This topic provides answers to frequently asked questions (FAQ) about SSL-VPN connections in various scenarios. For example, the client fails to connect to the SSL server or the client fails to access cloud resources.
FAQ
FAQ about client connections
What do I do if the client fails to connect to the SSL server?
What do I do if the client periodically disconnects from the SSL server?
What do I do if only specific clients are connected to the SSL server?
FAQ about SSL-VPN connectivity
What do I do if the client fails to connect to the SSL server?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
Invalid configurations | The configurations of the SSL server or client are invalid. |
|
Expired SSL client certificate | The SSL client certificate is invalid or expired. |
|
Excessive client connections | The number of clients connected to the SSL server exceeds the upper limit. |
|
Issues related to IP addresses | The IP addresses in the VPC conflict with the IP address of the client. | Modify the Local Network (VPC or vSwitch CIDR block) or Client Subnet parameter of the SSL server to avoid IP address conflicts with the client. For more information, see Modify an SSL server. |
If a CIDR block that contains only a few IP addresses is specified as the value of the Client CIDR Block parameter of the SSL server, the IP addresses that can be assigned to clients are insufficient. | Make sure that the number of IP addresses provided by the client CIDR block is at least four times the number of SSL-VPN connections. For more information, see Create and manage an SSL server. For example, if you specify 192.168.0.0/24 as the client CIDR block, the system first divides a subnet CIDR block with a subnet mask of 30 from 192.168.0.0/24, such as 192.168.0.4/30. This subnet provides up to four IP addresses. Then, the system allocates an IP address from 192.168.0.4/30 to the client and uses the other three IP addresses to ensure network communication. In this case, one client consumes four IP addresses. Therefore, to ensure that an IP address can be allocated to your client, you must make sure that the number of IP addresses in the client CIDR block is at least four times the maximum number of SSL-VPN connections supported by the associated VPN gateway. | |
Issues related to VPN applications | A VPN application conflict occurs on the client. |
|
Other causes | The issue occurs due to other causes. | Check the logs of the faulty SSL-VPN connection and troubleshoot the issue. For more information, see Troubleshoot SSL-VPN connection issues. |
What do I do if the client periodically disconnects from the SSL server?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
Unstable Internet connection | The Internet connection between the client and the VPN gateway is unstable. | Run the If the Internet connection is unstable and causes a high network latency or high packet loss rate, contact the Internet service provider (ISP) to help troubleshoot the issue. |
If you use an SSL-VPN connection over a long distance, such as a connection between the US (Silicon Valley) and Singapore regions, the client may be intermittently disconnected when the client accesses the VPC. | Change the protocol used by the SSL server on the Alibaba Cloud side to TCP to improve the reliability of the connection. For more information, see Modify an SSL server. If the issue persists after you change the protocol used by the SSL server to TCP, we recommend that you use Cloud Enterprise Network (CEN) and Smart Access Gateway (SAG) to connect the client to the VPC. | |
SSL server configuration changes | The client is disconnected from the SSL server because the configurations of the SSL server are modified. | After you modify the configurations of the SSL server, reconnect the client to the SSL server. |
What do I do if only specific clients are connected to the SSL server?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
Unstable Internet connection | If you use an SSL-VPN connection over a long distance, such as a connection between the US (Silicon Valley) and Singapore regions, the client may be intermittently disconnected when the client accesses the VPC. | Change the protocol used by the SSL server on the Alibaba Cloud side to TCP to improve the reliability of the connection. For more information, see Modify an SSL server. If you use the SSL-VPN connection for long-distance communication, such as communication between US (Silicon Valley) and Singapore, and the connectivity issue persists after you change the protocol used by the SSL server to TCP, we recommend that you use Cloud Enterprise Network (CEN) and Smart Access Gateway to connect your client to the virtual private cloud (VPC). |
Excessive client connections | The number of clients connected to the SSL server exceeds the upper limit. |
|
Client exceptions | The client or the VPN application on the client does not run as expected. As a result, the client disconnects from the SSL server. | Restart the client, or reinstall and reconfigure the VPN application. For more information about how to install and configure a VPN application, see Configure the client. |
Time synchronization issues | SSL verification fails due to the time difference between the client and the SSL server. | The time difference between the client and the SSL server cannot be longer than 10 minutes. We recommend that you set the system time of the client to the standard time.
|
What do I do if the client is connected to the SSL server but cannot be reached by ping packets?
The following table describes the possible cause and the solution.
Cause | Solution |
The network access control list (ACL) of the client blocks | Check whether the network ACL of the client blocks By default, the firewall of a Windows client blocks |
What do I do if the client is connected to the SSL server but only the client or VPC can be reached by ping packets?
The following table describes the possible causes and the solutions.
Problem description | Cause | Solution |
The VPC can be reached by | The network ACL of the client blocks | Check whether the network ACL of the client blocks By default, the firewall of a Windows client blocks |
The client can be reached by | The path that is probed when you send ping packets to the VPC from the client is different from the path that is probed when you send ping packets to the client from the VPC. |
|
What do I do if the client is connected to the SSL server but cannot access a domain name or an application?
The following table describes the possible cause and the solution.
Cause | Solution |
No routes are configured on the client to route client requests to a DNS server. As a result, the domain name cannot be resolved. |
|
What do I do if the client is connected to the SSL server but the client cannot access cloud resources?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
Route issues | The Local Network parameter of the SSL server is not specified or the parameter value is invalid. |
|
CIDR block issues | The CIDR blocks specified as the value of the Local Network parameter of the SSL server overlap with the CIDR block specified as the value of the Client CIDR Block parameter. | Check whether the CIDR blocks specified in the Local Network parameter of the SSL server on the Alibaba Cloud side overlap with the CIDR blocks specified in the Client Subnet parameter. For more information, see Modify an SSL server. |
An IPsec-VPN connection is created on the VPN gateway that is associated with the SSL server. The IPsec-VPN connection is associated with a route whose destination CIDR block overlaps with the CIDR blocks specified in the Client Subnet parameter of the SSL server. | Change the route that is associated with the IPsec-VPN connection to a specific route or set the Client Subnet parameter of the SSL server to other CIDR blocks. This ensures that the destination CIDR block of the route does not overlap with the CIDR blocks specified in the Client Subnet parameter of the SSL server. For more information, see Modify a policy-based route, Modify a destination-based route, or Modify an SSL server. | |
Security group issues | The security group rules of the application in the VPC, or the network ACL of the client disallows the VPC and the client to communicate with each other. |
|
Issues related to VPN applications | If outdated or recent OpenVPN versions are installed on the client, compatibility issues may occur. As a result, the client may fail to receive or process the responses sent by the VPN gateway. For example, if OpenVPN 2.6.6 is installed on a Windows client, the client fails to send ping packets to cloud resources due to compatibility issues. | We recommend that you use the OpenVPN versions suggested in the VPN Gateway documentation. For more information, see Configure the client. |
What do I do if the client is connected to the SSL server but packet loss occurs?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
VPN gateway specification issues | A sudden traffic surge occurs during data transfer, which exceeds the maximum bandwidth of the VPN gateway. You can view the traffic monitoring information of the VPN gateway in the VPN Gateway console to check whether a sudden traffic surge occurs. | You can upgrade the VPN gateway. For more information, see Upgrade or downgrade a VPN gateway. |
SSL server configuration issues | The SSL server uses unreliable UDP to establish SSL-VPN connections to the client. |
|
Unstable Internet connection | The Internet connection between the client and the VPN gateway is unstable. | Run the If the Internet connection is unstable, contact the ISP to help troubleshoot the issue. |
What do I do if the client is connected to the SSL server but the response latency is high?
The following table describes the possible causes and the solutions.
Category | Cause | Solution |
VPN gateway specification issues | A sudden traffic surge occurs during data transfer, which exceeds the maximum bandwidth of the VPN gateway. You can view the traffic monitoring information of the VPN gateway in the VPN Gateway console to check whether a sudden traffic surge occurs. | You can upgrade the VPN gateway. For more information, see Upgrade or downgrade a VPN gateway. |
Low version of VPN Gateway | The forwarding capability of VPN Gateway in earlier versions fails to meet the requirements. The response latency increases when the VPN gateway needs to forward heavy traffic. | If your VPN gateway is created before April 1, 2021, upgrade the VPN gateway. The performance of SSL-VPN connections in later VPN Gateway versions is improved. For more information, see Upgrade or downgrade a VPN gateway. |
Why does the SSL-VPN connection use an encryption algorithm that is not specified for data encryption?
Cause
By default, the Non-Compliant Plaintext (NCP) mode is enabled for Alibaba Cloud SSL servers and OpenVPN 2.4.0 or later. The NCP mode is used to dynamically negotiate encryption algorithms. After the NCP mode is enabled, when an SSL-VPN connection is established between the client and the SSL server, the SSL server dynamically negotiates the encryption algorithm with the client. Then, the SSL server uses the most secure encryption algorithm that is supported by both the SSL server and the client in the ncp_ciphers
list instead of the encryption algorithm that you specified for the SSL server.
By default, OpenVPN 2.4.0 or later uses the encryption algorithm AES-256-GCM or AES-128-GCM in the ncp_ciphers
list. When an SSL-VPN connection is established between the client and the SSL server, you can view the encryption algorithm that is used by the client and the SSL server after they negotiate with each other based on the corresponding log information, such as Data Channel: using negotiated cipher 'AES-256-GCM'
.
If the client uses a version of OpenVPN that is earlier than 2.4.0 and does not support the NCP mode, the SSL server and the client use the encryption algorithm that you specified for the SSL server.
Solution
We recommend that you configure the client to use OpenVPN 2.4.0 or later. This way, the SSL server dynamically negotiates the encryption algorithm with the client.
If the client uses Tunnelblick, the SSL server dynamically negotiates the encryption algorithm with the client by default and uses the most secure encryption algorithm that is supported by both the SSL server and the client. The encryption algorithm that you specified for the SSL server does not take effect.