HILFE Fonera als VPN-Server und Windows-Clients

Post new topic   Reply to topic    DD-WRT Forum Index -> Atheros WiSOC basierende Hardware
Author Message
Silenty
DD-WRT Novice


Joined: 09 Sep 2007
Posts: 1

PostPosted: Sun Sep 09, 2007 13:59    Post subject: HILFE Fonera als VPN-Server und Windows-Clients Reply with quote
Hallo,

ich kann mich nicht mit dem VPN Server auf der Fonera verbinden. Ich bekomme immer den Fehler 628. Ich denke das alles auf Windowsseite richtig eingestellt ist. Die Fonera hägt an meinem Router wo ich auch angestöpselt bin. Ich porbiere es aus dem INet sowie aus dem LAN. Beim Starten des VPN-Servers bekomme ich folgende Meldungen:

Code:
Daemon.Info   192.168.1.254   Sep  9 15:47:07 bcrelay[3070]: Running as child<000>
Sep  9 15:47:07 pptpd[3069]: MGR: Maximum of 12 connections available<000>
Sep  9 15:47:07 pptpd[3069]: MGR: Manager process started<000>
Sep  9 15:47:07 pptpd[3070]: MGR: BCrelay outgoing interface is regexp ppp[0-9].*<000>
Sep  9 15:47:07 pptpd[3070]: MGR: BCrelay incoming interface is br0<000>
Sep  9 15:47:07 pptpd[3070]: CTRL (BCrelay Launcher): Launching BCrelay with pid 0<000>
Sep  9 15:47:07 pptpd[3069]: CTRL: BCrelay incoming interface is br0<000>


Das sieht soweit gut aus. Wenn ich mich nun einwählen will werde ich Authentifiziert, aber irgendwie kommt der GRE-Tunnel nicht zustande und die Verbindung bricht ab:

Code:
Sep  9 15:50:07 pptpd[3127]: CTRL: Couldn't write packet to client.<000>
Sep  9 15:50:07 pptpd[3127]: CTRL: Couldn't write packet to client.<000>
Sep  9 15:50:07 pptpd[3127]: CTRL: Client 192.168.1.2 control connection finished<000>
Sep  9 15:50:07 pptpd[3127]: CTRL: Reaping child PPP[3128]<000>
Sep  9 15:50:07 pptpd[3127]: CTRL: PTY read or GRE write failed (pty,gre)=(7,9)<000>
Sep  9 15:50:07 pptpd[3127]: GRE: read(fd=7,buffer=44ff5c,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs<000>
Sep  9 15:50:07 pppd[3128]: rcvd [CCP ConfReq id=0x4 <mppe +H +M +S +L -D +C>]<000>
Sep  9 15:50:07 pppd[3128]: sent [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.1.254>]<000>
Sep  9 15:50:07 pppd[3128]: sent [CCP ConfReq id=0x1 <mppe -H -M -S -L -D +C> <bsd v1 15>]<000>
Sep  9 15:50:07 pppd[3128]: sent [CHAP Success id=0x3f "S=BD4A012BCCAE7C62DC2C282207CB29A8145B9502 M=Access granted"]<000>
Sep  9 15:50:07 pppd[3128]: rcvd [CHAP Response id=0x3f <540ce08e7734480a5eeaaff297d9af9700000000000000008c690fbe0da32b8764b26cfc7f9cd5a584cc11c0fba9bdbd00>, name = "te"]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP EchoRep id=0x0 magic=0x56a7768f]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP Ident id=0x3 magic=0x56a7768f "MSRAS-0-SILENTY"]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP Ident id=0x2 magic=0x56a7768f "MSRASV5.10"]<000>
Sep  9 15:50:06 pptpd[3127]: CTRL: Ignored a SET LINK INFO packet with real ACCMs!<000>
Sep  9 15:50:06 pppd[3128]: sent [CHAP Challenge id=0x3f <1a36cbdfd733f3a3687a1e833c48857b>, name = "*"]<000>
Sep  9 15:50:06 pppd[3128]: sent [LCP EchoReq id=0x0 magic=0xe900c34]<000>
Sep  9 15:50:06 pppd[3128]: sent [LCP ConfAck id=0x1 <mru 1400> <magic 0x56a7768f> <pcomp> <accomp>]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x56a7768f> <pcomp> <accomp>]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP ConfAck id=0x1 <mru 1450> <asyncmap 0x0> <auth chap MS-v2> <magic 0xe900c34> <pcomp> <accomp>]<000>
Sep  9 15:50:06 pppd[3128]: sent [LCP ConfRej id=0x0 <callback CBCP>]<000>
Sep  9 15:50:06 pppd[3128]: rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0x56a7768f> <pcomp> <accomp> <callback CBCP>]<000>
Sep  9 15:50:06 pppd[3128]: sent [LCP ConfReq id=0x1 <mru 1450> <asyncmap 0x0> <auth chap MS-v2> <magic 0xe900c34> <pcomp> <accomp>]<000>
Sep  9 15:50:06 pppd[3128]: Connect: ppp0 <--> /dev/pts/1<000>
Sep  9 15:50:06 pppd[3128]: Using interface ppp0<000>
Sep  9 15:50:06 pppd[3128]: using channel 6<000>
Sep  9 15:50:06 pppd[3128]: pppd 2.4.4 started by root, uid 0<000>
Sep  9 15:50:06 pptpd[3127]: CTRL: Starting call (launching pppd, opening GRE)<000>
Sep  9 15:50:06 pptpd[3127]: CTRL: Client 192.168.1.2 control connection started<000>


PassThrough ist deaktiviert und iptables -l sagt:
Code:
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:1723
ACCEPT     gre  --  anywhere             anywhere

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     tcp  --  anywhere             anywhere            tcp spt:1723
ACCEPT     gre  --  anywhere             anywhere


Ich habe leider keine Idee warum der Tunnel nicht aufgebaut, bzw. abgebaut wird. Ich hoffe mir kann jmd. von euch helfen. Gruß Björn

Hier noch meine Config:
Code:
/tmp/pptpd # cat options.pptpd
lock
name *
proxyarp
ipcp-accept-local
ipcp-accept-remote
lcp-echo-failure 10
lcp-echo-interval 5
deflate 0
auth
-chap
-mschap
+mschap-v2
mppe stateless
mppc
ms-ignore-domain
chap-secrets /tmp/pptpd/chap-secrets
ip-up-script /tmp/pptpd/ip-up
ip-down-script /tmp/pptpd/ip-down
ms-dns 192.168.1.254
mtu 1450
mru 1450
debug
/tmp/pptpd # cat pptpd.conf
bcrelay br0
localip 192.168.1.254
remoteip 192.168.10.111-122
Sponsor
Display posts from previous:    Page 1 of 1
Post new topic   Reply to topic    DD-WRT Forum Index -> Atheros WiSOC basierende Hardware All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum