Quantcast
Channel: All EdgeRouter posts
Viewing all articles
Browse latest Browse all 60861

PPTP VPN Pass-Through setup woes

$
0
0

I've got an Edgerouter X that is functioning great except it won't let my VPN client connect from my laptop.  I tried opening up port 1723 & GRE protocol on my firewall and setting up an appropriate forwarding rule.  However, this is all to no avail.  My particular configuration is fairly straight forward: The internet (WAN) is setup on eth4, the rest of the eth* ports are setup as switch0.  When I try to connect to my VPN server it hangs on verification of credentials then returns a 619 error.  This use to work with my old router... I'm sure I've overlooked something simple.  Any help would be greatly appreciated.  Thanks in advance!

 

My current config:

firewall {
    all-ping enable
    broadcast-ping disable
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians disable
    name WAN_IN {
        default-action drop
        description "WAN to internal"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "PPTP ACCEPT 1723"
            destination {
                port 1723
            }
            log disable
            protocol tcp_udp
        }
        rule 30 {
            action accept
            description "GRE ACCEPT"
            log disable
            protocol gre
        }
        rule 40 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    name WAN_LOCAL {
        default-action drop
        description "WAN to router"
        rule 10 {
            action accept
            description "Allow established/related"
            state {
                established enable
                related enable
            }
        }
        rule 20 {
            action accept
            description "PPTP ACCEPT 1723"
            destination {
                port 1723
            }
            log disable
            protocol tcp_udp
        }
        rule 30 {
            action accept
            description "GRE ACCEPT"
            log disable
            protocol gre
        }
        rule 40 {
            action drop
            description "Drop invalid state"
            state {
                invalid enable
            }
        }
    }
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth1 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth2 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth3 {
        description Local
        duplex auto
        speed auto
    }
    ethernet eth4 {
        address dhcp
        description Internet
        duplex auto
        firewall {
            in {
                name WAN_IN
            }
            local {
                name WAN_LOCAL
            }
        }
        poe {
            output pthru
        }
        speed auto
    }
    loopback lo {
    }
    switch switch0 {
        address 192.168.0.1/24
        description Local
        mtu 1500
        switch-port {
            interface eth0 {
            }
            interface eth1 {
            }
            interface eth2 {
            }
            interface eth3 {
            }
            vlan-aware disable
        }
    }
}
port-forward {
    auto-firewall enable
    hairpin-nat disable
    rule 1 {
        description "VPN PPTP"
        forward-to {
            address 192.168.0.13
            port 1723
        }
        original-port 1723
        protocol tcp_udp
    }
    wan-interface eth4
}
service {
    dhcp-server {
        disabled false
        hostfile-update disable
        shared-network-name LAN0 {
            authoritative disable
            subnet 192.168.0.0/24 {
                default-router 192.168.0.1
                dns-server 192.168.0.1
                lease 86400
                start 192.168.0.2 {
                    stop 192.168.0.127
                }
                static-mapping Franklin-MC-PC {
                    ip-address 192.168.0.77
                    mac-address 6C:F0:49:00:B0:3B
                }
                static-mapping Franklin_AP {
                    ip-address 192.168.0.123
                    mac-address 88:dc:96:0d:2f:60
                }
                static-mapping Franklin_EXT {
                    ip-address 192.168.0.124
                    mac-address 88:dc:96:26:9a:46
                }
                static-mapping GUEST-AP {
                    ip-address 192.168.0.122
                    mac-address 00:02:6F:4B:E2:6E
                }
                static-mapping JACQUI_NET {
                    ip-address 192.168.0.126
                    mac-address 88:dc:96:3e:c2:b2
                }
                static-mapping John-PC {
                    ip-address 192.168.0.13
                    mac-address 00:71:CC:6B:E0:BD
                }
                static-mapping OBi100.Phone.Client {
                    ip-address 192.168.0.2
                    mac-address 9c:ad:ef:10:50:7c
                }
                static-mapping ONEILL_CB {
                    ip-address 192.168.0.125
                    mac-address 88:dc:96:3e:8b:f8
                }
                static-mapping PrintServer1 {
                    ip-address 192.168.0.32
                    mac-address 00:c0:02:d2:d7:0f
                }
            }
        }
    }
    dns {
        forwarding {
            cache-size 150
            listen-on switch0
        }
    }
    gui {
        http-port 80
        https-port 443
        older-ciphers enable
    }
    nat {
        rule 5010 {
            description "masquerade for WAN"
            outbound-interface eth4
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
    telnet {
        port 23
    }
}
system {
    host-name ubnt-franklin0
    login {
        user johnfran {
            authentication {
                encrypted-password ****************
                public-keys John@John-PC {
                    key ****************
                    type ssh-rsa
                }
            }
            level admin
        }
    }
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
        host 192.168.0.13 {
            facility all {
                level notice
            }
        }
    }
    time-zone America/Los_Angeles
}
traffic-control {
    smart-queue SQ0 {
        download {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 3mbit
        }
        upload {
            ecn enable
            flows 1024
            fq-quantum 1514
            limit 10240
            rate 1mbit
        }
        wan-interface eth4
    }
}

Viewing all articles
Browse latest Browse all 60861

Trending Articles