Secure Socket Tunneling Protocol (SSTP) is a new kind of virtual private network (VPN) tunnel that is available in the Routing and Remote Access Services role in Windows Server 2008. SSTP is also available for use in Windows Vista Service Pack 1 (SP1). SSTP uses the HTTPS protocol over Transmission Control Protocol (TCP) port 443 to pass traffic through firewalls and Web proxies that might block Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP)/IPsec traffic. SSTP allows for Point-to-Point Protocol (PPP) packets to be encapsulated over the Secure Sockets Layer (SSL) channel of the HTTPS protocol. This allows for a VPN connection to be more easily established through a firewall or through a Network Address Translation (NAT) device. Also, this allows for a VPN connection to be established through an HTTP proxy device. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol.
By default, SSTP is configured to listen on all interfaces. For example, SSTP is configured to listen on 0.0.0.0 for IPv4 or ::/0 for IPv6. By default, Routing and Remote Access Services allows for VPN connections to travel over all IPv4 and IPv6 addresses that are available on the computer. Also, Routing and Remote Access Services always sets the computer certificate, also known as the machine certificate, to Http.sys. Http.sys is the HTTPS listener component on a Windows Server 2008-based computer that is running Routing and Remote Access Services together with 0.0.0.0:PortNum and [::]:PortNum.
This article describes how an administrator can block SSTP connections from specific IPv4 or IPv6 IP addresses or from specific interfaces.
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.