Debian with PPTP Server


 
Thread Tools Search this Thread
Operating Systems Linux Debian Debian with PPTP Server
# 1  
Old 07-21-2011
Debian with PPTP Server

Dear All

My scenario is

Debian with PPTP Server in which I am able to connect to through other machines. Ive enable echo 1 > /proc/sys/net/ipv4/ip_forward and through client machine i can browse internet as well

I created another pptp client in debian server which connects to another service provider. Now I want my users which are connecting to this debian pptp server to use internet which I m getting on this server from another ISP (through a pptp client)
I already tried All Traffic Through Tunnel script but it didnt helped me out.

Please help

Thanks
Login or Register to Ask a Question

Previous Thread | Next Thread

10 More Discussions You Might Find Interesting

1. Debian

X2go server on Debian 8.10, stdin is not a tty

I am using x2go server on Debian 8.10. When I try to connect using x2go client, I get the error: My online searches return results of most people suggesting to replace the line: mesg n with tty -s && mesg n in /root/.profile or some variation. I tried this but the problem... (2 Replies)
Discussion started by: brighamandrew
2 Replies

2. Debian

Tar backup of debian server

Am reading this doc Full Hard-Drive Backup with Linux Tar on backup. why do we need the dot at the end ? tar -cvpf /backups/fullbackup.tar --directory=/ --exclude=proc --exclude=sys --exclude=dev/pts --exclude=backups . (7 Replies)
Discussion started by: coolatt
7 Replies

3. Debian

How to exit debian server terminal?

I have an situation that are quite strange to me. I am not able to exit the server terminal and enter back into my home computer terminal by the command exit like I used to be able to exit the server terminal with before. I end up into my root shell again without even typing the root password like... (6 Replies)
Discussion started by: Jonathan Sander
6 Replies

4. Debian

Best RAID settings for Debian Server? Help!! (1+0 or 5 or NAS)

I am installing a Debian Server on a: HP Proliant DL380 G4 Dual CPU's 3.20 ghz / 800 mhz / 1MB L2 5120 MB RAM 6 hard disks on HP Smart Array 6i controller (36.4 GB Ultra320 SCSI HD each) I will be using this server to capture VHS video, encode, compress, cut, edit, make DVD's, rip... (0 Replies)
Discussion started by: Marcus Aurelius
0 Replies

5. Emergency UNIX and Linux Support

pptp server - GUI

Hi guys. I am going to build a Linux VPN server(PPTP) for my friend but here is the problem: He don't know Linux and command line to manage users, monitor server, etc anyone knows a good GUI for this problem? I need some solution like nttacplus (2 Replies)
Discussion started by: majid.merkava
2 Replies

6. UNIX for Advanced & Expert Users

PPTP authentication via Debian user accounts

I've set up pptp vpn on Debian. Works fine. User authentication is made base on file /etc/ppp/chap-secrets. I'm looking for option that user authentication in pptp would be made base on debian system users accounts or samba accounts at last. Ther's no clue on google or forums so I decided to... (1 Reply)
Discussion started by: uselab
1 Replies

7. Debian

Debian ftp server

What the best FTP server to run on debian.. it has to be secure and stable.. also any guides flying around ? Thanks (3 Replies)
Discussion started by: wmccull
3 Replies

8. UNIX for Dummies Questions & Answers

First Server (Debian) MacBook Remote Login

Hi, I just picked up the book "Linux System Administration" and would like to get started setting up a server. I currently have a MacBook running OS X 10.5.1 and would like to use it for remote loging to the server. I have a Netgear WGR614 v6 wireless router. I'm wondering if I will be... (3 Replies)
Discussion started by: andou
3 Replies

9. UNIX for Advanced & Expert Users

pptp / pf issue

Long story short, I have an issue with getting my VPN to connect to my w2k3 server box when I include the block all rule in my pf.conf: block log all Here's the output: Apr 04 06:04:09.291697 rule 1/0(match): block in on hme0: call 3033 seq 0 gre-ppp-payload (gre encap) Apr 04... (0 Replies)
Discussion started by: xyyz
0 Replies

10. UNIX for Dummies Questions & Answers

FreeBSD 4.9 PPTP server

Hey guys, what's up? I'm new to UNIX and I really don't know much. Kinda learning as I go along. I have successfully installed FreeBSD 4.9 and enabled FTP and Telnet services. I'm looking to setup a VPN server on my BSD box but I'm lost. Can anyone guide me in the right way? Much thanks! -... (2 Replies)
Discussion started by: sirex
2 Replies
Login or Register to Ask a Question
PPTPD.CONF(5)							File Formats Manual						     PPTPD.CONF(5)

NAME
pptpd.conf - PPTP VPN daemon configuration DESCRIPTION
pptpd(8) reads options from this file, usually /etc/pptpd.conf. Most options can be overridden by the command line. The local and remote IP addresses for clients must come from the configuration file or from pppd(8) configuration files. OPTIONS
option option-file the name of an option file to be passed to pppd(8) in place of the default /etc/ppp/options so that PPTP specific options can be given. Equivalent to the command line --option option. stimeout seconds number of seconds to wait for a PPTP packet before forking the pptpctrl(8) program to handle the client. The default is 10 seconds. This is a denial of service protection feature. Equivalent to the command line --stimeout option. debug turns on debugging mode, sending debugging information to syslog(3). Has no effect on pppd(8) debugging. Equivalent to the command line --debug option. bcrelay internal-interface turns on broadcast relay mode, sending all broadcasts received on the server's internal interface to the clients. Equivalent to the command line --bcrelay option. connections n limits the number of client connections that may be accepted. If pptpd is allocating IP addresses (e.g. delegate is not used) then the number of connections is also limited by the remoteip option. The default is 100. delegate delegates the allocation of client IP addresses to pppd(8). Without this option, which is the default, pptpd manages the list of IP addresses for clients and passes the next free address to pppd. With this option, pptpd does not pass an address, and so pppd may use radius or chap-secrets to allocate an address. localip ip-specification one or many IP addresses to be used at the local end of the tunnelled PPP links between the server and the client. If one address only is given, this address is used for all clients. Otherwise, one address per client must be given, and if there are no free addresses then any new clients will be refused. localip will be ignored if the delegate option is used. remoteip ip-specification a list of IP addresses to assign to remote PPTP clients. Each connected client must have a different address, so there must be at least as many addresses as you have simultaneous clients, and preferably some spare, since you cannot change this list without restarting pptpd. A warning will be sent to syslog(3) when the IP address pool is exhausted. remoteip will be ignored if the dele- gate option is used. noipparam by default, the original client IP address is given to ip-up scripts using the pppd(8) option ipparam. The noipparam option pre- vents this. Equivalent to the command line --noipparam option. listen ip-address the local interface IP address to listen on for incoming PPTP connections (TCP port 1723). Equivalent to the command line --listen option. pidfile pid-file specifies an alternate location to store the process ID file (default /var/run/pptpd.pid). Equivalent to the command line --pidfile option. speed speed specifies a speed (in bits per second) to pass to the PPP daemon as the interface speed for the tty/pty pair. This is ignored by some PPP daemons, such as Linux's pppd(8). The default is 115200 bytes per second, which some implementations interpret as meaning "no limit". Equivalent to the command line --speed option. NOTES
An ip-specification above (for the localip and remoteip tags) may be a list of IP addresses (for example 192.168.0.2,192.168.0.3), a range (for example 192.168.0.1-254 or 192.168.0-255.2) or some combination (for example 192.168.0.2,192.168.0.5-8). For some valid pairs might be (depending on use of the VPN): localip 192.168.0.1 remoteip 192.168.0.2-254 or localip 192.168.1.2-254 remoteip 192.168.0.2-254 ROUTING CHECKLIST - PROXYARP Allocate a section of your LAN addresses for use by clients. In /etc/ppp/options.pptpd. set the proxyarp option. In pptpd.conf do not set localip option, but set remoteip to the allocated address range. Enable kernel forwarding of packets, (e.g. using /proc/sys/net/ipv4/ip_forward ). The server will advertise the clients to the LAN using ARP, providing it's own ethernet address. bcrelay(8) should not be required. ROUTING CHECKLIST - FORWARDING Allocate a subnet for the clients that is routable from your LAN, but is not part of your LAN. In pptpd.conf set localip to a single address or range in the allocated subnet, set remoteip to a range in the allocated subnet. Enable kernel forwarding of packets, (e.g. using /proc/sys/net/ipv4/ip_forward ). The LAN must have a route to the clients using the server as gateway. The server will forward the packets unchanged between the clients and the LAN. bcrelay(8) will be required to support broadcast protocols such as NETBIOS. ROUTING CHECKLIST - MASQUERADE Allocate a subnet for the clients that is not routable from your LAN, and not otherwise routable from the server (e.g. 10.0.0.0/24). Set localip to a single address in the subnet (e.g. 10.0.0.1), set remoteip to a range for the rest of the subnet, (e.g. 10.0.0.2-200). Enable kernel forwarding of packets, (e.g. using /proc/sys/net/ipv4/ip_forward ). Enable masquerading on eth0 (e.g. iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE ). The server will translate the packets between the clients and the LAN. The clients will appear to the LAN as having the address corre- sponding to the server. The LAN need not have an explicit route to the clients. bcrelay(8) will be required to support broadcast proto- cols such as NETBIOS. FIREWALL RULES
pptpd(8) accepts control connections on TCP port 1723, and then uses GRE (protocol 47) to exchange data packets. Add these rules to your iptables(8) configuration, or use them as the basis for your own rules: iptables --append INPUT --protocol 47 --jump ACCEPT iptables --append INPUT --protocol tcp --match tcp --destination-port 1723 --jump ACCEPT SEE ALSO
pppd(8), pptpd(8), pptpd.conf(5). 29 December 2005 PPTPD.CONF(5)