SIGNKEY:signkey] [/SAVECERT:savecert] [/SAVEKEY:savekey]
CMD_MakeCert_CN Specify the Name (CN) item of the certificate to create. You can specify "none".
CMD_MakeCert_O Specify the Organization (O) item of the certificate to create. You can specify "none".
CMD_MakeCert_OU Specify the Organization Unit (OU) item of the certificate to create. You can specify "none".
CMD_MakeCert_C Specify the Country (C) item of the certificate to create. You can specify "none".
CMD_MakeCert_ST Specify the State (ST) item of the certificate to create. You can specify "none".
CMD_MakeCert_L Specify the Locale (L) item of the certificate to create. You can specify "none".
CMD_MakeCert_SERIAL Specify the Serial Number item of the certificate to create. Specify using hexadecimal values. You can specify "none".
CMD_MakeCert_EXPIRES Specify the Expiration Date item of the certificate to create. If you specify "none" or "0", 3650 days (approx. 10 years) will be used. You can specify a maximum of 10950 days (about 30 years).
CMD_MakeCert_SIGNCERT For cases when the certificate to be created is signed by an existing certificate, specify the X.509 format certificate file name to be used to sign the signature. When this parameter is omitted, such signature signing is not performed and the new certificate is created as a root certificate.
CMD_MakeCert_SIGNKEY Specify a private key (RSA, base-64 encoded) that is compatible with the certificate specified by /SIGNCERT.
CMD_MakeCert_SAVECERT Specify the file name to save the certificate you created. The certificate is saved as an X.509 file that includes a public key that is RSA format 1024 bit.
CMD_MakeCert_SAVEKEY Specify the file name to save private key that is compatible with the certificate you created. The private key will be saved as an RSA-format 1024-bit private key file.
CMD_MakeCert_PROMPT_CN Name of Certificate to Create (CN):
CMD_MakeCert_PROMPT_O Organization of Certificate to Create (O):
CMD_MakeCert_PROMPT_OU Organization Unit of Certificate to Create (OU):
CMD_MakeCert_PROMPT_C Country of Certificate to Create (C):
CMD_MakeCert_PROMPT_ST State of Certificate to Create (ST):
CMD_MakeCert_PROMPT_L Locale of Certificate to Create (L):
CMD_MakeCert_PROMPT_SERIAL Serial Number of Certificate to Create (Hexadecimal):
CMD_MakeCert_PROMPT_EXPIRES Expiration Date of Certificate to Create (Days):
CMD_MakeCert_PROMPT_SAVECERT File Name to Save Certificate to Create:
CMD_MakeCert_PROMPT_SAVEKEY File Name to Save Private Key to Create:
CMD_MakeCert_EVAL_EXPIRES Specify the Expiration Date within the range %u to %u.
CMD_MakeCert_ERROR_SIGNKEY Either it is not possible to read the certificate or private key specified by /SIGNCERT and /SIGNKEY, or they were an invalid combination.
CMD_MakeCert_ERROR_GEN_FAILED Creation of certificate and private key failed.
# MakeCert2048 command
CMD_MakeCert2048 Create New X.509 Certificate and Private Key (2048 bit)
CMD_MakeCert2048_Help Use this to create a new X.509 certificate and private key and save it as a file. \nThe algorithm used to create the public key and private key of the certificate is RSA 2048 bit. \nYou can choose to create a root certificate (self-signed certificate) or a certificate signed by another certificate. To create a certificate that is signed by another certificate, you require a private key file (base 64 encoded) that is compatible with the certificate that uses the signature (X.509 format file). \n\nWhen creating a certificate, you can specify the following: Name (CN), Organization (O), Organization Unit (OU), Country (C), State (ST), Locale (L), Serial Number, and Expiration Date. \nThe created certificate will be saved as an X.509 format file and the private key file will be saved in a Base 64 encoded RSA 2048 bit format file. \n\nThe MakeCert command is a tool that provides the most rudimentary function for creating certificates. If you want to create a more substantial certificate, we recommend that you use either free software such as OpenSSL, or commercial CA (certificate authority) software. \n\nNote: This command can be called from the SoftEther VPN Command Line Management Utility. You can also execute this command while connected to the current VPN Server or VPN Client in Administration Mode but, what actually performs the RSA computation, generates the certificate data and saves it to file is the computer on which the command is running, and all this is executed in a context that has absolutely no relationship to the computer that is the destination of the Administration Mode connection.
CMD_MakeCert2048_Args MakeCert2048 [/CN:cn] [/O:o] [/OU:ou] [/C:c] [/ST:st] [/L:l] [/SERIAL:serial] [/EXPIRES:expires] [/SIGNCERT:signcert] [/SIGNKEY:signkey] [/SAVECERT:savecert] [/SAVEKEY:savekey]
CMD_MakeCert2048_CN Specify the Name (CN) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_O Specify the Organization (O) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_OU Specify the Organization Unit (OU) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_C Specify the Country (C) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_ST Specify the State (ST) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_L Specify the Locale (L) item of the certificate to create. You can specify "none".
CMD_MakeCert2048_SERIAL Specify the Serial Number item of the certificate to create. Specify using hexadecimal values. You can specify "none".
CMD_MakeCert2048_EXPIRES Specify the Expiration Date item of the certificate to create. If you specify "none" or "0", 3650 days (approx. 10 years) will be used. You can specify a maximum of 10950 days (about 30 years).
CMD_MakeCert2048_SIGNCERT For cases when the certificate to be created is signed by an existing certificate, specify the X.509 format certificate file name to be used to sign the signature. When this parameter is omitted, such signature signing is not performed and the new certificate is created as a root certificate.
CMD_MakeCert2048_SIGNKEY Specify a private key (RSA, base-64 encoded) that is compatible with the certificate specified by /SIGNCERT.
CMD_MakeCert2048_SAVECERT Specify the file name to save the certificate you created. The certificate is saved as an X.509 file that includes a public key that is RSA format 2048 bit.
CMD_MakeCert2048_SAVEKEY Specify the file name to save private key that is compatible with the certificate you created. The private key will be saved as an RSA-format 2048-bit private key file.
# TrafficClient command
CMD_TrafficClient Run Network Traffic Speed Test Tool in Client Mode
CMD_TrafficClient_Help Use this to execute the communication throughput measurement tool's client program. \nTwo commands, TrafficClient and TrafficServer, are used for the communication throughput measurement tool to enable the measurement of communication throughput that can be transferred between two computers connected by IP network. The TrafficServer command is used first on another computer which puts the communication throughput measurement tool server in a listening condition. Then the TrafficClient command is used to connect to that server by specifying its host name or IP address and port number, which makes it possible to measure the communication speed. \nMeasurement of the communication speed is carried out by concurrently establishing multiple TCP connections and calculating the actual number of bits of data that can be transferred within a specified time based on the respective results of transferring the maximum stream data on each connection and then using that to calculate the average value (bps) of communication throughput. Normally when there is one TCP connection, it is common to only be able to achieve communication speeds slower than the actual net throughput because of limitations related to the TCP algorithm. We therefore recommend the establishment of multiple concurrent TCP connections when measuring communication results. Because the throughput that is measured using this measurement method is calculated from the bit length of the data that arrives on the receiver side as a stream by TCP, the packet loss that occurs during transfer and the packets with corrupted data are not included in the packets that actually arrive, which means it is possible to calculate a genuine value that is close to the maximum possible communication bandwidth of the network. \nUsing the measurement results, i.e. the stream size transferred by TCP, the approximate value of data volume that actually passed through the network is calculated and this is divided by time to calculate the bits per sec (bps). The calculation assumes the type of the physical network is Ethernet (IEEE802.3) and the MAC frame payload size is 1,500 bytes (TCP MSS is 1,460 bytes). By specifying the /RAW option, the calculation will not make corrections for the TCP/IP header and MAC header data volume. \n\nNote: This command can be called from the SoftEther VPN Command Line Management Utility. You can also execute this command while connected to the current VPN Server or VPN Client in Administration Mode but, what actually conducts communication and measures the throughput is the computer on which the command is running, and all this is executed in a context that has absolutely no relationship to the computer that is the destination of the Administration Mode connection.
CMD_TrafficClient_Args TrafficClient [host:port] [/NUMTCP:numtcp] [/TYPE:download|upload|full] [/SPAN:span] [/DOUBLE:yes|no] [/RAW:yes|no]
CMD_TrafficClient_[host:port] Specify the host name or IP address and port number that the communication throughput measurement tool server (TrafficServer) is listening for. If the port number is omitted, 9821 will be used.
CMD_TrafficClient_NUMTCP Specify the number of TCP connections to be concurrently established between the client and the server for data transfer. If omitted, 32 will be used.
CMD_TrafficClient_TYPE Specify the direction of data flow when throughput measurement is performed. Specify one of the following options: "download", "upload" or "full". By specifying "download" the data will be transmitted from the server side to the client side. By specifying "upload" the data will be transmitted from the client side to the server side. By specifying "full", the data will be transferred in both directions. When "full" is specified, the NUMTCP value must be an even number of two or more (half the number will be used for concurrent TCP connections in the download direction and the other half will be used in the upload direction). If this parameter is omitted, "full" will be used.
CMD_TrafficClient_SPAN Specify, using seconds, the time span to conduct data transfer for the measurement of throughput. If this parameter is omitted, "15" will be used.
CMD_TrafficClient_DOUBLE When "yes" is specified, the throughput of the measured result will be doubled and then displayed. This option is used for cases when a network device etc. is somewhere on the data route and the total throughput capability that is input and output by this network device is being measured.
CMD_TrafficClient_RAW By specifying "yes", the calculation will not make corrections for the TCP/IP header and MAC header data volume.
CMD_TrafficClient_EVAL_NUMTCP Specify a value of 32 or less for the number of TCP connections.
CMD_TrafficClient_PROMPT_HOST Measurement Server Name and Port Number (9821 if omitted):
CMD_TrafficClient_ERROR_NUMTCP When the data direction is "full" (both directions), you must specify an even value for the number of TCP connections (/NUMTCP).
CMD_TrafficClient_ERROR_HOSTPORT The host name or port number is incorrectly specified.
# TrafficServer command
CMD_TrafficServer Run Network Traffic Speed Test Tool in Server Mode
CMD_TrafficServer_Help Use this to execute the communication throughput measurement tool's server program. \nTwo commands, TrafficClient and TrafficServer, are used for the communication throughput measurement tool to enable the measurement of communication throughput that can be transferred between two computers connected by IP network. \nTo set the TCP port of this computer to the Listen status to listen for the connection from the TrafficClient of another computer, specify the port number and start the server program using the TrafficServer command. \nYou can display more detailed information on the communication throughput measurement tool by inputting "TrafficClient ?". \n\nNote: This command can be called from the SoftEther VPN Command Line Management Utility. You can also execute this command while connected to the current VPN Server or VPN Client in Administration Mode but, what actually conducts communication and measures the throughput is the computer on which the command is running, and all this is executed in a context that has absolutely no relationship to the computer that is the destination of the Administration Mode connection.
CMD_TrafficServer_Args TrafficServer [port] [/NOHUP:yes|no]
CMD_TrafficServer_[port] Specify, using an integer, the port number at which to listen for the connection. If the specified port has been already being used by another program, or if the port cannot be opened, an error will occur.
CMD_TrafficServer_NOHUP When "yes" is specified, the server process never stops without regard to any input from the console. It is convenient when you want to run the TrafficServer endlessly.
# Internal message strings concerning TrafficClient / TrafficServer
TT_LISTEN_FAILED Unable to set TCP port %u to Listen status. The port may be being used by another application or this application did not have the authority to open the port.
TTS_LISTEN_STOP The port for listening has been closed.
TTS_ENTER_TO_EXIT \n----------------------------------------\nThe Network Traffic Speed Test Tool in Server Mode started. \n\nPress the Enter key to stop the server program. \n----------------------------------------\n\n
TTS_INIT Starting the server program...
TTS_LISTEN_STARTED The server program has been started. Now the IPv4 TCP port %u is set to Listen status and listening for connection from the client.
TTS_LISTEN_STARTED_V6 The IPv6 TCP Port %u is listening to accept clients.
TTS_LISTEN_FAILED_V6 Failed to open the IPv6 TCP Port %u. Another application might be using the same IPv6 TCP Port, or the IPv6 stack is not installed on the operating system.
TTS_STOP_INIT Stopping the server program...
TTS_STOP_FINISHED The stopping of the server program is complete.
TTS_ACCEPTED Connection %u: Connected from Client %S Port %u.
TTS_DISCONNECTED Connection %u (%S) has been disconnected.
TTS_DISCONNECT Connection %u (%S) has been disconnected.
TTC_INIT Starting the client program...
TTC_FREE The client program has beens terminated.
TTC_CONNECT_START The connection to server %S (port %u) will start. %u TCP connections will be connected.
TTC_CONNECT_FAILED The connection of TCP connection number %u failed.
TTC_CONNECT_NOT_SERVER Because a program other than TrafficServer is operating on the destination TCP port, traffic cannot be measured.
TTC_CONNECT_OK TCP connection number %u has been connected.
TTC_CONNECT_OK_2 \ Data transfer direction: %s
TTC_ERROR_ABORTED The TCP connection initialization with the server failed. Measurement will stop.
TTC_SUMMARY_BAR -------------------------------------------------------
TTC_SUMMARY_TITLE Network Traffic Speed Test Tool Client Setting Parameters
TTC_SUMMARY_HOST Destination Host Name
TTC_SUMMARY_PORT Destination TCP Port Number
TTC_SUMMARY_NUMTCP Number of TCP Connections to Establish
TTC_SUMMARY_TYPE Data Transfer Direction
TTC_SUMMARY_SPAN Data Transmission Time
TTC_SUMMARY_ETHER Data Correction for Ethernet Frames
TTC_SUMMARY_DOUBLE Measurement of Total Speed of Relay Device Input Output
TTC_TYPE_DOWNLOAD Download (Server to Client)
TTC_TYPE_UPLOAD Upload (Client to Server)
TTC_TYPE_FULL Full (Server < -- > Client)
TTC_SPAN_STR %.1f seconds
TTC_COMM_START \nAll connections were established and so data transfer started. \nMeasurement Start Time: %s\nScheduled Finish Time: %s\n\nMeasuring in progress. Please wait... \n(Do not use any other applications while measuring is in progress.)\n\n
TTC_COMM_END Because %.1f seconds or more have passed, the data communication will end. \n\n
TTC_COMM_USER_CANCEL Because of cancellation by user, the data communication will end. \n\n
TTC_COMM_DISCONNECTED The TCP connection %u has been disconnected.
TTC_STOPPING Stopping the operation of the communication throughput measurement tool client...
TTC_ENTER_TO_EXIT \n----------------------------------------\nThe Network Traffic Speed Test Tool in Client Mode started. \n\nPress the Enter key to stop the client program. \n----------------------------------------\n\n
TTC_RES_TITLE \n\nNetwork Traffic Speed Test Tool\n\n
TTC_RES_COLUMN_1 Item Name
TTC_RES_COLUMN_2 Normal View
TTC_RES_COLUMN_3 Simplified View
TTC_RES_SPAN Time Span for Measurement
TTC_RES_ETHER Data Correction for Ethernet Frames
TTC_RES_BYTES_DOWNLOAD Communication Data Volume in Download Direction
TTC_RES_BYTES_UPLOAD Communication Data Volume in Upload Direction
TTC_RES_BYTES_TOTAL Total Communication Data Volume
TTC_RES_DOUBLE Relay Device Input Output Total Throughput Computation
TTC_RES_BPS_DOWNLOAD Average Throughput in Download Direction
TTC_RES_BPS_UPLOAD Average Throughput in Upload Direction
TTC_RES_BPS_TOTAL Total Average Throughput
# Check command
CMD_Check Check whether SoftEther VPN Operation is Possible
CMD_Check_Help Use this to check if the current computer that is running vpncmd is a suitable operation platform for SoftEther VPN Server / Bridge. \nIf this check passes on a system, it is most likely that SoftEther VPN software will operate correctly on that system. \nAlso, if this check does not pass on a system, then this indicates that some type of trouble may arise if SoftEther VPN software is used on that system.
CMD_Check_Args Check
# Concerning System Checker
# (This contains some strange character strings which are used to check character code conversion.)
CHECK_TITLE ---------------------------------------------------\nSoftEther VPN Operation Environment Check Tool\n\nCopyright (c) SoftEther VPN Project.\nAll Rights Reserved.\n\n
CHECK_NOTE If this operation environment check tool is run on a system and that system passes, it is most likely that SoftEther VPN software can operate on that system. This check may take a while. Please wait...\n\n
CHECK_EXEC_TAG Checking '%s'... \n
CHECK_PASS Pass
CHECK_FAIL Fail
CHECK_RESULT_1 All checks passed. It is most likely that SoftEther VPN Server / Bridge can operate normally on this system.
CHECK_RESULT_2 Some checks failed. Please check the operation environment of this system. If SoftEther VPN Server / Bridge were to be executed on this system, troubles may occur.
CHECK_TEST_123456789 123456789
CHECK_PROC_KERNEL Kernel System
CHECK_PROC_MEMORY Memory Operation System
CHECK_PROC_STRINGS ANSI / Unicode string processing system
CHECK_PROC_FILESYSTEM File system
CHECK_PROC_THREAD Thread processing system
CHECK_PROC_NETWORK Network system
######################################################
# #
# Setup Wizard (SW) Strings #
# #
######################################################
SW_TITLE SoftEther VPN Setup Wizard (Version %S)
SW_EXIT_CONFIRM The setup process of SoftEther VPN hasn't been finished yet.\r\n\r\nDo you want to exit the setup?
SW_UNINSTALL_CONFIRM Starting the uninstall process of %s.\r\n\r\nDo you want to continue?
SW_COMPONENT_VPNSERVER_TITLE SoftEther VPN Server
SW_COMPONENT_VPNSERVER_DESCRIPTION Install it on a server computer at the central site of VPN. The management tools will be also installed.
SW_COMPONENT_VPNCLIENT_TITLE SoftEther VPN Client
SW_COMPONENT_VPNCLIENT_DESCRIPTION Install it on VPN client comuters. A VPN client computer will be able to connect to the central VPN Server. The management tools will be also installed.
SW_COMPONENT_VPNBRIDGE_TITLE SoftEther VPN Bridge
SW_COMPONENT_VPNBRIDGE_DESCRIPTION Install it on computers at each site. Each VPN Bridge will establish a VPN connection to the central VPN Server. The management tools will be also installed.
SW_COMPONENT_VPNSMGR_TITLE SoftEther VPN Server Manager (Admin Tools Only)
SW_COMPONENT_VPNSMGR_DESCRIPTION Only the VPN Server Manager will be installed. The VPN Server service program will not be installed. You can use the VPN Server Manager to connect and manage remote VPN Servers and VPN Bridges on other computers which can be run on Windows, Linux, Mac OS X, Solaris and FreeBSD.
SW_COMPONENT_VPNCMGR_TITLE SoftEther VPN Client Manager (Admin Tools Only)
SW_COMPONENT_VPNCMGR_DESCRIPTION Only the VPN Client Manager will be installed. The VPN Client service program will not be installed. You can use the VPN Client Manager to connect and manage remote VPN Clients on other computers which can be run on Windows and Linux.
SW_WELCOME_TITLE Welcome to the SoftEther VPN Setup Wizard
SW_MODE_TITLE Select a Setup Mode
SW_NOT_ADMIN_TITLE Not Enough Privileges
SW_COMPONENTS_TITLE Select Software Components to Install
SW_EULA_TITLE End User License Agreement
SW_WARNING_TITLE Important Notices
SW_DIR_TITLE Directory to Install on
SW_READY_TITLE Ready to Install
SW_PERFORM_TITLE Setup is in Progress
SW_ERROR_TITLE Results of Setup
SW_FINISH_TITLE Setup Finished
SW_UNINST1_TITLE Uninstaller
SW_LANG1_TITLE SoftEther VPN: Configure the Display Language
SW_EASY1_TITLE Welcome to SoftEther VPN Client Easy Installer Creator
SW_EASY2_TITLE Specify Files
SW_WEB1_TITLE Welcome to SoftEther VPN Client Web Installer Creator
SW_WEB2_TITLE Specify Files
SW_UNINSTALLINFO_URL http://selinks.org/
SW_UNINSTALLINFO_PUBLISHER SoftEther VPN Project
SW_COMPONENTS_ABOUT_TAG About %s
SW_COMPONENTS_REQUIRE_ADMIN Installation Requires Administrators Privileges
SW_COMPONENTS_REQUIRE_ADMIN_TEXT You have to restart the setup wizard by a user who has Administrators privileges to install %s in the System Mode. To install in the System Mode, click Back.
SW_DIR_SELECT Please Specify the Directory to Install
SW_DIR_MORE_THAN_110 The directory name is too long.\r\nSpecify 110 letters at most.
SW_DIR_WRITE_ERROR Unable to create the specified directory "%s" or failed to write a file on the directory.\r\n\r\nSpecify another directory.
SW_DIR_DST_IS_SAME_TO_SRC The specified directory "%s" is same as the source directory.
SW_DIR_IS_NOT_HDD The specified directory "%s" is not a local hard disk drive.\r\n\r\nTo install %s in the System Mode, you have to specify a directory on a local hard disk drive.
SW_DIR_IS_NOT_FULLPATH The directory "%s" is not a format of full path.\r\n\r\nPlease specify the full path of the directory.
SW_DIR_DST_IS_OTHER_PRODUCT The specified directory has another component already installed.\r\n\r\nPlease specify another directory.
SW_DIR_DST_IS_NEWER Newer version of the software has been installed on the specified directory.\r\n\r\nYou need not to install this version.
SW_DIR_DST_IS_NEWER_2 Newer version of the software has been installed on the specified directory.\r\n\r\nThis installer will import and apply the VPN Connection Settings which is built-in on the Easy Installer. No program files will be overwritten.
SW_DIR_DST_IS_BROKEN Unable to read a file "%s" which is on the specified directory.\r\n\r\nPlease specify another directory.
SW_DIR_DST_IS_SYSTEM_MODE The same software is already installed on the specified directory as the System Mode.\r\n\r\nPlease specify another directory.
SW_DIR_DST_IS_USER_MODE The same software is already installed on the specified directory as the User Mode.\r\n\r\nPlease specify another directory.
SW_SYSTEM_MODE_ALREADY_INSTALLED The software "%s" is already installed on this computer as the System Mode.\r\n\r\nBoth the System Mode and the User Mode installation of the same software on the same computer will conflict.\r\n\r\nDo you really want to continue the installation as the User Mode?
SW_NOT_INSTALL_SRC The setup program has been executed from outside an install source.\r\n\r\nUnable to continue the installation.
SW_SETUPLOG_CORRUPTED The "setuplog.dat" file is broken.
SW_MSI_UNINSTALL_FAILED The older version of %s (Product Code: "%S") is installed. Windows Installer failed to uninstall this older version.\r\n\r\nPlease uninstall this older version manually and restart this installer again.
SW_MSI_UNINSTALL_REBOOT_REQUIRED Windows Installer has uninstalled the older version of %s. The reboot of computer is required.\r\n\r\nPress Finish button and reboot the computer MANUALLY, and restart this installer after the reboot.
SW_NOTICE_VPNSERVER_IS_INSTALLED SoftEther VPN Bridge is selected as a component to install. However, this computer has already had SoftEther VPN Server installed.\r\n\r\nUsually, you don't need to install both SoftEther VPN Server and SoftEther VPN Bridge on the same computer.\r\nIf you install both software, conflicts such as port number duplication will occur.\r\nIf you want to replace the SoftEther VPN Server to SoftEther VPN Bridge, you should exit this installer, uninstall SoftEther VPN Server and restart this installer after that.\r\n\r\nDo you really want to continue the SoftEther VPN Bridge installation?
SW_NOTICE_VPNBRIDGE_IS_INSTALLED SoftEther VPN Server is selected as a component to install. However, this computer has already had SoftEther VPN Bridge installed.\r\n\r\nUsually, you don't need to install both SoftEther VPN Bridge and SoftEther VPN Server on the same computer.\r\nIf you install both software, conflicts such as port number duplication will occur.\r\nIf you want to replace the SoftEther VPN Server to SoftEther VPN Server, you should exit this installer, uninstall SoftEther VPN Bridge and restart this installer after that.\r\n\r\nDo you really want to continue the SoftEther VPN Server installation?
SW_OS_FAILED This operating system doesn't support %s.
SW_LANG_NOT_CHANGED The language settings of %s were not changed.
SW_LANG_LIST_LOAD_FAILED Loading the available language list failed.
SW_LANG_OK The display language of %s has been changed successfully.\r\nIf %s programs are currently running, exit a program and restart it to apply the new display language. If the display language still doesn't effect, reboot Windows.\r\n
SW_LANG_OK_SERVICE \r\nThe language of log files which the service program records will be changed to the new language after a reboot.
SW_LANG_OK_VPNCMGR \r\nThe display setting of VPN Client Manager will be changed after exit and reboot VPN Client Manager. (Including complete termination from the task tray.)
SW_CHILD_PROCESS_ERROR Failed to execute a child process.
SW_EXE_FILTER Windows Executable Files (*.EXE)|*.exe|All Files (*.*)|*.*
SW_PERFORM_MSG_EASY_INFO Compiling the VPN Client Easy Installer...
SW_EASY_FINISHED_MSG The VPN Client Easy Installer is created successfully.\r\nThe installer is saved as the following filename.\r\n\r\n%s\r\n\r\nYou can distribute the above file in the enterprise.
SW_EASY_ERROR_MSG Failed to create a VPN Client Easy Installer.
SW_OTHER_INSTANCE_EXISTS Another SoftEther VPN Setup Wizard is running.\r\n\r\nYou can continue this wizard after another wizard exits.
SW_PERFORM_MSG_WEB_INFO Compiling the VPN Client Web Installer...
SW_WEB_ERROR_MSG Failed to create a VPN Client Web Installer.
SW_INSTALLER_CACHE_IS_NOT_SIGNED The currently installed SoftEther VPN Client of this computer has not been installed from the digital-signed package signed by an Authenticode digital certificate of SoftEther VPN Project.\r\nIt might be installed from a customized installer (for example, an installer created by Easy Installer Creator.)\r\n\r\nIf you continue to create a Web Installer, a warning message will be appeared on the user's screen when its loading.\r\nTo avoid showing the warning message, you should cancel this creating wizard, download the latest version of SoftEther VPN Client from the SoftEther VPN Project's web site, re-install it and restart the Web Installer Creator wizard.\r\n\r\nDo you really to continue to create a Web Installer?
SW_FILE_NOT_FOUNT The file "%s" not found.
SW_WEB_FINISHED The Web Installer is created and saved as "%s".\r\n\r\nPlease extract inner files from the ZIP file, upload them into the Web server, and edit a HTML file and an inf file to replace URLs appropriately.\r\n\r\nThe explanation to deploy the Web Installer is described on the ZIP file.
SW_VG_CONFIRM_MSG Do you really want to install and activate the VPN Gate P2P Relay Function plug-in module with SoftEther VPN Client?\r\n\r\nThis plug-in will realize the stability of communication to bypass the government censorship firewall. However, the communication of VPN Gate usually consumes some network bandwidth. VPN Gate is not recommended to be used in the mobile connections. \r\n\r\nPlease note that there are some countries and regions which have the regulation to forbid the encrypted communications to bypass government censorship firewalls. In such a case, you must not use the VPN Gate functions on your computer. VPN Gate is intended to be used mainly in Japan. VPN Gate is a research project for just academic purpose only. VPN Gate is governed under the Japanese laws. Other countries' laws are none of our concerns nor responsibilities. By using this software and service, you must observe all concerned laws and rules with your own responsibility. You will be completely liable to any damages and responsibilities which are results of using this software and service, regardless of either inside or outside of Japan's territory.
SW_PERFORM_MSG_INIT_TASKS Preparing the tasks...
SW_PERFORM_MSG_COPY_PREPARE Preparing the copying of files...
SW_PERFORM_MSG_WRITE_ERROR Failed to write the destination file "%s".\r\n\r\nThere might be another person who has been keeping this file open.\r\nIf programs or services of %s are running, please terminate them and click Retry.
SW_PERFORM_MSG_COPY_FILE Copying "%s" ...
SW_PERFORM_MSG_SET_SECURITY Setting a security on "%s" ...
SW_PERFORM_MSG_PLUGIN Installing the plugins...
SW_PERFORM_MSG_STOP_SVC Stopping the "%s" service ...
SW_PERFORM_MSG_WAIT_FOR_FILE_UNLOCK The file "%s" is locked by a running program. Waiting to unlock...
SW_PERFORM_MSG_INSTALL_SVC Installing the %s service...
SW_PERFORM_MSG_START_SVC Starting the %s service...
SW_PERFORM_MSG_CREATE_LINKS Creating shortcut files...
SW_PERFORM_MSG_DELETE_LINKS Deleting shortcut files...
SW_PERFORM_MSG_DELETE_OLD_LINKS Deleting old shortcut files...
SW_PERFORM_MSG_REGISTER_UNINSTALL Registering uninstall information on the Control Panel...
SW_PERFORM_MSG_IMPORTING_ACCOUNT Importing the Built-in VPN Connection Setting in the Easy Installer...
SW_PERFORM_MSG_DELETE_SETUP_INFO Deleting the install information and logs...
SW_PERFORM_MSG_WRITE_LOG Writing a setup log...
SW_PERFORM_MSG_COPY_ERROR Copying to the file "%s" failed.
SW_PERFORM_MSG_CRAETE_LINK_ERROR Creating the shortcut file "%s" failed.\r\n\r\nDo you want to retry?
SW_PERFORM_MSG_WRITE_LOG_ERROR Creating the setup log file "%s".\r\n\r\nDo you want to retry?
SW_PERFORM_MSG_STOP_SVC_ERROR Stopping the "%s" service (internal name: "%S") failed.
SW_PERFORM_MSG_START_SVC_ERROR Starting the "%s" service (internal name: "%S") failed.
SW_PERFORM_MSG_SVC_UNINSTALL_FAILED Uninstall of the "%s" service (internal name: "%S") failed.
SW_PERFORM_MSG_SVC_INSTALL_FAILED Install of the "%s" service (internal name: "%S") failed.
SW_PERFORM_MSG_SVC_USERMODE_EXEC_FAILED Starting the user-mode service "%s" failed.
SW_PERFORM_MSG_UPDATING Updating system settings...
SW_PERFORM_MSG_DELETE_NIC Removing the Virtual Network Adapters...
SW_PERFORM_MSG_FINISHED Setup progress finished.
SW_PERFORM_MSG_UNINSTALL_MSI Windows Installer is uninstalling the older version of %s...
SW_PERFORM_MSG_UPDATE_LANG_CONFIG Changing the language settings...
SW_PERFORM_MSG_INIT_UNINST Preparing uninstall...
SW_PERFORM_MSG_DELETE_PREPARE Preparing to delete files...
SW_PERFORM_MSG_DELETE_ERROR Unable to delete the file "%s".\r\n\r\nThere might be another program who is keeping this file open.\r\nIf programs or services of %s are running, please terminate them and click Retry.
SW_PERFORM_MSG_UNINSTALL_SVC Uninstalling the "%s" service ...
SW_PERFORM_MSG_DELETE Deleting the "%s" service ...
SW_PERFORM_MSG_EASY_INIT Building the Easy Installer...
SW_PERFORM_MSG_WEB_INIT Building the Web Installer...
SW_PERFORM_MSG_INSTALL_SELOW Creating a restore point of the system and installing essential components. It may take a while...
SW_TAG_USERNAME \ (User-mode)
SW_DIRNAME_CONFIG_TOOLS Configuration Tools
SW_DIRNAME_ADMIN_TOOLS Administrative Tools
SW_DIRNAME_LANGUAGE_TOOLS Language Settings
SW_RUN_TEXT_VPNSMGR Start the SoftEther VPN Server Manager.
SW_RUN_TEXT_VPNCMGR Start the SoftEther VPN Client Manager.
SW_NIC_UNINSTALL Virtual Network Adapters of SoftEther VPN Client have been created on the system.\r\nDo you want to delete these Virtual Network Adapters?
# --- Do not translate this section !!! stay them in English !!! ---
SW_TAG_USERNAME_ENGLISH \ (User-Mode)
SW_LINK_NAME_VPNSERVER_SVC SoftEther VPN Server User-mode Service
SW_LINK_NAME_VPNBRIDGE_SVC SoftEther VPN Bridge User-mode Service
SW_LONG_VPNSERVER SoftEther VPN Server
SW_LONG_VPNCLIENT SoftEther VPN Client
SW_LONG_VPNBRIDGE SoftEther VPN Bridge
SW_LONG_VPNSMGR SoftEther VPN Server Manager
SW_LONG_VPNCMGR SoftEther VPN Client Manager
SW_LANG_SET_FAILED Failed to write the new language setting on lang.config file.
# --- end of "Do not translate this section" ---
# Shortcuts Filenames
SW_LINK_NAME_VPNSMGR_SHORT SoftEther VPN Server Manager
SW_LINK_NAME_VPNSMGR_SHORT_UM SE-VPN Server Manager (User)
SW_LINK_NAME_VPNSMGR_SHORT_TOOLSONLY SE-VPN Server Manager (Tools)
SW_LINK_NAME_VPNSMGR_SHORT_TOOLSONLY_UM SE-VPN Server Manager (User)
SW_LINK_NAME_VPNSMGR_FULL SoftEther VPN Server Manager
SW_LINK_NAME_VPNSMGR_COMMENT You can manage SoftEther VPN Server or SoftEther VPN Bridge on a remote computer.
SW_LINK_NAME_VPNCMGR_SHORT SoftEther VPN Client Manager
SW_LINK_NAME_VPNCMGR_FULL SoftEther VPN Client Manager
SW_LINK_NAME_VPNCMGR_COMMENT You can connect to a VPN Server by using SoftEther VPN Client.
SW_LINK_NAME_VPNCMGRTOOLS_SHORT SoftEther VPN Client Remote Manager
SW_LINK_NAME_VPNCMGRTOOLS_SHORT_UM SE-VPN Client Remote Manager (User)
SW_LINK_NAME_VPNCMGRTOOLS_FULL SoftEther VPN Client Remote Manager
SW_LINK_NAME_VPNCMGR2_FULL Manage Remote Computer's SoftEther VPN Client
SW_LINK_NAME_VPNCMGR2_COMMENT You can establish a remote connection to and manage a SoftEther VPN Client on a remote computer.
SW_LINK_NAME_VPNCMGRTRAY_FULL SoftEther VPN Client Manager Startup
SW_LINK_NAME_VPNCMGRTRAY_COMMENT Registers an icon of SoftEther VPN Client on the taskbar's notification area.
SW_LINK_NAME_EASYINSTALLER Easy Installer Creator
SW_LINK_NAME_EASYINSTALLER_COMMENT A tool for enterprise system administrators to create a SoftEther VPN Client Easy Installer which has a function to kick-start a VPN connection to the specific destination automatically.
SW_LINK_NAME_WEBINSTALLER Web Installer Creator
SW_LINK_NAME_WEBINSTALLER_COMMENT A tool for enterprise system administrators to create a SoftEther VPN Client Web Installer (ActiveX Installer) which has a function to kick-start a VPN connection to the specific destination automatically.
SW_LINK_NAME_VPNCMD SoftEther VPN Command Line Utility (vpncmd)
SW_LINK_NAME_VPNCMD_COMMENT Manage SoftEther VPN Server, SoftEther VPN Bridge and SoftEther VPN Client on the command-line interface in vpncmd.
SW_LINK_NAME_TRAFFIC Network Traffic Speed Test Tool
SW_LINK_NAME_TRAFFIC_COMMENT Performs transmitting packets between two computers connected with TCP/IP, with large amount of throughput as possible, in order to measure the actual network traffic speed available.
SW_LINK_NAME_TCP TCP Optimization Utility
SW_LINK_NAME_TCP_COMMENT TCP Optimization Utility can adjust the parameters of TCP/IP of Windows in order to increase the network communication throughput of this computer.
SW_LINK_NAME_SERVICES Services Running on this Computer
SW_LINK_NAME_SERVICES_COMMENT Starts, stops, and configures Windows services. You can start and stop SoftEther VPN services.
SW_LINK_NAME_VPNSERVER_SVC_COMMENT Starts SoftEther VPN Server Service in the User Mode.
SW_LINK_NAME_VPNBRIDGE_SVC_COMMENT Starts SoftEther VPN Bridge Service in the User Mode.
SW_LINK_NAME_UNINSTALL Uninstall %s
SW_LINK_NAME_UNINSTALL_COMMENT Uninstall %s on this computer.
SW_LINK_NAME_LANGUAGE Configure Display Language
SW_LINK_NAME_LANGUAGE_COMMENT Change the display language setting of %s.
SW_LINK_NAME_DEBUG Debugging Information Collecting Tool
SW_LINK_NAME_DEBUG_COMMENT Collects debugging information of SoftEther VPN. Use this tool only if your support staff asks you to do so.
|