Hello,

     I had lots of trouble with PPTP/netfilter (i.e. WIN98/NT4 client's
don't work, only WIN2K/ME do).
     One issue I found is that netfilter can only handle one PPTP/NAT
connection. I know there's a helper module for that, but when I needed to
implement it it was a beta. finally I got a real IP for my server, so I
discarded the helper module.

otherwise, what you could do is to make a VPN connection between two linux
servers (server to router, or router to router) and manage there the
MASQuing. for the windows clients on both sides it will be transparent. the
case where this won't work is if they have nomad windows clients wishing to
connect to a pptp server (perhaps Win2K IPSec could work).

hope this helps.

Best regards

---------------------------------------------------
Raul Davidovich
Responsable Informatique
Cvitkovic & Associés Consultants

(33) 1 45 15 40 68
(33) 1 45 15 40 41 Fax
-------------------------------------------------------
http://www.caconcology.com


From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Mon, 18 Feb 2002 16:13:35 +1300
Subject: GREP/PPTP, linux 2.4.10, netfilter 1.2.3 - should it work

Greetings.


I have a client that wishes to use pptp between two sites.
There are running netfilter 1.2.3, linux 2.4.10.  I have not applied any
particular kernel pptp patches.

Essentially I am

- using DNAT to run things from the internal interface to the internal RAS
server

- using SNAT to make things look like they came from the firewall interface

- allowing traffic in and out on the 'right' ports

I can get a connection, we can run ping and traceroute through the created
VPN, but no TCP connections run. It looks like the 'other' end can't find a
way back to the firewall host (tcpdump
seems to be telling me this)

What have I done wrong? What do I need to do?


The firewall has been running for months with 2.4.x and iptables, but now
they want pptp and  I's stumped.


The rules look like this

iptables  -t nat -A PREROUTING -p tcp -d $firewall -s $externalRAS \
     --dport 1723  -j DNAT --to $internalRAS:1723
iptables -t nat -A PREROUTING -p 47 -d $firewall -s $externalRAS \
      -j DNAT --to $internalRAS
#
iptables -t nat -A POSTROUTING -o eth0 -s $internalRAS -d $externalRAS \
    -j SNAT --to $firewall
iptables -t nat -A POSTROUTING -p 47 -s $internalRAS -d $externalRAS \
    -j SNAT --to $firewall
#

iptables -A FORWARD -s $internalRAS -d $externalRAS -p tcp --dport 1723 \
     -j ACCEPT
iptables -A FORWARD -d $internalRAS -s $externalRAS -p tcp --dport 1723 \
     -j ACCEPT
iptables -A FORWARD -s $internalRAS -d $externalRAS -p tcp --sport 1723 \
     -j ACCEPT
iptables -A FORWARD -d $internalRAS -s $externalRAS -p tcp --sport 1723 \
     -j ACCEPT


iptables -A FORWARD -p 47 -d $externalRAS -s $internalRAS -j ACCEPT
iptables -A FORWARD -p 47 -d $internalRAS -s $externalRAS -j ACCEPT



Thanks.

Brendan



Reply via email to