User Tools

Site Tools


connecting_to_the_sdf_vpn_with_pptp

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
connecting_to_the_sdf_vpn_with_pptp [2021/03/12 04:57] – [Connecting in FreeBSD] hc9connecting_to_the_sdf_vpn_with_pptp [2021/04/02 07:56] (current) hc9
Line 49: Line 49:
  
   - Make sure PPP and PPTP are installed. The can be accomplished in Debian or Ubuntu by entering '**sudo apt-get install pptp-linux**' into a terminal.   - Make sure PPP and PPTP are installed. The can be accomplished in Debian or Ubuntu by entering '**sudo apt-get install pptp-linux**' into a terminal.
-  - Create a file named sdfpptp in /etc/ppp/peers by entering '**sudo gedit /etc/ppp/peers**'. Replace gedit with your choice of text editor. Add the following to the file: (Be sure to replace **//username//** with your username.)\\ \\  Note: Make sure to replace **//IP Address//** with the IP address/hostname provided when running '**setvpn**' in the shell.\\ +  - Create a file named sdfpptp in /etc/ppp/peers by entering '**sudo gedit /etc/ppp/peers**'. Replace gedit with your choice of text editor. Add the following to the file: (Be sure to replace **//username//** with your username.) 
- +    - Note: Make sure to replace **//IP Address//** with the IP address/hostname provided when running '**setvpn**' in the shell. <code> 
-<code> +remotename sdfpptp 
- +linkname sdfpptp 
-   remotename sdfpptp +ipparam sdfpptp 
-   linkname sdfpptp +pty "pptp --loglevel 0 **//IP Address//** --nolaunchpppd" 
-   ipparam sdfpptp +name **//username//** 
-   pty "pptp --loglevel 0 **//IP Address//** --nolaunchpppd" +refuse-eap 
-   name **//username//** +refuse-pap 
-   refuse-eap +refuse-chap 
-   refuse-pap +refuse-mschap 
-   refuse-chap +require-mppe 
-   refuse-mschap +nomppe-stateful 
-   require-mppe +require-mppe-128 
-   nomppe-stateful +nomppe-40 
-   require-mppe-128 +noauth 
-   nomppe-40 +nodetach 
-   noauth +lock 
-   nodetach +bsdcomp 9,15 
-   lock +deflate 9,15 
-   bsdcomp 9,15 +idle 0
-   deflate 9,15 +
-   idle 0 +
 </code> </code>
- 
   - Save the file.   - Save the file.
   - Edit /etc/ppp/chap-secrets by entering '**sudo gedit /etc/ppp/chap-secrets**'. Add the line **//username// stfpptp //password// *** replacing //username// and //password// with your SDF username and your password set by **'setvpn'**.   - Edit /etc/ppp/chap-secrets by entering '**sudo gedit /etc/ppp/chap-secrets**'. Add the line **//username// stfpptp //password// *** replacing //username// and //password// with your SDF username and your password set by **'setvpn'**.
Line 110: Line 106:
 Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**: Once installed, restart the NetworkManager service (///etc/init.d/NetworkManager restart//) and left-click on the network manager icon in your taskbar. Highlight **VPN Connections** and click on **Configure VPN**:
  
-{{http://sdf.org/tutorials/images/vpn1.png|Network Manager - Overview Settings}}\\ {{http://sdf.org/tutorials/images/vpn4.png|Network Manager - VPN Settings Overview}}+{{ :vpn_with_pptp:vpn1.png?nolink |Network Manager - Overview Settings}} 
 +{{ :vpn_with_pptp:vpn4.png?nolink |Network Manager - VPN Settings Overview}}
  
 Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setup|from when you ran //setvpn//]]): Click on the **Add** button, and choose **Point-to-Point Tunneling Protocol (PPTP)**, then click **Create**. Fill out the **User name**, **Password** and **Gateway** fields with appropriate values ([[#setup|from when you ran //setvpn//]]):
  
-{{http://sdf.org/tutorials/images/vpn2.png|Network Manager Settings - VPN Settings Detail}}+{{ :vpn_with_pptp:vpn2.png?nolink |Network Manager Settings - VPN Settings Detail}}
  
 Now click on **Advanced**: Now click on **Advanced**:
  
-{{http://sdf.org/tutorials/images/vpn3.png|Network Manager Settings - Advanced VPN Details}}+{{ :vpn_with_pptp:vpn3.png?nolink |Network Manager Settings - Advanced VPN Details}}
  
 Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro. Under **Authentication**, **de-select all the methods except MSCHAPv2**. Then select **Use Point-to-Point Encryption (MPPE)** and choose **128-bit (most secure)** in the **Security** dropdown. Click **OK**, then **Apply** and close all other configuration dialogs. Now when you left-click on the network manager icon, you should have your PPTP VPN listed under **VPN Connections**. Just select it and wait. If it is successful, you'll see a little lock icon appear over the usual network manager icon. If not, check your system log for errors. This will be ///var/log/messages// or ///var/log/syslog//, depending on your distro.
Line 126: Line 123:
 If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted. If you use network manager, all traffic will be routed through the PPTP VPN for you once you are connected. If that's not what you want, you can click on **IPV4 Settings** and then **Routes** to have simple static routes added for you automatically when the VPN connects. You can also check **Use this connection only for resources on this network**, which in our case means only connections to SDF hosts will be encrypted.
  
-{{http://sdf.org/tutorials/images/vpn5.png|Network Manager Settings - Add Routes}}+{{ :vpn_with_pptp:vpn5.png?nolink |Network Manager Settings - Add Routes}}
  
 ===== Connecting in FreeBSD ===== ===== Connecting in FreeBSD =====
Line 234: Line 231:
 ---- ----
  
-$Id: PPTP.html,v 1.2 2011/06/15 15:51:32 avoyager Exp $ [[http://sdf.org/?tutorials/PPTP|Connecting to the SDF VPN with PPTP]] - legacy link+$Id: PPTP.html,v 1.2 2011/06/15 15:51:32 avoyager Exp $ [[http://sdf.org/?tutorials/PPTP|Connecting to the SDF VPN with PPTP]] - traditional link (using [[wp>Revision_Control_System|RCS]])
  
connecting_to_the_sdf_vpn_with_pptp.1615525059.txt.gz · Last modified: 2021/03/12 04:57 by hc9