PPTP VPN - Clients inside Cisco877w - server at workplace
I am trying to connect to my workplace PPTP server from my home that has a Cisco 877w ADSL/Wireless router. I configured the majority of the setup via CLI and just started playing with CCP. I've used version 2.5 and 2.7 on a virtual Windows station that resides on my primary Linux box.
Background in trying things out. PPTP works fine without CCP firewall wizard having been run - with just a vanilla interfaces configured kind of setting.
I ran the CCP Advanced Firewall task, specified that I had PPTP clients on the LAN and went with it. The proposed changes included GRE and PPTP stuff, but being green in the IOS Firewall, I have no idea what I was looking at.
My configuration as it gave me is as follows:
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
logging message-counter syslog
no logging buffered
enable secret 5 MyPass
no aaa new-model
clock timezone Chicago -6
clock summer-time Chicago date Apr 6 2003 2:00 Oct 26 2003 2:00
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 101 remark CCP_ACL Category=0
access-list 101 permit ip any host 10.1.1.10
bridge 1 protocol ieee
bridge 1 route ip
bridge 2 protocol ieee
bridge 2 route ip
banner login ^CUnauthorized access is STRICTLY PROHIBITED! ^C
line con 0
exec-timeout 15 0
password 7 01010101010101010101
no modem enable
line aux 0
line vty 0 4
exec-timeout 5 0
privilege level 15
transport preferred none
transport input ssh
scheduler max-task-time 5000
ntp server 184.108.40.206
Any clues as to what I would have to do to allow the PPTP connection to complete? It appears as though GRE may not be getting through? I haven't found much in the way of fixing this. My Google-fu might be lacking.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :