PPTP Tunnel. Table of Contents. General Information. Summary



Similar documents
PPPoE. Table of Contents. General Information. Summary

BGP (Border Gateway Protocol)

Site to Site VPN on ADSL with Prajak Thunyawiraphap

bintec Workshop WAN Partner Configuration Copyright November 8, 2005 Funkwerk Enterprise Communications GmbH Version 0.9

NAS 323 Using Your NAS as a VPN Server

SMC7004ABR Barricade Broadband Router Installation Instructions

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Nortel VPN Router Software Release V6_05.300

Internet Access Setup

Internet Access Setup

Using the ECM VPN with Windows 7

VLAN in MikroTik. By Mohammed Khomeini Bin ABU MUM Indonesia, 2013

Setting up VPN connection: DI-824VUP+ with Windows PPTP client

NAS 322 Connecting Your NAS to a VPN

Schedule. MikroTik RouterOS Training User Management. Instructor. Housekeeping. Topics Overview. Course Objective 8/1/2014

Guideline for setting up a functional VPN

MikroTik Invisible Tools. By : Haydar Fadel 2014

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Sample Configuration Using the ip nat outside source static

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Securepoint Security Systems

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

How to establish a Leased Line Connection

Chapter 10 Troubleshooting

Configuring the PIX Firewall with PDM

University Computing & Telecommunications Virtual Private Networking: How To/Self- Help Guide Windows 8.1 Operating System.

Configure ISDN Backup and VPN Connection

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Setting up VPN Access for Remote Diagnostics Support

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

VPN. VPN For BIPAC 741/743GE

Virtual Private Network and Remote Access Setup

Virtual Private Network and Remote Access

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Guidelines for Using an Ethernet Printer. - Mac OS X - Rev. 1.0

ERserver. iseries. Remote Access Services: PPP connections

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

7. Configuring IPSec VPNs

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Chapter 4 Customizing Your Network Settings

Chapter 5 Customizing Your Network Settings

ADMINISTRATION GUIDE Cisco Small Business

Chapter 1 Configuring Basic Connectivity

How do I set up a branch office VPN tunnel with the Management Server?

1.0 DHCPD.CONF. option domain-name-servers ; option domain-name "smuth-mru.org.zm"; option broadcast-address

GregSowell.com. Mikrotik VPN

Using the ECM VPN with OSX devices

Cisco Which VPN Solution is Right for You?

Version Date Status Owner Released for HiPath OpenOffice ME V1 F. Kneissl / K.-W. Weigt

VPN PPTP Application. Installation Guide

Chapter 4 Customizing Your Network Settings

Application Note: Onsight Device VPN Configuration V1.1

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

Issue 1 April 2, 2009 Using the VT2442 Web User Interface

VPN 3000 Concentrator Bandwidth Management Configuration Example

VPN. Date: 4/15/2004 By: Heena Patel

Sample Configuration Using the ip nat outside source list C

MPLS for ISPs PPPoE over VPLS. MPLS, VPLS, PPPoE

Phone: Fax: Box: 230

Chapter 1 Configuring Internet Connectivity

CCProxy. Server Installation

Client applications are available for PC and Mac computers and ios and Android mobile devices. Internet

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring IPsec VPN with a FortiGate and a Cisco ASA

1 PC to WX64 direction connection with crossover cable or hub/switch

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Andover Continuum Remote Communication Configuration Guide

Formación MTCUME. MikroTik Certified User Manager Engineer. Pre-requisitos: - Certificación MTCNA

How To Configure L2TP VPN Connection for MAC OS X client

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Wireless Router Setup Manual

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

H3C SSL VPN RADIUS Authentication Configuration Example

Scenario: Remote-Access VPN Configuration

Configuring RADIUS Dial Up with Livingston Server Authentication

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Configuration examples for the D-Link NetDefend Firewall series DFL-210/800/1600/2500

IPsec VPN Application Guide REV:

Configuring a Leased Line

Advanced Computer Network Technologies Project Configuration of mvpn. Noha Pavol noh031

Policy Based Forwarding

7.1. Remote Access Connection

Table of Contents. Cisco Cisco VPN Client FAQ

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

isco Connecting Routers Back to Back Through the AUX P

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Chapter 5 Virtual Private Networking Using IPsec

Packet Sniffer. Table of Contents. General Information. Summary. Specifications

RF550VPN and RF560VPN

MFC7840W Windows Network Connection Repair Instructions

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Transcription:

PPTP Tunnel Document revision 1.7 (January 16, 2008, 9:10 GMT) This document applies to V3.0 Table of Contents Table of Contents General Information Summary Quick Setup Guide Specifications Additional Documents PPTP Client Setup Notes Monitoring PPTP Client PPTP Server Setup Notes PPTP Tunnel Interfaces PPTP Application s Router-to-Router Secure Tunnel Connecting a Remote Client via PPTP Tunnel PPTP Setup for Windows Sample instructions for PPTP (VPN) installation and client setup - Windows 98SE Troubleshooting General Information Summary Page 1 of 12

Quick Setup Guide 1. [admin@pptp-server] ppp secret> add name=user password=passwd \ \... local-address=10.0.0.1 remote-address=10.0.0.2 2. [admin@pptp-server] interface pptp-server server> set enabled=yes 1. [admin@pptp-client] interface pptp-client> add user=user password=passwd \ \... connect-to=10.5.8.104 disabled=no Specifications Packages required: ppp License required: level1 (limited to 1 tunnel), level3 (limited to 200 tunnels), level5 Home menu level: /interface pptp-server, /interface pptp-client Standards and Technologies: PPTP (RFC 2637) Hardware usage: Not significant Page 2 of 12

Additional Documents PPTP Client Setup Home menu level: /interface pptp-client add-default-route (yes no; default: no) - whether to use the server which this client is connected to as its default router (gateway) allow (multiple choice: mschap2, mschap1, chap, pap; default: mschap2, mschap1, chap, pap) - the protocol to allow the client to use for authentication connect-to (IP address) - The IP address of the PPTP server to connect to max-mru (integer; default: 1460) - Maximum Receive Unit. The optimal value is the MRU of the interface the tunnel is working over decreased by 40 (so, for 1500-byte Ethernet link, set the MRU to 1460 to avoid fragmentation of packets) max-mtu (integer; default: 1460) - Maximum Transmission Unit. The optimal value is the MTU of the interface the tunnel is working over decreased by 40 (so, for 1500-byte Ethernet link, set the MTU to 1460 to avoid fragmentation of packets) mrru (integer: 512..65535; default: disabled) - maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets, allowing full size IP or Ethernet packets to be sent over the tunnel disabled - disable MRRU on this link name (name; default: pptp-outn) - interface name for reference password (text; default: "") - user password to use when logging to the remote server profile (name; default: default) - profile to use when connecting to the remote server Page 3 of 12

user (text) - user name to use when logging on to the remote server Notes [admin@mikrotik] interface pptp-client> add name=test2 connect-to=10.1.1.12 \ \... user=john add-default-route=yes password=john [admin@mikrotik] interface pptp-client> print Flags: X - disabled, R - running 0 X name="test2" max-mtu=1460 max-mru=1460 mrru=disabled connect-to=10.1.1.12 user="john" password="john" profile=default add-default-route=yes allow=pap,chap,mschap1,mschap2 [admin@mikrotik] interface pptp-client> enable 0 Monitoring PPTP Client Command name: /interface pptp-client monitor encoding (text) - encryption and encoding (if asymmetric, separated with '/') being used in this connection idle-time (read-only: time) - time since the last packet has been transmitted over this link mru (read-only: integer) - effective MRU of the link mtu (read-only: integer) - effective MTU of the link status (text) - status of the client dialing - attempting to make a connection verifying password... - connection has been established to the server, password verification in progress connected - self-explanatory terminated - interface is not enabled or the other side will not establish a connection uptime (time) - connection time displayed in days, hours, minutes and seconds [admin@mikrotik] interface pptp-client> monitor test2 status: "connected" uptime: 6h44m9s idle-time: 6h44m9s encoding: "MPPE128 stateless" Page 4 of 12

mtu: 1460 mru: 1460 [admin@mikrotik] interface pptp-client> PPTP Server Setup Home menu level: /interface pptp-server server authentication (multiple choice: pap chap mschap1 mschap2; default: mschap2) - authentication algorithm default-profile - default profile to use enabled (yes no; default: no) - defines whether PPTP server is enabled or not keepalive-timeout (time; default: 30) - defines the time period (in seconds) after which the router is starting to send keepalive packets every second. If no traffic and no keepalive responses has came for that period of time (i.e. 2 * keepalive-timeout), not responding client is proclaimed disconnected max-mru (integer; default: 1460) - Maximum Receive Unit. The optimal value is the MRU of the interface the tunnel is working over decreased by 40 (so, for 1500-byte ethernet link, set the MRU to 1460 to avoid fragmentation of packets) max-mtu (integer; default: 1460) - Maximum Transmission Unit. The optimal value is the MTU of the interface the tunnel is working over decreased by 40 (so, for 1500-byte ethernet link, set the MTU to 1460 to avoid fragmentation of packets) mrru (integer: 512..65535; default: disabled) - maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets, allowing full size IP or Ethernet packets to be sent over the tunnel disabled - disable MRRU on this link Notes [admin@mikrotik] interface pptp-server server> set enabled=yes [admin@mikrotik] interface pptp-server server> print enabled: yes Page 5 of 12

max-mtu: 1460 max-mru: 1460 mrru: disabled authentication: mschap2,mschap1 keepalive-timeout: 30 default-profile: default [admin@mikrotik] interface pptp-server server> PPTP Tunnel Interfaces Home menu level: /interface pptp-server client-address (read-only: IP address) - shows the IP address of the connected client encoding (read-only: text) - encryption and encoding (if asymmetric, separated with '/') being used in this connection mru (read-only: integer) - client's MRU mtu (read-only: integer) - client's MTU name (name) - interface name uptime (read-only: time) - shows how long the client is connected user (name) - the name of the user that is configured statically or added dynamically [admin@mikrotik] interface pptp-server> add user=ex1 [admin@mikrotik] interface pptp-server> print Flags: X - disabled, D - dynamic, R - running # NAME USER MTU CLIENT-ADDRESS UPTIME ENC... 0 DR <pptp-ex> ex 1460 10.0.0.202 6m32s none 1 pptp-in1 ex1 [admin@mikrotik] interface pptp-server> Page 6 of 12

PPTP Application s Router-to-Router Secure Tunnel [admin@homeoffice] ppp secret> add name=ex service=pptp password=lkjrht \ \... local-address=10.0.103.1 remote-address=10.0.103.2 [admin@homeoffice] ppp secret> print detail Flags: X - disabled 0 name="ex" service=pptp caller-id="" password="lkjrht" profile=default local-address=10.0.103.1 remote-address=10.0.103.2 routes=="" Page 7 of 12

[admin@homeoffice] ppp secret> [admin@homeoffice] interface pptp-server> add user=ex [admin@homeoffice] interface pptp-server> print Flags: X - disabled, D - dynamic, R - running # NAME USER MTU CLIENT-ADDRESS UPTIME ENC... 0 pptp-in1 ex [admin@homeoffice] interface pptp-server> [admin@homeoffice] interface pptp-server server> set enabled=yes [admin@homeoffice] interface pptp-server server> print enabled: yes max-mtu: 1460 max-mru: 1460 mrru: disabled authentication: mschap2 keepalive-timeout: 30 default-profile: default [admin@homeoffice] interface pptp-server server> [admin@remoteoffice] interface pptp-client> add connect-to=192.168.80.1 user=ex \ \... password=lkjrht disabled=no [admin@remoteoffice] interface pptp-client> print Flags: X - disabled, R - running 0 R name="pptp-out1" mtu=1460 mru=1460 mrru=disabled connect-to=192.168.80.1 user="ex" password="lkjrht" profile=default add-default-route=no allow=pap,chap,mschap1,mschap2 [admin@remoteoffice] interface pptp-client> Page 8 of 12

[admin@homeoffice] > ip route add dst-address 10.150.1.0/24 gateway 10.0.103.2 [admin@remoteoffice] > ip route add dst-address 10.150.2.0/24 gateway 10.0.103.1 [admin@homeoffice] ppp secret> print detail Flags: X - disabled 0 name="ex" service=pptp caller-id="" password="lkjrht" profile=default local-address=10.0.103.1 remote-address=10.0.103.2 routes=="" [admin@homeoffice] ppp secret> set 0 routes="10.150.1.0/24 10.0.103.2 1" [admin@homeoffice] ppp secret> print detail Flags: X - disabled 0 name="ex" service=pptp caller-id="" password="lkjrht" profile=default local-address=10.0.103.1 remote-address=10.0.103.2 routes="10.150.1.0/24 10.0.103.2 1" [admin@homeoffice] ppp secret> [admin@remoteoffice]> /ping 10.0.103.1 10.0.103.1 pong: ttl=255 time=3 ms 10.0.103.1 pong: ttl=255 time=3 ms 10.0.103.1 pong: ttl=255 time=3 ms ping interrupted 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max = 3/3.0/3 ms Page 9 of 12

[admin@remoteoffice]> /ping 10.150.2.254 10.150.2.254 pong: ttl=255 time=3 ms 10.150.2.254 pong: ttl=255 time=3 ms 10.150.2.254 pong: ttl=255 time=3 ms ping interrupted 3 packets transmitted, 3 packets received, 0% packet loss round-trip min/avg/max = 3/3.0/3 ms Connecting a Remote Client via PPTP Tunnel Page 10 of 12

[admin@remoteoffice] ppp secret> add name=ex service=pptp password=lkjrht local-address=10.150.1.254 remote-address=10.150.1.2 [admin@remoteoffice] ppp secret> print detail Flags: X - disabled 0 name="ex" service=pptp caller-id="" password="lkjrht" profile=default local-address=10.150.1.254 remote-address=10.150.1.2 routes=="" [admin@remoteoffice] ppp secret> [admin@remoteoffice] interface pptp-server> add name=fromlaptop user=ex [admin@remoteoffice] interface pptp-server> print Flags: X - disabled, D - dynamic, R - running # NAME USER MTU CLIENT-ADDRESS UPTIME ENC... 0 FromLaptop ex [admin@remoteoffice] interface pptp-server> [admin@remoteoffice] interface pptp-server server> set enabled=yes [admin@remoteoffice] interface pptp-server server> print enabled: yes max-mtu: 1460 max-mru: 1460 mrru: disabled authentication: mschap2 keepalive-timeout: 30 default-profile: default [admin@remoteoffice] interface pptp-server server> [admin@remoteoffice] interface ethernet> set Office arp=proxy-arp [admin@remoteoffice] interface ethernet> print Flags: X - disabled, R - running # NAME MTU MAC-ADDRESS ARP 0 R ToInternet 1500 00:30:4F:0B:7B:C1 enabled 1 R Office 1500 00:30:4F:06:62:12 proxy-arp [admin@remoteoffice] interface ethernet> PPTP Setup for Windows Sample instructions for PPTP (VPN) installation and client setup - Windows 98SE Page 11 of 12

Troubleshooting Page 12 of 12