Share via


2.2.3.4.6 ServerFlags

The ServerFlags value specifies several configuration settings for the RRAS server implementation. It MUST be defined under the following registry key.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RemoteAccess\Parameters

This MUST be of type REG_DWORD. This SHOULD be a combination of the various flag values given in the following table.

Value

Description

0x00000001

This specifies that for Callback Control Protocol (CBCP) [RFC1570] in PPP, there needs to be a delay before the RRAS server performs the actual callback.

0x00000002

Use the Microsoft Point-to-Point Compression (MPPC) protocol to compress data sent on the remote access or demand-dial connections.

0x00000004

NetBEUI Framing is enabled.

0x00000008

RRAS server is enabled for IPv4 traffic to be tunneled.

0x00000010

RRAS server is enabled for IPX traffic to be tunneled.

0x00000020

RRAS server is enabled for AppleTalk protocol traffic to be tunneled.

0x00000040

Shiva Password Authentication Protocol (SPAP) can be negotiated for remote access and demand-dial connection authentication.

0x00000080

Packets between the WAN endpoints SHOULD be encrypted.

0x00000100

MSCHAP protocol can be negotiated for remote access and demand-dial connection authentication.

0x00000200

The use of LCP extensions as defined in [RFC1570] is allowed.

0x00000400

Multilink negotiation [RFC1990] is allowed for remote access and demand-dial connections.

0x00000800

PPP peer needs to be authentication.

0x00001000

Packets between WAN endpoints SHOULD be encrypted using the strongest possible algorithm. The exact algorithm is RRAS implementation-dependent.

0x00002000

Bandwidth Allocation Control Protocol (BACP) [RFC2125] is allowed for remote access connections.

0x00004000

Remote access connections without authentication are allowed on the RRAS server.

0x00008000

EAP protocol can be negotiated for remote access and demand-dial connection authentication.

0x00010000

Password Authentication Protocol (PAP) [RFC1334] can be negotiated for remote access and demand-dial connection authentication.

0x00020000

MD5-CHAP [RFC1994] can be negotiated for remote access and demand-dial connection authentication.

0x00040000

IPsec needs to be negotiated for L2TP [MS-L2TPIE] tunnel type connections.

0x00080000

Packets between WAN endpoints can be unencrypted.

0x00100000

MOBIKE [RFC4555] extension support is not allowed for IKEv2 remote access connections.

0x00200000

Use of LAN Manager passwords [RFC2433] is allowed for remote access and demand-dial connection authentication.

0x00400000

Connections to the RRAS server using directly connected serial ports can be accepted without authentication.

0x00800000

MSCHAPv2 [MS-CHAP] can be negotiated for remote access and demand-dial connection authentication.

0x01000000

Callback functionality using CBCP [RFC1570] is enabled.

0x02000000

Machine authentication is allowed on the RRAS server.

0x04000000

Authentication using certificates is allowed on the RRAS server.

0x08000000

RRAS server is enabled for IPv6 traffic to be tunneled.

0x10000000

Preshared key can be used for authentication using L2TP over IPsec [MS-L2TPIE].