2

vpn pptp problem

view story
linux-howto

http://forums.fedoraforum.org – Good day! Please tell, why can not raise vpn pptp for Fedora-10, a week I bet. :)I'm new to linux. From everything I read on the Internet focused on the method http://www.fedoralinux.ru/forum/viewtopic.php?id=1597 Here are the data (IP addresses changed, but the essence of connection reflects). LAN: bit-town IP: 192.168.152.100 Subnet Mask: 255.255.255.0 Gateway (gateway): 192.168.152.1 DNS1: 192.168.156.1 DNS2: 222.22.22.22 VPN options: VPN-server: 192.168.1.146 Username: vpn-login Password: passvp [root @ localhost t] # / etc / init.d / network restart Shutting down interface eth0: [OK] Shutting down interface loopback: [ OK ] Up interface loopback: [ OK ] Up interface eth0: [ OK ] [root@localhost t]# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.90.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.152.1 0.0.0.0 UG 0 0 0 eth0 [root@localhost t]# cat /etc/resolv.conf # Generated by NetworkManager # No nameservers found; try putting DNS servers into your # ifcfg files in /etc/sysconfig/network-scripts like so: # # DNS1=xxx.xxx.xxx.xxx # DNS2=xxx.xxx.xxx.xxx # DOMAIN=lab.foo.com bar.foo.com nameserver 192.168.152.1 nameserver 222.22.22.22 [root@localhost t]# ping -c5 192.168.152.1 PING 192.168.152.1 (192.168.152.1) 56(84) bytes of data. 64 bytes from 192.168.152.1: icmp_seq=1 ttl=64 time=1.74 ms 64 bytes from 192.168.152.1: icmp_seq=2 ttl=64 time=1.53 ms 64 bytes from 192.168.152.1: icmp_seq=3 ttl=64 time=2.85 ms 64 bytes from 192.168.152.1: icmp_seq=4 ttl=64 time=1.15 ms 64 bytes from 192.168.152.1: icmp_seq=5 ttl=64 time=1.34 ms --- 192.168.152.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4005ms rtt min/avg/max/mdev = 1.151/1.726/2.859/0.601 ms [root@localhost t]# ping -c5 192.168.1.146 PING 192.168.1.146 (192.168.1.146) 56(84) bytes of data. 64 bytes from 192.168.1.146: icmp_seq=1 ttl=63 time=1.25 ms 64 bytes from 192.168.1.146: icmp_seq=2 ttl=63 time=1.16 ms 64 bytes from 192.168.1.146: icmp_seq=3 ttl=63 time=0.978 ms 64 bytes from 192.168.1.146: icmp_seq=4 ttl=63 time=0.789 ms 64 bytes from 192.168.1.146: icmp_seq=5 ttl=63 time=0.567 ms --- 192.168.1.146 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4003ms rtt min/avg/max/mdev = 0.567/0.950/1.257/0.252 ms [root@localhost t]# ip r a 192.168.152.1 via 192.168.152.1 [root@localhost t]# ip r a 222.22.22.22 via 192.168.152.1 [root@localhost t]# ip r a 192.168.1.146 via 192.168.152.1 [root@localhost t]# route del default [root@localhost t]# ping -c5 192.168.1.146 PING 192.168.1.146 (192.168.1.146) 56(84) bytes of data. 64 bytes from 192.168.1.146: icmp_seq=1 ttl=63 time=1.33 ms 64 bytes from 192.168.1.146: icmp_seq=2 ttl=63 time=1.13 ms 64 bytes from 192.168.1.146: icmp_seq=3 ttl=63 time=0.587 ms 64 bytes from 192.168.1.146: icmp_seq=4 ttl=63 time=1.74 ms 64 bytes from 192.168.1.146: icmp_seq=5 ttl=63 time=1.96 ms --- 192.168.1.146 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4005ms rtt min/avg/max/mdev = 0.587/1.351/1.963/0.482 ms [root@localhost t]# ping -c5 222.22.22.22 PING 222.22.22.22(77.74.11.137) 56(84) bytes of data. 64 bytes from 77.74.11.137: icmp_seq=1 ttl=64 time=1.88 ms 64 bytes from 77.74.11.137: icmp_seq=2 ttl=64 time=1.21 ms 64 bytes from 77.74.11.137: icmp_seq=3 ttl=64 time=1.66 ms 64 bytes from 77.74.11.137: icmp_seq=4 ttl=64 time=2.04 ms 64 bytes from 77.74.11.137: icmp_seq=5 ttl=64 time=2.28 ms --- 222.22.22.22ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4005ms rtt min/avg/max/mdev = 1.215/1.818/2.280/0.363 ms [root@localhost t]# route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 222.22.22.22 192.168.152.1 255.255.255.255 UGH 0 0 0 eth0 192.168.1.146 192.168.152.1 255.255.255.255 UGH 0 0 0 eth0 192.168.152.1 192.168.152.1 255.255.255.255 UGH 0 0 0 eth0 192.168.90.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 [root@localhost t]# ping -c5 192.168.152.1 PING 192.168.152.1 (192.168.152.1) 56(84) bytes of data. 64 bytes from 192.168.152.1: icmp_seq=1 ttl=64 time=2.59 ms 64 bytes from 192.168.152.1: icmp_seq=2 ttl=64 time=2.43 ms 64 bytes from 192.168.152.1: icmp_seq=3 ttl=64 time=1.71 ms 64 bytes from 192.168.152.1: icmp_seq=4 ttl=64 time=1.54 ms 64 bytes from 192.168.152.1: icmp_seq=5 ttl=64 time=2.55 ms --- 192.168.152.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4006ms rtt min/avg/max/mdev = 1.544/2.166/2.593/0.449 ms [root@localhost t]# cat /etc/ppp/peers/bit-town pty "pptp 192.168.1.146 --nolaunchpppd" user vpn-login password "passvp" nodeflate nobsdcomp noauth [root@localhost t]# cat /etc/ppp/options lock [root@localhost t]# cat /etc/ppp/options.pptp ################################################## ############################ # $Id: options.pptp,v 1.3 2006/03/26 23:11:05 quozl Exp $ # # Sample PPTP PPP options file /etc/ppp/options.pptp # Options used by PPP when a connection is made by a PPTP client. # This file can be referred to by an /etc/ppp/peers file for the tunnel. # Changes are effective on the next connection. See "man pppd". # # You are expected to change this file to suit your system. As # packaged, it requires PPP 2.4.2 or later from http://ppp.samba.org/ # and the kernel MPPE module available from the CVS repository also on # http://ppp.samba.org/, which is packaged for DKMS as kernel_ppp_mppe. ################################################## ############################# # Lock the port lock # Authentication # We don't need the tunnel server to authenticate itself noauth # We won't do PAP, EAP, CHAP, or MSCHAP, but we will accept MSCHAP-V2 # (you may need to remove these refusals if the server is not using MPPE) refuse-pap refuse-eap refuse-chap refuse-mschap # Compression # Turn off compression protocols we know won't be used nobsdcomp nodeflate # Encryption # (There have been multiple versions of PPP with encryption support, # choose with of the following sections you will use. Note that MPPE # requires the use of MSCHAP-V2 during authentication) # http://ppp.samba.org/ the PPP project version of PPP by Paul Mackarras # ppp-2.4.2 or later with MPPE only, kernel module ppp_mppe.o # {{{ # Require MPPE 128-bit encryption #require-mppe-128 # }}} # http://polbox.com/h/hs001/ fork from PPP project by Jan Dubiec # ppp-2.4.2 or later with MPPE and MPPC, kernel module ppp_mppe_mppc.o # {{{ # Require MPPE 128-bit encryption #mppe required,stateless # }}} [root@localhost t]# cat ~/.ppprc cat: /root/.ppprc: Нет такого файла или каталога [root@localhost t]# pppd call bit-town debug nodetach using channel 4 Using interface ppp0 Connect: ppp0 <--> /dev/pts/1 sent [LCP ConfReq id=0x1 ] rcvd [LCP ConfReq id=0x1 ] sent [LCP ConfAck id=0x1 ] rcvd [LCP ConfAck id=0x1 ] rcvd [LCP EchoReq id=0x0 magic=0x...] sent [LCP EchoRep id=0x0 magic=0x...] rcvd [EAP Request id=0xb Identity ] EAP: Identity prompt "Name" sent [EAP Response id=0xb Identity ] rcvd [EAP Request id=0xc MD5-Challenge ] sent [EAP Response id=0xc MD5-Challenge ] rcvd [EAP Failure id=0xd] EAP: peer reports authentication failure sent [LCP TermReq id=0x2 "Failed to authenticate ourselves to peer"] rcvd [LCP TermReq id=0x2 "Authentication failed"] sent [LCP TermAck id=0x2] rcvd [LCP TermAck id=0x2] Connection terminated. Waiting for 1 child processes... script pptp 192.168.1.146 --nolaunchpppd, pid 5940 Script pptp 192.168.1.146 --nolaunchpppd finished (pid 5940), status = 0x0 [root@localhost t]# ifconfig eth0 Link encap:Ethernet HWaddr <...> inet addr:192.168.152.100 Bcast:192.168.90.255 Mask:255.255.255.0 inet6 addr: <...>/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:72651 errors:0 dropped:0 overruns:0 frame:0 TX packets:327 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:5362301 (5.1 MiB) TX bytes:42919 (41.9 KiB) Interrupt:19 Base address:0x8800 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:12 errors:0 dropped:0 overruns:0 frame:0 TX packets:12 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:800 (800.0 b) TX bytes:800 (800.0 b) (HowTos)