A VPN to GPN connection is built upon a tunnel that features a set of specific parameters. Some VPN clients may by default have incompatible options with the servers.com connection.
Please get acquainted with the below table that contains a list of parameters with their values supported by servers.com. While setting up your VPN client, make sure that your configuration meets the available servers.com tunnel options.
Tunnel option |
Supported values |
Description |
IKE versions |
ikev1 |
A version of the Internet Key Exchange (IKE) protocol. The same version must be met on both ends of a VPN tunnel. |
Phase 1 Diffie-Hellman (DH) group numbers |
Group 2, 5, 14, 15, 16, 17, 18 |
A Diffie-Hellman (DH) group defines the strength of a key taking part in the process of a key exchange. The higher the group, the stronger the security, but with that comes a longer processing time. |
Phase 1 encryption algorithms |
AES128, AES256, AES128-GCM-16, AES256-GCM-16 |
The process for when both members of a VPN tunnel exchange different parameters to come to an agreement is called a VPN negotiation. It consists of two phases:
Each phase is featured with encryption and integrity algorithms:
|
Phase 2 encryption algorithms |
AES128, AES256, AES128-GCM-16, AES256-GCM-16 |
|
Phase 1 integrity algorithms |
SHA1, SHA2-256, SHA2-384, SHA2-512 |
|
Phase 2 integrity algorithms |
SHA1, SHA2-384, SHA2-512 |