Now I’ve found out that when I comment out the config options, I can connect using CHAP protocol, but not MS-CHAPv2. So it is definitely not a firewall/bad credentials issue.
И правильно ругнется — когда пользователь будет подключаться по PPTP, как циске выбрать, к какой группе этого пользователя прилепить — VPN-1 или VPN-2 ?Работать PPTP-сервер в таком случае будет, но будет активной только одна VPDN-группа — та, которая была создана первой, т.е. VPN-1.
Like other types of remote access solutions, a remote user can use PPTP to connect to a corporate network and be treated as directly connected to that internal network even if he is physically outside the network.
Turris Omnia has a bug on PPPoE see
Wow! THANKS! I've finally found this as a solution to a long time problem and this is NOWHERE in the docs or anyplace. So, to help with future searches... PPTP on an IOS router using LOCAL AUTHENTICATION will fail when using encrypted secrets rather than regular passwords. Thanks soooo much for this.
PPTP is always implemented between a server (e.g a Cisco router) and a client (e.g a windows workstation). Cisco supports PPTP on its IOS routers. Cisco ASA firewalls do not support termination of PPTP on the firewall itself.
It’s Vodafone VDSL in the Czech republic… But this shouldn’t be related to the ISP, should it? I know, both VPN and WAN are PPP connections, but I’d expect VPN to be treated as any other kind of internet traffic just using my ISP’s “wire”
Wow! THANKS! I've finally found this as a solution to a long time problem and this is NOWHERE in the docs or anyplace. So, to help with cisco pptp ms chap v2 future searches... PPTP on an IOS router using LOCAL AUTHENTICATION will fail when using encrypted secrets rather than regular passwords. Thanks soooo much for this.
Copyright ©2018 · |
Assume that “Interface VLAN 1” with IP range 10.10.10.0/24 has routing access to the whole VPN network. If we “attach” the remote access users via the PPTP tunnel to this VLAN and assign them an IP address in the range 10.10.10.0/24, then they will have full access to the whole network resources.
In this scenario we will be authenticating users from local usernames configured on the Cisco router. For a more scalable and secure solution, I recommend using an external RADIUS server to authenticate users.
PPTP (Point to Point Tunneling Protocol) is a quick and easy solution to offer remote access to users. Since it is natively supported on almost all Windows operating systems (Windows XP, 7, 8 etc), this kind of remote access makes an ideal solution for clients using windows OS. Also, you don’t need to install any additional software on the client machine.
Также можете настроить согласностатье.