Hello everybody,
for days I try in vain to set up a PPTP server on my RB750.
The interface is ethter5 with 192.168.168.201
TCP 1723 and GRE is routed from the Internet router to 192.168.168.201.
In IP / Firewall chain input TCP 1723 and GRE action is set to accept.
The request goes from WAN to 192.168.168.201:1723
but from there no longer back to WAN.
How do I have to accept the setting for the response to be sent back to WAN?
Yes, I am prety sure that GRE isn’t blocked by ISP, becaus when allowing incoming PPTP connections on my local windows 7 machine, connecting works as expected.
I attached a screen shot which shows the connections currently made while trying to connect from outside via VPN PPTP.
It seems that the reply isn’t send to the right destination. The destination address is totally unknown by me, maybe because it is an arp address?
Has anybody any hint to solve my problem, I am out of ideas now
Cheers, Mike.
Ok, so far, 179.94.44.42 ist the ip which requested the vpn tunnel. This seems to be ok, but why the connection isn’t accepted by the vpn client?
Thanks a lot, Mike.
As long I try to connect via LAN (VPN server '192.168.178.201') a valid connection is done.
The right ip address was set, but no default gateway and sub net mask of 255.255.255.255 was set for this vpn connection.
Is this correct?
You should use your public IP to connect from the outside instead of 192.168.178.210, you can’t reach that IP from Internet.
The masquerade rule you used is useless in this case.
Are you trying to make a VPN to connect to your LAN?
Assume your public IP is 1.2.3.4, do the following:
Choose a private network, example 192.168.179.0/24, for VPN pool
Set a Profile for VPN with local address 192.168.179.1 and remote address a pool from 192.168.179.101 to 192.168.179.200 (so you can use 192.168.179.2-192.168.179.100 for static remote address in case you need to do some routing or tunnels)
Accept both TCP 1723 and GRE in chain input firewall
Configure your secrets with the profile at point 2.
If you need you can do a src-natted with src-address 192.168.179.0/24 dst-address 192.168.178.0/24 action masquerade
I configured as you described above,
but unfortunately I had no luck, a connection was not established.
When I try to connect via vpn address of the RB interface within the LAN (vpn server address 192.168.178.201)
a valid connection is established, but not from WAN (public IP). I forgot to mention that the DSL Router (FritzBox) is configured to forward the ports TCP 1723 and GRE to the
RB interface (192.168.178.201).
Maybe this could be a problem?
Thanks a lot for your help, cheers, Mike.
I hope I figured out what does the trick...:
Adding a static route to define a standard gateway to reach the internet.
I found it while tying to configure a NTP time server, which wasn't reached
DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 A S 0.0.0.0/0 192.168.178.1 1
1 ADC 192.168.178.0/24 192.168.178.201 ether5-LAN-rau 0