Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
The ServerFlags value specifies several configuration settings for the RRAS server implementation. It MUST be defined under the following registry key.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Parameters
This MUST be of type REG_DWORD. This SHOULD be a combination of the various flag values given in the following table.
Value |
Description |
---|---|
0x00000001 |
This specifies that for Callback Control Protocol (CBCP) [RFC1570] in PPP, there needs to be a delay before the RRAS server performs the actual callback. |
0x00000002 |
Use the Microsoft Point-to-Point Compression (MPPC) protocol to compress data sent on the remote access or demand-dial connections. |
0x00000004 |
NetBEUI Framing is enabled. |
0x00000008 |
RRAS server is enabled for IPv4 traffic to be tunneled. |
0x00000010 |
RRAS server is enabled for IPX traffic to be tunneled. |
0x00000020 |
RRAS server is enabled for AppleTalk protocol traffic to be tunneled. |
0x00000040 |
Shiva Password Authentication Protocol (SPAP) can be negotiated for remote access and demand-dial connection authentication. |
0x00000080 |
Packets between the WAN endpoints SHOULD be encrypted. |
0x00000100 |
MSCHAP protocol can be negotiated for remote access and demand-dial connection authentication. |
0x00000200 |
The use of LCP extensions as defined in [RFC1570] is allowed. |
0x00000400 |
Multilink negotiation [RFC1990] is allowed for remote access and demand-dial connections. |
0x00000800 |
PPP peer needs to be authentication. |
0x00001000 |
Packets between WAN endpoints SHOULD be encrypted using the strongest possible algorithm. The exact algorithm is RRAS implementation-dependent. |
0x00002000 |
Bandwidth Allocation Control Protocol (BACP) [RFC2125] is allowed for remote access connections. |
0x00004000 |
Remote access connections without authentication are allowed on the RRAS server. |
0x00008000 |
EAP protocol can be negotiated for remote access and demand-dial connection authentication. |
0x00010000 |
Password Authentication Protocol (PAP) [RFC1334] can be negotiated for remote access and demand-dial connection authentication. |
0x00020000 |
MD5-CHAP [RFC1994] can be negotiated for remote access and demand-dial connection authentication. |
0x00040000 |
IPsec needs to be negotiated for L2TP [MS-L2TPIE] tunnel type connections. |
0x00080000 |
Packets between WAN endpoints can be unencrypted. |
0x00100000 |
MOBIKE [RFC4555] extension support is not allowed for IKEv2 remote access connections. |
0x00200000 |
Use of LAN Manager passwords [RFC2433] is allowed for remote access and demand-dial connection authentication. |
0x00400000 |
Connections to the RRAS server using directly connected serial ports can be accepted without authentication. |
0x00800000 |
MSCHAPv2 [MS-CHAP] can be negotiated for remote access and demand-dial connection authentication. |
0x01000000 |
Callback functionality using CBCP [RFC1570] is enabled. |
0x02000000 |
Machine authentication is allowed on the RRAS server. |
0x04000000 |
Authentication using certificates is allowed on the RRAS server. |
0x08000000 |
RRAS server is enabled for IPv6 traffic to be tunneled. |
0x10000000 |
Preshared key can be used for authentication using L2TP over IPsec [MS-L2TPIE]. |