MysticLlama
Golden Member
I've got one little remaining bug that I can't seem to see in my PIX trying to get PPTP to terminate on it.
Here's how far I get at the moment.
The PIX accepts PPTP connections from the outside.
The PIX then uses a aaa server via RADIUS to a Windows 2000 server and get authentication information for the user.
.....(Which is actually really cool becuase it even asks for the allow dial-in flag)
The user gets authenticated and the box gets a valid IP address for the network.
The IP is given out, but with a subnet mask of 255.255.255.255 and a gateway of itself. I think this is fine, because it works the same way on my old Windows VPN server.
Do I have to have a specific access-list to allow this traffic back and forth? I get logged on and get an IP, but I can't actually ping anything inside of the network.
According to the book I have, since I have "sysopt connection permit-pptp" in there, it should pass through all traffic without an access-list.
Does that sound right?
Also, the other question, I'm giving the devices on the outside regular internal IPs from the 255.255.255.0 range internally. Is that wrong? Is it automatically trying to do NAT and screwing me up? I found that out through trial and error with the DMZ trying to give it external IPs, but it really just wanted its own internal range.
Here's how far I get at the moment.
The PIX accepts PPTP connections from the outside.
The PIX then uses a aaa server via RADIUS to a Windows 2000 server and get authentication information for the user.
.....(Which is actually really cool becuase it even asks for the allow dial-in flag)
The user gets authenticated and the box gets a valid IP address for the network.
The IP is given out, but with a subnet mask of 255.255.255.255 and a gateway of itself. I think this is fine, because it works the same way on my old Windows VPN server.
Do I have to have a specific access-list to allow this traffic back and forth? I get logged on and get an IP, but I can't actually ping anything inside of the network.
According to the book I have, since I have "sysopt connection permit-pptp" in there, it should pass through all traffic without an access-list.
Does that sound right?
Also, the other question, I'm giving the devices on the outside regular internal IPs from the 255.255.255.0 range internally. Is that wrong? Is it automatically trying to do NAT and screwing me up? I found that out through trial and error with the DMZ trying to give it external IPs, but it really just wanted its own internal range.