SlideShare a Scribd company logo
1 of 5
Download to read offline
PPTP Configuration on Cisco Routers
What is PPTP
PPTP (Point to Point Tunneling Protocol) is a quick and easy solution to offer
remote access to users. Since it is natively supported on almost all Windows
operating systems (Windows XP, 7, 8 etc), this kind of remote access makes an
ideal solution for clients using windows OS. Also, you don’t need to install any
additional software on the client machine.
However, you should note that PPTP does not offer the strong encryption and
security offered by IPSEC or SSL VPN remote access solutions. Although the
Microsoft Point-to-Point Encryption (MPPE) supported by Cisco routers offers a
good degree of security, PPTP remote access should not be used in situations
where you need to provide access to high security resources and highly
confidential data.
Like other types of remote access solutions, a remote user can use PPTP to
connect to a corporate network and be treated as directly connected to that
internal network even if he is physically outside the network.
PPTP is always implemented between a server (e.g a Cisco router) and a client (e.g
a windows workstation). Cisco supports PPTP on its IOS routers. Cisco ASA
firewalls do not support termination of PPTP on the firewall itself.
Client Configuration
There are numerous resources for configuring PPTP on windows machines. See
some good tutorials below:
For Windows 7:
https://www.vpnvip.com/pptp-vpn-setup-windows-7.html
For Windows 8:
http://www.ibvpn.com/billing/knowledgebase/73/Set-up-the-PPTP-VPN-on-
Windows-8.html
Configuring PPTP on Cisco Router
For this tutorial I propose the following scenario: The enterprise has a network
with multiple sites connected via a VPN (this can be MPLS VPN, IPSEC VPN etc).
There is a single point connected to the internet and we need to offer a quick and
easy remote access solution for teleworkers to access the whole network
resources.
Assume that “Interface VLAN 1” with IP range 10.10.10.0/24 has routing access to
the whole VPN network. If we “attach” the remote access users via the PPTP
tunnel to this VLAN and assign them an IP address in the range 10.10.10.0/24,
then they will have full access to the whole network resources.
In this scenario we will be authenticating users from local usernames configured
on the Cisco router. For a more scalable and secure solution, I recommend using
an external RADIUS server to authenticate users.
For this example our hardware is a cisco 867VAE-k9 with image c860vae-
advsecurityk9-mz.152-4.M3.bin installed.
Configuration
The configuration needed to enable PPTP on the cisco router is described below :
vpdn enable <---- Enable VDPN (Virtual Private Dialup Network).
vpdn source-ip 1.1.1.1 < ----- The IP used for the incoming connections
vpdn-group Networkstraining < ------------ The name of the group
accept-dialin < ----- Enables the router to accept dial in
protocol pptp < ---------- Protocol to be used
virtual-template 1 < ---------- The interface used for access
interface Virtual-Template1 < -------- The interface used for cloning
description PPTP Access
ip unnumbered Vlan1 < ------------ Uses the IP configured on Vlan1 interface
ip virtual-reassembly in
load-interval 30
peer default ip address pool PPTP-Pool < ---- Assign IP’s to clients in the range
stated in PPTP-Pool
no keepalive
ppp encrypt mppe auto < ---- Use Microsoft mppe encryption with
automatically selected encryption strength (40, 56, or 128 bits)
ppp authentication ms-chap ms-chap-v2 < ---- Configure the authentication
method allowed
ip local pool PPTP-Pool 10.10.10.90 10.10.10.100 < ------ The range of IP’s that the
dial in client will receive
username RemoteUser password letmein < -------- Creates a local username and
password used for authentication. You can add more users here but we suggest a
RADIUS server.
Other config :
interface GigabitEthernet1
description WAN Interface
ip address 1.1.1.1 255.255.255.252
interface Vlan1
description LAN Network
ip address 10.10.10.1 255.255.255.0
Verification commands:
show users
Line User Host(s) Idle Location
* 6 vty 0 admin idle 00:00:00
Interface User Mode Idle Peer Address
Vi3 RemoteUser PPPoVPDN 00:05:40 2.2.2.2
show vpdn
%No active L2F tunnels
%No active L2TP tunnels
PPTP Tunnel and Session Information Total tunnels 1 sessions 1
LocID Remote Name State Remote Address Port Sessions VPDN Group
182 estabd 2.2.2.2 37277 1
Networkstraining
LocID RemID TunID Intf Username State Last Chg Uniq ID
64 49152 182 Vi3 RemoteUser estabd 2d15h 63
About the Author
Harris Andrea is a Cisco Certified Professional with more than 18 years of experience
working with Cisco network technologies. He is the author of two Cisco Books
(“Cisco ASA Firewall Fundamentals” and “Cisco VPN Configuration Guide”) which
have been embraced by thousands of Cisco professionals all over the world. You can
find more Cisco configuration guides and tutorials on his blog here
http://www.networkstraining.com

More Related Content

Viewers also liked

Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocol
asimnawaz54
 
Router commands
Router commandsRouter commands
Router commands
Laura Lahbib
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
rahul kundu
 
Math1003 1.9 - Converting Decimal to Binary and Hex
Math1003 1.9 - Converting Decimal to Binary and HexMath1003 1.9 - Converting Decimal to Binary and Hex
Math1003 1.9 - Converting Decimal to Binary and Hex
gcmath1003
 

Viewers also liked (19)

Address resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocolAddress resolution protocol and internet control message protocol
Address resolution protocol and internet control message protocol
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 
Transport layer
Transport layerTransport layer
Transport layer
 
Router commands
Router commandsRouter commands
Router commands
 
Arp
ArpArp
Arp
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
The Application Layer
The Application LayerThe Application Layer
The Application Layer
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
transport layer
transport layertransport layer
transport layer
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
Math1003 1.9 - Converting Decimal to Binary and Hex
Math1003 1.9 - Converting Decimal to Binary and HexMath1003 1.9 - Converting Decimal to Binary and Hex
Math1003 1.9 - Converting Decimal to Binary and Hex
 
Cisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening GuideCisco Router and Switch Security Hardening Guide
Cisco Router and Switch Security Hardening Guide
 
The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
TCP & UDP protocols
TCP & UDP protocols TCP & UDP protocols
TCP & UDP protocols
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

PPTP Configuration Tutorial on Cisco Router

  • 1. PPTP Configuration on Cisco Routers What is PPTP PPTP (Point to Point Tunneling Protocol) is a quick and easy solution to offer remote access to users. Since it is natively supported on almost all Windows operating systems (Windows XP, 7, 8 etc), this kind of remote access makes an ideal solution for clients using windows OS. Also, you don’t need to install any additional software on the client machine. However, you should note that PPTP does not offer the strong encryption and security offered by IPSEC or SSL VPN remote access solutions. Although the Microsoft Point-to-Point Encryption (MPPE) supported by Cisco routers offers a good degree of security, PPTP remote access should not be used in situations where you need to provide access to high security resources and highly confidential data. Like other types of remote access solutions, a remote user can use PPTP to connect to a corporate network and be treated as directly connected to that internal network even if he is physically outside the network. PPTP is always implemented between a server (e.g a Cisco router) and a client (e.g a windows workstation). Cisco supports PPTP on its IOS routers. Cisco ASA firewalls do not support termination of PPTP on the firewall itself. Client Configuration There are numerous resources for configuring PPTP on windows machines. See some good tutorials below: For Windows 7: https://www.vpnvip.com/pptp-vpn-setup-windows-7.html For Windows 8: http://www.ibvpn.com/billing/knowledgebase/73/Set-up-the-PPTP-VPN-on- Windows-8.html
  • 2. Configuring PPTP on Cisco Router For this tutorial I propose the following scenario: The enterprise has a network with multiple sites connected via a VPN (this can be MPLS VPN, IPSEC VPN etc). There is a single point connected to the internet and we need to offer a quick and easy remote access solution for teleworkers to access the whole network resources. Assume that “Interface VLAN 1” with IP range 10.10.10.0/24 has routing access to the whole VPN network. If we “attach” the remote access users via the PPTP tunnel to this VLAN and assign them an IP address in the range 10.10.10.0/24, then they will have full access to the whole network resources. In this scenario we will be authenticating users from local usernames configured on the Cisco router. For a more scalable and secure solution, I recommend using an external RADIUS server to authenticate users.
  • 3. For this example our hardware is a cisco 867VAE-k9 with image c860vae- advsecurityk9-mz.152-4.M3.bin installed. Configuration The configuration needed to enable PPTP on the cisco router is described below : vpdn enable <---- Enable VDPN (Virtual Private Dialup Network). vpdn source-ip 1.1.1.1 < ----- The IP used for the incoming connections vpdn-group Networkstraining < ------------ The name of the group accept-dialin < ----- Enables the router to accept dial in protocol pptp < ---------- Protocol to be used virtual-template 1 < ---------- The interface used for access interface Virtual-Template1 < -------- The interface used for cloning description PPTP Access ip unnumbered Vlan1 < ------------ Uses the IP configured on Vlan1 interface ip virtual-reassembly in load-interval 30 peer default ip address pool PPTP-Pool < ---- Assign IP’s to clients in the range stated in PPTP-Pool no keepalive ppp encrypt mppe auto < ---- Use Microsoft mppe encryption with automatically selected encryption strength (40, 56, or 128 bits) ppp authentication ms-chap ms-chap-v2 < ---- Configure the authentication method allowed
  • 4. ip local pool PPTP-Pool 10.10.10.90 10.10.10.100 < ------ The range of IP’s that the dial in client will receive username RemoteUser password letmein < -------- Creates a local username and password used for authentication. You can add more users here but we suggest a RADIUS server. Other config : interface GigabitEthernet1 description WAN Interface ip address 1.1.1.1 255.255.255.252 interface Vlan1 description LAN Network ip address 10.10.10.1 255.255.255.0 Verification commands: show users Line User Host(s) Idle Location * 6 vty 0 admin idle 00:00:00 Interface User Mode Idle Peer Address Vi3 RemoteUser PPPoVPDN 00:05:40 2.2.2.2
  • 5. show vpdn %No active L2F tunnels %No active L2TP tunnels PPTP Tunnel and Session Information Total tunnels 1 sessions 1 LocID Remote Name State Remote Address Port Sessions VPDN Group 182 estabd 2.2.2.2 37277 1 Networkstraining LocID RemID TunID Intf Username State Last Chg Uniq ID 64 49152 182 Vi3 RemoteUser estabd 2d15h 63 About the Author Harris Andrea is a Cisco Certified Professional with more than 18 years of experience working with Cisco network technologies. He is the author of two Cisco Books (“Cisco ASA Firewall Fundamentals” and “Cisco VPN Configuration Guide”) which have been embraced by thousands of Cisco professionals all over the world. You can find more Cisco configuration guides and tutorials on his blog here http://www.networkstraining.com