News: This forum is now permanently frozen.
Pages: [1]
Topic: 1.3b10 PPTP Server issues  (Read 2368 times)
« on: March 08, 2008, 19:22:26 »
scaron *
Posts: 3

This was first noticed in 1.3b9 but I have only investigated in 1.3b10.

Although I have a number of m0n0walls installed, I only have one that is acting as a PPTP server (no RADIUS, only one user defined). In every other case, incoming PPTP traffic is redirected to a Windows server.

I have a laptop connected to such a 1.3b10 monowall and that I use to connect to over 50 PPTP VPNs using MS CHAP2 (mpd: AUTHPROTO CHAP MSOFTv2): there is no problem making an outbound connection to any of these VPNs except the m0n0wall installation above. In this case, the call never completes and the log is:

Mar 8 12:23:24 mpd: PPTP: Incoming control connection from xxx.yyy.zzz.250 3814 to 24.200.35.149 1723
Mar 8 12:23:24 mpd: pptp0: attached to connection with xxx.yyy.zzz.250 3814
Mar 8 12:23:24 mpd: [pt0] Accepting PPTP connection
Mar 8 12:23:24 mpd: [pt0] opening link "pt0"...
Mar 8 12:23:24 mpd: [pt0] link: OPEN event
Mar 8 12:23:24 mpd: [pt0] LCP: Open event
Mar 8 12:23:24 mpd: [pt0] LCP: state change Initial --> Starting
Mar 8 12:23:24 mpd: [pt0] LCP: LayerStart
Mar 8 12:23:24 mpd: [pt0] PPTP: attaching to peer's outgoing call
Mar 8 12:23:24 mpd: [pt0] link: UP event
Mar 8 12:23:24 mpd: [pt0] link: origination is remote
Mar 8 12:23:24 mpd: [pt0] LCP: Up event
Mar 8 12:23:24 mpd: [pt0] LCP: state change Starting --> Req-Sent
Mar 8 12:23:24 mpd: [pt0] LCP: SendConfigReq #21
Mar 8 12:23:24 mpd: ACFCOMP
Mar 8 12:23:24 mpd: PROTOCOMP
Mar 8 12:23:24 mpd: MRU 1500
Mar 8 12:23:24 mpd: MAGICNUM dc507854
Mar 8 12:23:24 mpd: AUTHPROTO CHAP MSOFTv2
Mar 8 12:23:24 mpd: MP MRRU 1600
Mar 8 12:23:24 mpd: MP SHORTSEQ
Mar 8 12:23:24 mpd: ENDPOINTDISC [802.1] 00 20 78 12 43 3a
....[above sequence repeats 8 times]
Mar 8 12:23:42 mpd: [pt0] LCP: SendConfigReq #30
Mar 8 12:23:42 mpd: ACFCOMP
Mar 8 12:23:42 mpd: PROTOCOMP
Mar 8 12:23:42 mpd: MRU 1500
Mar 8 12:23:42 mpd: MAGICNUM dc507854
Mar 8 12:23:42 mpd: AUTHPROTO CHAP MSOFTv2
Mar 8 12:23:42 mpd: MP MRRU 1600
Mar 8 12:23:42 mpd: MP SHORTSEQ
Mar 8 12:23:42 mpd: ENDPOINTDISC [802.1] 00 20 78 12 43 3a
Mar 8 12:23:44 mpd: [pt0] LCP: parameter negotiation failed
Mar 8 12:23:44 mpd: [pt0] LCP: state change Req-Sent --> Stopped
Mar 8 12:23:44 mpd: [pt0] LCP: LayerFinish
Mar 8 12:23:44 mpd: pptp0-0: clearing call
Mar 8 12:23:44 mpd: pptp0-0: killing channel
Mar 8 12:23:44 mpd: [pt0] PPTP call terminated
Mar 8 12:23:44 mpd: [pt0] link: DOWN event
Mar 8 12:23:44 mpd: [pt0] LCP: Close event
Mar 8 12:23:44 mpd: [pt0] LCP: state change Stopped --> Closed
Mar 8 12:23:44 mpd: [pt0] LCP: Down event
Mar 8 12:23:44 mpd: [pt0] LCP: state change Closed --> Initial
Mar 8 12:23:44 mpd: pptp0: closing connection with xxx.yyy.zzz.250 3814
Mar 8 12:23:44 mpd: pptp0: killing connection with xxx.yyy.zzz.250 3814


If I connect this laptop directly to a private IP, the call connects and the log is (Sorry about the length here):

Mar  8 12:35:37 mpd: PPTP: Incoming control connection from  xxx.yyy.zzz.251 2851 to 24.200.35.149 1723
Mar  8 12:35:37 mpd: pptp0: attached to connection with  xxx.yyy.zzz.251 2851
Mar  8 12:35:37 mpd: [pt0] Accepting PPTP connection
Mar  8 12:35:37 mpd: [pt0] opening link "pt0"...
Mar  8 12:35:37 mpd: [pt0] link: OPEN event
Mar  8 12:35:37 mpd: [pt0] LCP: Open event
Mar  8 12:35:37 mpd: [pt0] LCP: state change Initial --> Starting
Mar  8 12:35:37 mpd: [pt0] LCP: LayerStart
Mar  8 12:35:37 mpd: [pt0] PPTP: attaching to peer's outgoing call
Mar  8 12:35:37 mpd: [pt0] link: UP event
Mar  8 12:35:37 mpd: [pt0] link: origination is remote
Mar  8 12:35:37 mpd: [pt0] LCP: Up event
Mar  8 12:35:37 mpd: [pt0] LCP: state change Starting --> Req-Sent
Mar  8 12:35:37 mpd: [pt0] LCP: SendConfigReq #36
Mar  8 12:35:37 mpd:  ACFCOMP
Mar  8 12:35:37 mpd:  PROTOCOMP
Mar  8 12:35:37 mpd:  MRU 1500
Mar  8 12:35:37 mpd:  MAGICNUM f3cfda42
Mar  8 12:35:37 mpd:  AUTHPROTO CHAP MSOFTv2
Mar  8 12:35:37 mpd:  MP MRRU 1600
Mar  8 12:35:37 mpd:  MP SHORTSEQ
Mar  8 12:35:37 mpd:  ENDPOINTDISC [802.1] 00 20 78 12 43 3a
Mar  8 12:35:37 mpd: [pt0] LCP: rec'd Configure Request #0 (Req-Sent)
Mar  8 12:35:37 mpd:  MRU 1400
Mar  8 12:35:37 mpd:  MAGICNUM 6f5f23ca
Mar  8 12:35:37 mpd:  PROTOCOMP
Mar  8 12:35:37 mpd:  ACFCOMP
Mar  8 12:35:37 mpd:  CALLBACK 6
Mar  8 12:35:37 mpd:  MP MRRU 1614
Mar  8 12:35:37 mpd:  ENDPOINTDISC [LOCAL] 6c d6 15 5d 0d 0d 4f db a3 00 e6 d1 01 e3 44 a7 00 00 0
Mar  8 12:35:37 mpd: [pt0] LCP: SendConfigRej #0
Mar  8 12:35:37 mpd:  CALLBACK 6
Mar  8 12:35:37 mpd: [pt0] LCP: rec'd Configure Request #1 (Req-Sent)
Mar  8 12:35:37 mpd:  MRU 1400
Mar  8 12:35:37 mpd:  MAGICNUM 6f5f23ca
Mar  8 12:35:37 mpd:  PROTOCOMP
Mar  8 12:35:37 mpd:  ACFCOMP
Mar  8 12:35:37 mpd:  MP MRRU 1614
Mar  8 12:35:37 mpd:  ENDPOINTDISC [LOCAL] 6c d6 15 5d 0d 0d 4f db a3 00 e6 d1 01 e3 44 a7 00 00 0
Mar  8 12:35:37 mpd: [pt0] LCP: SendConfigNak #1
Mar  8 12:35:37 mpd:  MP MRRU 1600
Mar  8 12:35:37 mpd: [pt0] LCP: rec'd Configure Request #2 (Req-Sent)
Mar  8 12:35:37 mpd:  MRU 1400
Mar  8 12:35:37 mpd:  MAGICNUM 6f5f23ca
Mar  8 12:35:37 mpd:  PROTOCOMP
Mar  8 12:35:37 mpd:  ACFCOMP
Mar  8 12:35:37 mpd:  MP MRRU 1600
Mar  8 12:35:37 mpd:  ENDPOINTDISC [LOCAL] 6c d6 15 5d 0d 0d 4f db a3 00 e6 d1 01 e3 44 a7 00 00 0
Mar  8 12:35:37 mpd: [pt0] LCP: SendConfigAck #2
Mar  8 12:35:37 mpd:  MRU 1400
Mar  8 12:35:37 mpd:  MAGICNUM 6f5f23ca
Mar  8 12:35:37 mpd:  PROTOCOMP
Mar  8 12:35:37 mpd:  ACFCOMP
Mar  8 12:35:37 mpd:  MP MRRU 1600
Mar  8 12:35:37 mpd:  ENDPOINTDISC [LOCAL] 6c d6 15 5d 0d 0d 4f db a3 00 e6 d1 01 e3 44 a7 00 00 0
Mar  8 12:35:37 mpd: [pt0] LCP: state change Req-Sent --> Ack-Sent
Mar  8 12:35:39 mpd: [pt0] LCP: SendConfigReq #37
Mar  8 12:35:39 mpd:  ACFCOMP
Mar  8 12:35:39 mpd:  PROTOCOMP
Mar  8 12:35:39 mpd:  MRU 1500
Mar  8 12:35:39 mpd:  MAGICNUM f3cfda42
Mar  8 12:35:39 mpd:  AUTHPROTO CHAP MSOFTv2
Mar  8 12:35:39 mpd:  MP MRRU 1600
Mar  8 12:35:39 mpd:  MP SHORTSEQ
Mar  8 12:35:39 mpd:  ENDPOINTDISC [802.1] 00 20 78 12 43 3a
Mar  8 12:35:39 mpd: [pt0] LCP: rec'd Configure Reject #37 (Ack-Sent)
Mar  8 12:35:39 mpd:  MP SHORTSEQ
Mar  8 12:35:39 mpd: [pt0] LCP: SendConfigReq #38
Mar  8 12:35:39 mpd:  ACFCOMP
Mar  8 12:35:39 mpd:  PROTOCOMP
Mar  8 12:35:39 mpd:  MRU 1500
Mar  8 12:35:39 mpd:  MAGICNUM f3cfda42
Mar  8 12:35:39 mpd:  AUTHPROTO CHAP MSOFTv2
Mar  8 12:35:39 mpd:  MP MRRU 1600
Mar  8 12:35:39 mpd:  ENDPOINTDISC [802.1] 00 20 78 12 43 3a
Mar  8 12:35:39 mpd: [pt0] LCP: rec'd Configure Ack #38 (Ack-Sent)
Mar  8 12:35:39 mpd:  ACFCOMP
Mar  8 12:35:39 mpd:  PROTOCOMP
Mar  8 12:35:39 mpd:  MRU 1500
Mar  8 12:35:39 mpd:  MAGICNUM f3cfda42
Mar  8 12:35:39 mpd:  AUTHPROTO CHAP MSOFTv2
Mar  8 12:35:39 mpd:  MP MRRU 1600
Mar  8 12:35:39 mpd:  ENDPOINTDISC [802.1] 00 20 78 12 43 3a
Mar  8 12:35:39 mpd: [pt0] LCP: state change Ack-Sent --> Opened
Mar  8 12:35:39 mpd: [pt0] LCP: auth: peer wants nothing, I want CHAP
Mar  8 12:35:39 mpd: [pt0] CHAP: sending CHALLENGE len:17
Mar  8 12:35:39 mpd: [pt0] LCP: LayerUp
Mar  8 12:35:39 mpd: [pt0] LCP: rec'd Ident #3 (Opened)
Mar  8 12:35:39 mpd:  MESG: MSRASV5.10
Mar  8 12:35:39 mpd: [pt0] LCP: rec'd Ident #4 (Opened)
Mar  8 12:35:39 mpd:  MESG: MSRAS-0-PIG-A-BOO
Mar  8 12:35:39 mpd: [pt0] CHAP: rec'd RESPONSE #1
Mar  8 12:35:39 mpd:  Name: "admin"
Mar  8 12:35:39 mpd: [pt0] AUTH: Auth-Thread started
Mar  8 12:35:39 mpd: [pt0] AUTH: Trying INTERNAL
Mar  8 12:35:39 mpd: [pt0] AUTH: INTERNAL returned undefined
Mar  8 12:35:39 mpd: [pt0] AUTH: Auth-Thread finished normally
Mar  8 12:35:39 mpd: [pt0] CHAP: ChapInputFinish: status undefined
Mar  8 12:35:39 mpd:  Response is valid
Mar  8 12:35:39 mpd:  Reply message: S=A7A746F5121CC1A99A0398A08ECD79AEC84237E3
Mar  8 12:35:39 mpd: [pt0] CHAP: sending SUCCESS len:42
Mar  8 12:35:39 mpd: [pt0] LCP: authorization successful
Mar  8 12:35:39 mpd: [pt0] Bundle up: 1 link, total bandwidth 64000 bps
Mar  8 12:35:40 mpd: [pt0] IPCP: Open event
Mar  8 12:35:40 mpd: [pt0] IPCP: state change Initial --> Starting
Mar  8 12:35:40 mpd: [pt0] IPCP: LayerStart
Mar  8 12:35:40 mpd: [pt0] CCP: Open event
Mar  8 12:35:40 mpd: [pt0] CCP: state change Initial --> Starting
Mar  8 12:35:40 mpd: [pt0] CCP: LayerStart
Mar  8 12:35:40 mpd: [pt0] IPCP: Up event
Mar  8 12:35:40 mpd: [pt0] IPCP: state change Starting --> Req-Sent
Mar  8 12:35:40 mpd: [pt0] IPCP: SendConfigReq #4
Mar  8 12:35:40 mpd:  IPADDR 192.168.1.216
Mar  8 12:35:40 mpd:  COMPPROTO VJCOMP, 16 comp. channels, no comp-cid
Mar  8 12:35:40 mpd: [pt0] CCP: Up event
Mar  8 12:35:40 mpd: [pt0] CCP: state change Starting --> Req-Sent
Mar  8 12:35:40 mpd: [pt0] CCP: SendConfigReq #3
Mar  8 12:35:40 mpd:  MPPC
Mar  8 12:35:40 mpd:    0x01000040:MPPE(128 bits), stateless
Mar  8 12:35:40 mpd: [pt0] IPCP: rec'd Configure Reject #4 (Req-Sent)
Mar  8 12:35:40 mpd:  COMPPROTO VJCOMP, 16 comp. channels, no comp-cid
Mar  8 12:35:40 mpd: [pt0] IPCP: SendConfigReq #5
Mar  8 12:35:40 mpd:  IPADDR 192.168.1.216
Mar  8 12:35:40 mpd: [pt0] CCP: rec'd Configure Ack #3 (Req-Sent)
Mar  8 12:35:40 mpd:  MPPC
Mar  8 12:35:40 mpd:    0x01000040:MPPE(128 bits), stateless
Mar  8 12:35:40 mpd: [pt0] CCP: state change Req-Sent --> Ack-Rcvd
Mar  8 12:35:40 mpd: [pt0] IPCP: rec'd Configure Ack #5 (Req-Sent)
Mar  8 12:35:40 mpd:  IPADDR 192.168.1.216
Mar  8 12:35:40 mpd: [pt0] IPCP: state change Req-Sent --> Ack-Rcvd
Mar  8 12:35:41 mpd: [pt0] IPCP: rec'd Configure Request #7 (Ack-Rcvd)
Mar  8 12:35:41 mpd:  IPADDR 0.0.0.0
Mar  8 12:35:41 mpd:    NAKing with 192.168.1.224
Mar  8 12:35:41 mpd:  PRIDNS 0.0.0.0
Mar  8 12:35:41 mpd:    NAKing with 192.168.1.1
Mar  8 12:35:41 mpd:  PRINBNS 0.0.0.0
Mar  8 12:35:41 mpd:  SECDNS 0.0.0.0
Mar  8 12:35:41 mpd:  SECNBNS 0.0.0.0
Mar  8 12:35:41 mpd: [pt0] IPCP: SendConfigRej #7
Mar  8 12:35:41 mpd:  PRINBNS 0.0.0.0
Mar  8 12:35:41 mpd:  SECDNS 0.0.0.0
Mar  8 12:35:41 mpd:  SECNBNS 0.0.0.0
Mar  8 12:35:41 mpd: [pt0] CCP: rec'd Configure Request #8 (Ack-Rcvd)
Mar  8 12:35:41 mpd:  MPPC
Mar  8 12:35:41 mpd:    0x010000e1:MPPC, MPPE(40, 56, 128 bits), stateless
Mar  8 12:35:41 mpd: [pt0] CCP: SendConfigNak #8
Mar  8 12:35:41 mpd:  MPPC
Mar  8 12:35:41 mpd:    0x01000040:MPPE(128 bits), stateless
Mar  8 12:35:41 mpd: [pt0] IPCP: rec'd Configure Request #9 (Ack-Rcvd)
Mar  8 12:35:41 mpd:  IPADDR 0.0.0.0
Mar  8 12:35:41 mpd:    NAKing with 192.168.1.224
Mar  8 12:35:41 mpd:  PRIDNS 0.0.0.0
Mar  8 12:35:41 mpd:    NAKing with 192.168.1.1
Mar  8 12:35:41 mpd: [pt0] IPCP: SendConfigNak #9
Mar  8 12:35:41 mpd:  IPADDR 192.168.1.224
Mar  8 12:35:41 mpd:  PRIDNS 192.168.1.1
Mar  8 12:35:41 mpd: [pt0] CCP: rec'd Configure Request #10 (Ack-Rcvd)
Mar  8 12:35:41 mpd:  MPPC
Mar  8 12:35:41 mpd:    0x01000040:MPPE(128 bits), stateless
Mar  8 12:35:41 mpd: [pt0] CCP: SendConfigAck #10
Mar  8 12:35:41 mpd:  MPPC
Mar  8 12:35:41 mpd:    0x01000040:MPPE(128 bits), stateless
Mar  8 12:35:41 mpd: [pt0] CCP: state change Ack-Rcvd --> Opened
Mar  8 12:35:41 mpd: [pt0] CCP: LayerUp
Mar  8 12:35:41 mpd:   Compress using: mppc (MPPE(128 bits), stateless)
Mar  8 12:35:41 mpd: Decompress using: mppc (MPPE(128 bits), stateless)
Mar  8 12:35:41 mpd: [pt0] IPCP: rec'd Configure Request #11 (Ack-Rcvd)
Mar  8 12:35:41 mpd:  IPADDR 192.168.1.224
Mar  8 12:35:41 mpd:    192.168.1.224 is OK
Mar  8 12:35:41 mpd:  PRIDNS 192.168.1.1
Mar  8 12:35:41 mpd: [pt0] IPCP: SendConfigAck #11
Mar  8 12:35:41 mpd:  IPADDR 192.168.1.224
Mar  8 12:35:41 mpd:  PRIDNS 192.168.1.1
Mar  8 12:35:41 mpd: [pt0] IPCP: state change Ack-Rcvd --> Opened
Mar  8 12:35:41 mpd: [pt0] IPCP: LayerUp
Mar  8 12:35:41 mpd:   192.168.1.216 -> 192.168.1.224
Mar  8 12:35:41 mpd: [pt0] IFACE: Up event
Mar  8 12:37:52 mpd: [pt0] LCP: rec'd Terminate Request #12 (Opened)
Mar  8 12:37:52 mpd: [pt0] LCP: state change Opened --> Stopping
Mar  8 12:37:52 mpd: [pt0] AUTH: Accounting data for user admin: 135 seconds, 6848 octets in, 6017 octets out
Mar  8 12:37:52 mpd: [pt0] Bundle up: 0 links, total bandwidth 9600 bps
Mar  8 12:37:52 mpd: [pt0] IPCP: Close event
Mar  8 12:37:52 mpd: [pt0] IPCP: state change Opened --> Closing
Mar  8 12:37:52 mpd: [pt0] IPCP: SendTerminateReq #6
Mar  8 12:37:52 mpd: [pt0] error writing len 8 frame to bypass: Network is down
Mar  8 12:37:52 mpd: [pt0] IPCP: LayerDown
Mar  8 12:37:52 mpd: [pt0] IFACE: Down event
Mar  8 12:37:52 mpd: [pt0] CCP: Close event
Mar  8 12:37:52 mpd: [pt0] CCP: state change Opened --> Closing
Mar  8 12:37:52 mpd: [pt0] CCP: SendTerminateReq #4
Mar  8 12:37:52 mpd: [pt0] error writing len 8 frame to bypass: Network is down
Mar  8 12:37:52 mpd: [pt0] CCP: LayerDown
Mar  8 12:37:52 mpd: [pt0] IPCP: Down event
Mar  8 12:37:52 mpd: [pt0] IPCP: LayerFinish
Mar  8 12:37:52 mpd: [pt0] No NCPs left. Closing links...
Mar  8 12:37:52 mpd: [pt0] closing link "pt0"...
Mar  8 12:37:52 mpd: [pt0] IPCP: state change Closing --> Initial
Mar  8 12:37:52 mpd: [pt0] CCP: Down event
Mar  8 12:37:52 mpd: [pt0] CCP: LayerFinish
Mar  8 12:37:52 mpd: [pt0] CCP: state change Closing --> Initial
Mar  8 12:37:52 mpd: [pt0] AUTH: Cleanup
Mar  8 12:37:52 mpd: [pt0] LCP: SendTerminateAck #39
Mar  8 12:37:52 mpd: [pt0] LCP: LayerDown
Mar  8 12:37:52 mpd: [pt0] link: CLOSE event
Mar  8 12:37:52 mpd: [pt0] LCP: Close event
Mar  8 12:37:52 mpd: [pt0] LCP: state change Stopping --> Closing
Mar  8 12:37:54 mpd: [pt0] LCP: state change Closing --> Closed
Mar  8 12:37:54 mpd: [pt0] LCP: LayerFinish
Mar  8 12:37:54 mpd: pptp0-0: clearing call
Mar  8 12:37:54 mpd: pptp0-0: killing channel
Mar  8 12:37:54 mpd: [pt0] PPTP call terminated
Mar  8 12:37:54 mpd: [pt0] link: DOWN event
Mar  8 12:37:54 mpd: [pt0] LCP: Down event
Mar  8 12:37:54 mpd: [pt0] LCP: state change Closed --> Initial
Mar  8 12:37:54 mpd: pptp0: closing connection with  xxx.yyy.zzz.251 2851
Mar  8 12:37:54 mpd: pptp0: killing connection with  xxx.yyy.zzz.251 2851


It would seem that both the client laptop and the server are configured properly, implying that the GRE traffic required to complete the call is being blocked by the 1.3b10 m0n0wall when the client is connected to the firewall. However, in this case, the client can connect to any other PPTP VPN, including those using the same public IPs (192.168.1.x) as in the logs above. This implies the remote m0n0wall has an issue.

Finally, neither the m0n0wall server (192.168.1.216 in this case) nor the client (192.168.1.224) can ping each other when the PPTP link is up. From the (unsupported) exec page, we have:

$ ping -c3 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: icmp_seq=0 ttl=64 time=0.582 ms
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=0.412 ms
64 bytes from 192.168.1.1: icmp_seq=2 ttl=64 time=0.414 ms

--- 192.168.1.1 ping statistics ---
3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max/stddev = 0.412/0.469/0.582/0.080 ms

$ ping -c3 192.168.1.216
PING 192.168.1.216 (192.168.1.216): 56 data bytes

--- 192.168.1.216 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss

$ ping -c3 192.168.1.224
ping: sendto: Network is unreachable
ping: sendto: Network is unreachable
ping: sendto: Network is unreachable
PING 192.168.1.224 (192.168.1.224): 56 data bytes

--- 192.168.1.224 ping statistics ---
3 packets transmitted, 0 packets received, 100% packet loss

The routing table is:

$ netstat -rn
Routing tables

Internet:
Destination________Gateway____________Flags____Refs______Use__Netif_Expire
default____________re.mo.te.1_________UGS_________0____13844____ed1
re.mo.te/24________link#3_____________UC__________0________0____ed1
re.mo.te.1_________00:12:43:aa:43:f1__UHLW________2________0____ed1___1199
re.mo.te.149_______127.0.0.1__________UGHS________0________0____lo0
127.0.0.1__________127.0.0.1__________UH__________1_______30____lo0
192.168.1__________link#2_____________UC__________0________0____rl0
192.168.1.1________00:50:fc:a9:bc:7c__UHLW________1________6____lo0
192.168.1.131______00:11:09:02:72:8f__UHLW________1________7____rl0____919
192.168.1.132______00:0c:f1:7c:15:8f__UHLW________1________4____rl0___1116
192.168.1.133______00:0b:db:0c:78:8e__UHLW________1_____7087____rl0___1009
192.168.1.134______00:50:ba:2c:0f:08__UHLW________1______118____rl0____728
192.168.1.216______link#2_____________UHLW________1________3____rl0
192.168.1.224______192.168.1.216______UH__________0_______73____ng1
192.168.1.224______00:50:fc:a9:bc:7c__UHLS2_______1________0____rl0
192.168.33_________link#1_____________UC__________0________0____dc0

Notice the ng1 interface is up and running and that traffic should pass in these conditions.

Using a different client yields the same result. In particular, varying the authentication method does not change the results.

On the remote m0n0wall server, the firewall rule for the interface "PPTP VPN" is set to "*  *  *  *  *  " (accepts anything) with logging. No traffic is logged regardless of protocol (icmp, udp, tcp).

Thank you for your support.

Regards,

Serge Caron
 
Pages: [1]
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines