User Tools

Site Tools


connecting_to_the_sdf_vpn_with_pptp

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
connecting_to_the_sdf_vpn_with_pptp [2021/03/12 04:29] – [GUI Setup With NetworkManager] hc9connecting_to_the_sdf_vpn_with_pptp [2021/04/02 07:56] (current) hc9
Line 49: Line 49:
  
   - Make sure PPP and PPTP are installed. The can be accomplished in Debian or Ubuntu by entering '**sudo apt-get install pptp-linux**' into a terminal.   - Make sure PPP and PPTP are installed. The can be accomplished in Debian or Ubuntu by entering '**sudo apt-get install pptp-linux**' into a terminal.
-  - Create a file named sdfpptp in /etc/ppp/peers by entering '**sudo gedit /etc/ppp/peers**'. Replace gedit with your choice of text editor. Add the following to the file: (Be sure to replace **//username//** with your username.)\\ \\  Note: Make sure to replace **//IP Address//** with the IP address/hostname provided when running '**setvpn**' in the shell.\\ +  - Create a file named sdfpptp in /etc/ppp/peers by entering '**sudo gedit /etc/ppp/peers**'. Replace gedit with your choice of text editor. Add the following to the file: (Be sure to replace **//username//** with your username.) 
- +    - Note: Make sure to replace **//IP Address//** with the IP address/hostname provided when running '**setvpn**' in the shell. <code> 
-    remotename sdfpptp +remotename sdfpptp 
-    linkname sdfpptp +linkname sdfpptp 
-    ipparam sdfpptp +ipparam sdfpptp 
-    pty "pptp --loglevel 0 **//IP Address//** --nolaunchpppd" +pty "pptp --loglevel 0 **//IP Address//** --nolaunchpppd" 
-    name **//username//** +name **//username//** 
-    refuse-eap +refuse-eap 
-    refuse-pap +refuse-pap 
-    refuse-chap +refuse-chap 
-    refuse-mschap +refuse-mschap 
-    require-mppe +require-mppe 
-    nomppe-stateful +nomppe-stateful 
-    require-mppe-128 +require-mppe-128 
-    nomppe-40 +nomppe-40 
-    noauth +noauth 
-    nodetach +nodetach 
-    lock +lock 
-    bsdcomp 9,15 +bsdcomp 9,15 
-    deflate 9,15 +deflate 9,15 
-    idle 0 +idle 0 
 +</code>
   - Save the file.   - Save the file.
   - Edit /etc/ppp/chap-secrets by entering '**sudo gedit /etc/ppp/chap-secrets**'. Add the line **//username// stfpptp //password// *** replacing //username// and //password// with your SDF username and your password set by **'setvpn'**.   - Edit /etc/ppp/chap-secrets by entering '**sudo gedit /etc/ppp/chap-secrets**'. Add the line **//username// stfpptp //password// *** replacing //username// and //password// with your SDF username and your password set by **'setvpn'**.
Line 106: Line 106:
 Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**: Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**:
  
-{{http://sdf.org/tutorials/images/vpn1.png|Network Manager - Overview Settings}}\\ {{http://sdf.org/tutorials/images/vpn4.png|Network Manager - VPN Settings Overview}}+{{ :vpn_with_pptp:vpn1.png?nolink |Network Manager - Overview Settings}} 
 +{{ :vpn_with_pptp:vpn4.png?nolink |Network Manager - VPN Settings Overview}}
  
 Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setup|from when you ran //setvpn//]]): Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setup|from when you ran //setvpn//]]):
  
-{{http://sdf.org/tutorials/images/vpn2.png|Network Manager Settings - VPN Settings Detail}}+{{ :vpn_with_pptp:vpn2.png?nolink |Network Manager Settings - VPN Settings Detail}}
  
 Now click on **Advanced**: Now click on **Advanced**:
  
-{{http://sdf.org/tutorials/images/vpn3.png|Network Manager Settings - Advanced VPN Details}}+{{ :vpn_with_pptp:vpn3.png?nolink |Network Manager Settings - Advanced VPN Details}}
  
 Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro. Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro.
Line 122: Line 123:
 If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted. If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted.
  
-{{http://sdf.org/tutorials/images/vpn5.png|Network Manager Settings - Add Routes}}+{{ :vpn_with_pptp:vpn5.png?nolink |Network Manager Settings - Add Routes}}
  
 ===== Connecting in FreeBSD ===== ===== Connecting in FreeBSD =====
  
   * Install mpd4 from ports or packages.   * Install mpd4 from ports or packages.
-  * Add the following section to your /usr/local/etc/mpd4/mpd4.conf:  sdfvpn: new -i ng1 sdfvpn sdfvpn set iface disable on-demand set iface idle 0 # disconnect the client after 8 hours set iface session 28800 set iface route 10.0.0.0/24 set iface route default set bundle disable multilink set auth authname "USERNAME" set auth password "PASSWORD" set link yes acfcomp protocomp set link no eap set link no pap set link accept chap set link mtu 1460 set link keep-alive 10 75 set ipcp yes vjcomp set ipcp ranges 0.0.0.0/ set ipcp yes req-pri-dns req-sec-dns # # The five lines below enable Microsoft Point-to-Point encryption # (MPPE) using the ng_mppc(8) netgraph node type. # set bundle yes compression set ccp yes mppc set ccp yes mpp-compress set ccp yes mpp-e128 #set bundle accept crypt-reqd set ccp yes mpp-stateless open+  * Add the following section to your /usr/local/etc/mpd4/mpd4.conf: 
 + 
 +<code> 
 + 
 +sdfvpn: 
 +        new -i ng1 sdfvpn sdfvpn 
 + set iface disable on-demand 
 + set iface idle 0 
 +# disconnect the client after 8 hours 
 + set iface session 28800 
 + set iface route 10.0.0.0/24 
 + set iface route default 
 + set bundle disable multilink 
 + set auth authname "USERNAME" 
 + set auth password "PASSWORD" 
 + set link yes acfcomp protocomp 
 + set link no eap 
 + set link no pap 
 + set link accept chap 
 + set link mtu 1460 
 + set link keep-alive 10 75 
 + set ipcp yes vjcomp 
 + set ipcp ranges 0.0.0.0/ 
 + set ipcp yes req-pri-dns req-sec-dns 
 + 
 +# 
 +# The five lines below enable Microsoft Point-to-Point encryption 
 +# (MPPE) using the ng_mppc(8) netgraph node type. 
 +# 
 + set bundle yes compression 
 + set ccp yes mppc 
 + set ccp yes mpp-compress 
 + set ccp yes mpp-e128 
 + #set bundle accept crypt-reqd 
 + set ccp yes mpp-stateless 
 + open 
 + 
 +</code> 
   * You will have to replace three (3) things in this config:   * You will have to replace three (3) things in this config:
     - Your USERNAME     - Your USERNAME
     - Your PASSWORD     - Your PASSWORD
-    - The local address of SDF's VPN host. This can be found in /etc/hosts on SDF. The local IP will start with 10.0.0, but have the same last octet as the public IP.  ' +    - The local address of SDF's VPN host. This can be found in /etc/hosts on SDF. The local IP will start with 10.0.0, but have the same last octet as the public IP. 
-  * Add this in your /usr/local/etc/mpd4/mpd4.links file:  sdfvpn: set link type pptp set pptp peer  set pptp enable originate outcall set pptp disable incoming+ 
 +  * Add this in your /usr/local/etc/mpd4/mpd4.links file: 
 + 
 +<code> 
 + 
 +sdfvpn: 
 +        set link type pptp 
 +        set pptp peer  
 +        set pptp enable originate outcall  
 +        set pptp disable incoming 
 + 
 +</code> 
   * You will have to replace one (1) thing in this config:   * You will have to replace one (1) thing in this config:
     - The public address of SDF's VPN host. You can get this by running setvpn at the shell.     - The public address of SDF's VPN host. You can get this by running setvpn at the shell.
Line 180: Line 231:
 ---- ----
  
-$Id: PPTP.html,v 1.2 2011/06/15 15:51:32 avoyager Exp $ [[http://sdf.org/?tutorials/PPTP|Connecting to the SDF VPN with PPTP]] - legacy link+$Id: PPTP.html,v 1.2 2011/06/15 15:51:32 avoyager Exp $ [[http://sdf.org/?tutorials/PPTP|Connecting to the SDF VPN with PPTP]] - traditional link (using [[wp>Revision_Control_System|RCS]])
  
connecting_to_the_sdf_vpn_with_pptp.1615523392.txt.gz · Last modified: 2021/03/12 04:29 by hc9