Skip to content

Commit 56a0aaf

Browse files
committed
update
1 parent 601ee70 commit 56a0aaf

File tree

1 file changed

+40
-40
lines changed

1 file changed

+40
-40
lines changed

articles/vpn-gateway/moving-to-ikev2-or-openvpn-from-sstp.md

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Transition to OpenVPN or IKEv2 from SSTP | VPN Gateway'
2+
title: 'Transition to OpenVPN or IKEv2 from SSTP | Azure VPN Gateway'
33
description: This article helps you understand the ways to overcome the 128 concurrent connection limit of SSTP.
44
services: vpn-gateway
55
author: anzaman
@@ -18,9 +18,9 @@ A Point-to-Site (P2S) VPN gateway connection lets you create a secure connection
1818

1919
Point-to-site VPN can use one of the following protocols:
2020

21-
* **OpenVPN® Protocol**, an SSL/TLS based VPN protocol. An SSL VPN solution can penetrate firewalls, since most firewalls open TCP port 443 outbound, which SSL uses. OpenVPN can be used to connect from Android, iOS (versions 11.0 and above), Windows, Linux and Mac devices (OSX versions 10.13 and above).
21+
* **OpenVPN® Protocol**, an SSL/TLS based VPN protocol. An SSL VPN solution can penetrate firewalls, since most firewalls open TCP port 443 outbound, which SSL uses. OpenVPN can be used to connect from Android, iOS (versions 11.0 and above), Windows, Linux and Mac devices (OSX versions 10.13 and above).
2222

23-
* **Secure Socket Tunneling Protocol (SSTP)**, a proprietary SSL-based VPN protocol. An SSL VPN solution can penetrate firewalls, since most firewalls open TCP port 443 outbound, which SSL uses. SSTP is only supported on Windows devices. Azure supports all versions of Windows that have SSTP (Windows 7 and later). **SSTP supports upto 128 concurrent connections only regardless of the gateway SKU**.
23+
* **Secure Socket Tunneling Protocol (SSTP)**, a proprietary SSL-based VPN protocol. An SSL VPN solution can penetrate firewalls, since most firewalls open TCP port 443 outbound, which SSL uses. SSTP is only supported on Windows devices. Azure supports all versions of Windows that have SSTP (Windows 7 and later). **SSTP supports up to 128 concurrent connections only regardless of the gateway SKU**.
2424

2525
* IKEv2 VPN, a standards-based IPsec VPN solution. IKEv2 VPN can be used to connect from Mac devices (OSX versions 10.11 and above).
2626

@@ -59,8 +59,8 @@ Once the gateway has been configured,existing clients will not be able to connec
5959
If you are using Windows 10, you can also use the [Azure VPN Client for Windows](https://docs.microsoft.com/azure/vpn-gateway/openvpn-azure-ad-client#to-download-the-azure-vpn-client)
6060

6161

62-
# Frequently asked questions
63-
## What are the client configuration requirements?
62+
## Frequently asked questions
63+
### What are the client configuration requirements?
6464

6565
>[!NOTE]
6666
>For Windows clients, you must have administrator rights on the client device in order to initiate the VPN connection from the client device to Azure.
@@ -77,7 +77,7 @@ The zip file also provides the values of some of the important settings on the A
7777
>[!INCLUDE [TLS version changes](../../includes/vpn-gateway-tls-change.md)]
7878
>
7979
80-
## <a name="gwsku"></a>Which gateway SKUs support P2S VPN?
80+
### <a name="gwsku"></a>Which gateway SKUs support P2S VPN?
8181

8282
[!INCLUDE [aggregate throughput sku](../../includes/vpn-gateway-table-gwtype-aggtput-include.md)]
8383

@@ -87,48 +87,48 @@ The zip file also provides the values of some of the important settings on the A
8787
>The Basic SKU does not support IKEv2 or RADIUS authentication.
8888
>
8989
90-
## <a name="IKE/IPsec policies"></a>What IKE/IPsec policies are configured on VPN gateways for P2S?
90+
### <a name="IKE/IPsec policies"></a>What IKE/IPsec policies are configured on VPN gateways for P2S?
9191

9292

9393
**IKEv2**
9494

9595
|**Cipher** | **Integrity** | **PRF** | **DH Group** |
96-
|--- | --- | --- | --- |
97-
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_24 |
98-
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_14 |
99-
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_ECP384 |
100-
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_ECP256 |
101-
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_24 |
102-
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_14 |
103-
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_ECP384 |
104-
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_ECP256 |
105-
|AES256 | SHA384 | SHA384 | GROUP_24 |
106-
|AES256 | SHA384 | SHA384 | GROUP_14 |
107-
|AES256 | SHA384 | SHA384 | GROUP_ECP384 |
108-
|AES256 | SHA384 | SHA384 | GROUP_ECP256 |
109-
|AES256 | SHA256 | SHA256 | GROUP_24 |
110-
|AES256 | SHA256 | SHA256 | GROUP_14 |
111-
|AES256 | SHA256 | SHA256 | GROUP_ECP384 |
112-
|AES256 | SHA256 | SHA256 | GROUP_ECP256 |
113-
|AES256 | SHA256 | SHA256 | GROUP_2 |
96+
|--- | --- | --- | --- |
97+
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_24 |
98+
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_14 |
99+
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_ECP384 |
100+
|GCM_AES256 | GCM_AES256 | SHA384 | GROUP_ECP256 |
101+
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_24 |
102+
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_14 |
103+
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_ECP384 |
104+
|GCM_AES256 | GCM_AES256 | SHA256 | GROUP_ECP256 |
105+
|AES256 | SHA384 | SHA384 | GROUP_24 |
106+
|AES256 | SHA384 | SHA384 | GROUP_14 |
107+
|AES256 | SHA384 | SHA384 | GROUP_ECP384 |
108+
|AES256 | SHA384 | SHA384 | GROUP_ECP256 |
109+
|AES256 | SHA256 | SHA256 | GROUP_24 |
110+
|AES256 | SHA256 | SHA256 | GROUP_14 |
111+
|AES256 | SHA256 | SHA256 | GROUP_ECP384 |
112+
|AES256 | SHA256 | SHA256 | GROUP_ECP256 |
113+
|AES256 | SHA256 | SHA256 | GROUP_2 |
114114

115115
**IPsec**
116116

117117
|**Cipher** | **Integrity** | **PFS Group** |
118-
|--- | --- | --- |
119-
|GCM_AES256 | GCM_AES256 | GROUP_NONE |
120-
|GCM_AES256 | GCM_AES256 | GROUP_24 |
121-
|GCM_AES256 | GCM_AES256 | GROUP_14 |
122-
|GCM_AES256 | GCM_AES256 | GROUP_ECP384 |
123-
|GCM_AES256 | GCM_AES256 | GROUP_ECP256 |
124-
| AES256 | SHA256 | GROUP_NONE |
125-
| AES256 | SHA256 | GROUP_24 |
126-
| AES256 | SHA256 | GROUP_14 |
127-
| AES256 | SHA256 | GROUP_ECP384 |
128-
| AES256 | SHA256 | GROUP_ECP256 |
129-
| AES256 | SHA1 | GROUP_NONE |
130-
131-
## <a name="TLS policies"></a>What TLS policies are configured on VPN gateways for P2S?
118+
|--- | --- | --- |
119+
|GCM_AES256 | GCM_AES256 | GROUP_NONE |
120+
|GCM_AES256 | GCM_AES256 | GROUP_24 |
121+
|GCM_AES256 | GCM_AES256 | GROUP_14 |
122+
|GCM_AES256 | GCM_AES256 | GROUP_ECP384 |
123+
|GCM_AES256 | GCM_AES256 | GROUP_ECP256 |
124+
| AES256 | SHA256 | GROUP_NONE |
125+
| AES256 | SHA256 | GROUP_24 |
126+
| AES256 | SHA256 | GROUP_14 |
127+
| AES256 | SHA256 | GROUP_ECP384 |
128+
| AES256 | SHA256 | GROUP_ECP256 |
129+
| AES256 | SHA1 | GROUP_NONE |
130+
131+
### <a name="TLS policies"></a>What TLS policies are configured on VPN gateways for P2S?
132132
**TLS**
133133

134134
|**Policies** |
@@ -146,7 +146,7 @@ The zip file also provides the values of some of the important settings on the A
146146
|TLS_RSA_WITH_AES_128_CBC_SHA256 |
147147
|TLS_RSA_WITH_AES_256_CBC_SHA256 |
148148

149-
## <a name="configure"></a>How do I configure a P2S connection?
149+
### <a name="configure"></a>How do I configure a P2S connection?
150150

151151
A P2S configuration requires quite a few specific steps. The following articles contain the steps to walk you through P2S configuration, and links to configure the VPN client devices:
152152

0 commit comments

Comments
 (0)