Global Information Lookup Global Information

Secure Socket Tunneling Protocol information


Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. SSL/TLS provides transport-level security with key negotiation, encryption and traffic integrity checking. The use of SSL/TLS over TCP port 443 (by default; port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.[1]

SSTP servers must be authenticated during the SSL/TLS phase. SSTP clients can optionally be authenticated during the SSL/TLS phase and must be authenticated in the PPP phase. The use of PPP allows support for common authentication methods, such as EAP-TLS and MS-CHAP.

SSTP is available for Linux, BSD, and Windows.[2]

SSTP is available on Windows Vista SP1 and later, in RouterOS since version 5.0, and in SEIL since its firmware version 3.50. It is fully integrated with the RRAS architecture in these operating systems, allowing its use with Winlogon or smart-card authentication, remote-access policies and the Windows VPN client.[3] The protocol is also used by Windows Azure for Point-to-Site Virtual Network.[4]

SSTP is intended only for remote client access, it generally does not support site-to-site VPN tunnels.[5]

SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will be acceptable only as long as there is sufficient excess bandwidth on the un-tunneled network link to guarantee that the tunneled TCP timers do not expire. If this becomes untrue, performance falls off dramatically. This is known as the "TCP meltdown problem".[6][7]

SSTP supports user authentication only; it does not support device authentication or computer authentication.

  1. ^ Jain, Samir (2007-01-17). "SSTP FAQ - Part 2: Client Specific". Microsoft TechNet. Retrieved 2015-10-17.
  2. ^ "SSTP-Client". 2011-09-17. Retrieved 2015-10-17.
  3. ^ Tulloch, Mitch (2008-01-22). "SSTP Makes Secure Remote Access Easier". Retrieved 2015-10-17.
  4. ^ McGuire, Cheryl (2015-08-11). "Configure a point-to-site VPN connection to an Azure Virtual Network". Retrieved 2015-10-17.
  5. ^ Jain, Samir (2007-01-10). "SSTP FAQ - Part 1: Generic". TechNet Blogs. Archived from the original on 2010-10-12.
  6. ^ Titz, Olaf (2001-04-23). "Why TCP Over TCP Is A Bad Idea". Retrieved 2015-10-17.
  7. ^ Honda, Osamu; Ohsaki, Hiroyuki; Imase, Makoto; Ishizuka, Mika; Murayama, Junichi (October 2005). "Understanding TCP over TCP: effects of TCP tunneling on end-to-end throughput and latency". In Atiquzzaman, Mohammed; Balandin, Sergey I (eds.). Performance, Quality of Service, and Control of Next-Generation Communication and Sensor Networks III. Vol. 6011. p. 60110H. Bibcode:2005SPIE.6011..138H. doi:10.1117/12.630496. S2CID 8945952.

and 27 Related for: Secure Socket Tunneling Protocol information

Request time (Page generated in 0.8623 seconds.)

Secure Socket Tunneling Protocol

Last Update:

Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an...

Word Count : 747

Tunneling protocol

Last Update:

443): Secure Socket Tunneling Protocol IPSec (Protocol 50 and 51): Internet Protocol Security L2TP (Protocol 115): Layer 2 Tunneling Protocol VXLAN (UDP...

Word Count : 1864

SoftEther VPN

Last Update:

University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket Tunneling Protocol are provided in a single VPN...

Word Count : 2053

Transport Layer Security

Last Update:

now-deprecated SSL (Secure Sockets Layer) specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Netscape...

Word Count : 17117

HTTPS

Last Update:

the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also...

Word Count : 4373

WebSocket

Last Update:

WebSocket is a computer communications protocol, providing a simultaneous two-way communication channel over a single Transmission Control Protocol (TCP)...

Word Count : 3302

Virtual private network

Last Update:

Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms. Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point...

Word Count : 3697

List of computing and IT abbreviations

Last Update:

Streaming SIMD Extensions SSSP—Single Source Shortest Path SSTP—Secure Socket Tunneling Protocol su—superuser SUS—Single UNIX Specification SUSE—Software und...

Word Count : 6615

OpenVPN

Last Update:

Free and open-source software portal OpenConnect OpenSSH Secure Socket Tunneling Protocol (SSTP) stunnel Tunnelblick WireGuard OpenVPN Change Log - OpenVPN...

Word Count : 1965

Teredo tunneling

Last Update:

port 3544. For 6to4, the most common IPv6 over IPv4 tunneling protocol, requires that the tunnel endpoint have a public IPv4 address. However, many hosts...

Word Count : 3433

Secure Reliable Transport

Last Update:

Secure Reliable Transport (SRT) is an open source video transport protocol that utilises the UDP transport protocol. The SRT Protocol specification is...

Word Count : 981

Post Office Protocol

Last Update:

STARTTLS extension allows the use of Transport Layer Security (TLS) or Secure Sockets Layer (SSL) to be negotiated using the STLS command, on the standard...

Word Count : 1879

Routing and Remote Access Service

Last Update:

installation, configuration, and management of other RRAS features. Secure Socket Tunneling Protocol VPN enforcement for Network Access Protection – Limits VPN...

Word Count : 469

FTPS

Last Update:

Security (TLS) and, formerly, the Secure Sockets Layer (SSL, which is now prohibited by RFC7568) cryptographic protocols. FTPS should not be confused with...

Word Count : 1459

SCSI connector

Last Update:

installed in an SAS drive bay, and the enclosure can use the Serial ATA Tunneling Protocol (STP) to make use of the drive.: 16, 17  There are keyed parts to...

Word Count : 2744

HTTP

Last Update:

The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia...

Word Count : 7791

User Datagram Protocol

Last Update:

IP tunneling or remote procedure call and the Network File System. It is simple, suitable for bootstrapping or other purposes without a full protocol stack...

Word Count : 2676

IPv6

Last Update:

backbone was IPv4-only, one of the frequently used tunneling protocols was 6to4. Teredo tunneling was also frequently used for integrating IPv6 LANs with...

Word Count : 7511

Datagram Transport Layer Security

Last Update:

Protocol (SCTP) encapsulation, RFC 5764 for use with Secure Real-time Transport Protocol (SRTP) subsequently called DTLS-SRTP in a draft with Secure Real-Time...

Word Count : 1146

SOCKS

Last Update:

defined as an acronym for "socket secure" from at least 2001, although it was not originally defined as such in the SOCKS Protocol Version 5 RFC in 1996 or...

Word Count : 2275

Windows Vista

Last Update:

11n wireless networking, IPv6 over VPN connections, and the Secure Socket Tunneling Protocol. Booting a system using Extensible Firmware Interface on x64...

Word Count : 15657

Windows Server 2008

Last Update:

protocol. New cryptography (CNG) API which supports elliptic-curve cryptography and improved certificate management. Secure Socket Tunneling Protocol...

Word Count : 4823

IP multicast

Last Update:

IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is the IP-specific...

Word Count : 4076

SSTP

Last Update:

of wiring Secure Socket Tunneling Protocol, a form of virtual private network (VPN) tunnel Simple Symmetric Transport Protocol, a protocol for delivering...

Word Count : 98

OpenSSH

Last Update:

known as OpenBSD Secure Shell) is a suite of secure networking utilities based on the Secure Shell (SSH) protocol, which provides a secure channel over an...

Word Count : 2701

IPOP

Last Update:

user-space VPN Point-to-Point Tunneling Protocol (PPTP) Microsoft method for implementing VPN Secure Socket Tunneling Protocol (SSTP) Microsoft method for...

Word Count : 426

Voice over IP

Last Update:

encryption and tunneling. The common tunneling protocol used is Layer 2 Tunneling Protocol and the common encryption mechanism used is Secure Sockets Layer (SSL)...

Word Count : 9910

PDF Search Engine © AllGlobal.net