[ previous ] [ next ] [ threads ]
 
 From:  "Simon Vetterli" <simon dot vetterli at thaipath dot ch>
 To:  <m0n0wall at lists dot m0n0 dot ch>
 Subject:  Problem with VPN, PPTP and RDP
 Date:  Fri, 3 Mar 2006 06:34:13 +0100
I try to connect to my Windows 2003-Server over RDP, while I have my
PPTP-connection.



I can unblock?

System-Log:

Mar 3 06:24:30        mpd: [pt0] CCP: Checking whether 128 bits are
acceptable               -> yes
Mar 3 06:24:30        mpd: [pt0] CCP: SendConfigAck #6
Mar 3 06:24:30        mpd: MPPC
Mar 3 06:24:30        mpd: 0x01000040: MPPE, 128 bit, stateless
Mar 3 06:24:30        mpd: [pt0] CCP: state change Ack         -Rcvd  -->
Opened
Mar 3 06:24:30        mpd: [pt0] CCP: LayerUp
Mar 3 06:24:30        mpd: Compress using: MPPE, 128 bit, stateless
Mar 3 06:24:30        mpd: Decompress using: MPPE, 128 bit, stateless
Mar 3 06:24:30        mpd: [pt0] setting interface ng1 MTU to 1396 bytes
Mar 3 06:24:30        mpd: [pt0] IPCP: rec'd Configure Request #7 link 0 (Re
-Sent)
Mar 3 06:24:30        mpd: IPADDR 0.0.0.0
Mar 3 06:24:30        mpd: NAKing with 10.201.130.96
Mar 3 06:24:30        mpd: [pt0] IPCP: SendConfigNak #7
Mar 3 06:24:30        mpd: IPADDR 10.201.130.96
Mar 3 06:24:30        mpd: [pt0] IPCP: rec'd Configure Ack #66 link 0 (Req
-Sent)
Mar 3 06:24:30        mpd: IPADDR 10.201.130.254
Mar 3 06:24:30        mpd: [pt0] IPCP: state change Req         -Sent  -->
Ack  -Rcvd
Mar 3 06:24:30        mpd: [pt0] IPCP: rec'd Configure Request #8 link 0
(Ack            -Rcvd)
Mar 3 06:24:30        mpd: IPADDR 10.201.130.96
Mar 3 06:24:30        mpd: 10.201.130.96 is OK
Mar 3 06:24:30        mpd: [pt0] IPCP: SendConfigAck #8
Mar 3 06:24:30        mpd: IPADDR 10.201.130.96
Mar 3 06:24:30        mpd: [pt0] IPCP: state change Ack        -Rcvd   -->
Opened
Mar 3 06:24:30        mpd: [pt0] IPCP: LayerUp
Mar 3 06:24:30        mpd: 10.201.130.254        -> 10.201.130.96
Mar 3 06:24:30        mpd: [pt0] IFACE: Up event
Mar 3 06:24:30        mpd: [pt0] setting interface ng1 MTU to 1396 bytes
Mar 3 06:24:30        mpd: [pt0] exec: /sbin/ifconfig ng1 10.201.130.254
10.201.130.96 netmask 0xffffffff   -link0
Mar 3 06:24:30        mpd: [pt0] exec: /usr/sbin/arp       -s 10.201.130.96
0:d:b9:3:58:90 pub
Mar 3 06:24:30        mpd: [pt0] exec: /sbin/route add 10.201.130.254
-iface lo0
Mar 3 06:24:31        mpd: [pt0] exec: /usr/local/sbin/vpn       -linkup ng1
inet 10.201.130.254 10.201.130.96
                              administrator
Mar 3 06:24:31        mpd: [pt0] IFACE: Up event
Mar 3 06:24:31        mpd: [pt0] rec'd unexpected protocol IP on link
-1
Mar 3 06:24:31        last message repeated 2 times
Mar 3 06:24:35        racoon: INFO: 10.201.130.254[500] used as isakmp port
(fd=7)
Mar 3 06:24:35        racoon: INFO: 127.0.0.1[500] used as isakmp port
(fd=8)
Mar 3 06:24:35        racoon: INFO: 192.168.1.10[500] used as isakmp port
(fd=9)
Mar 3 06:24:35        racoon: INFO: 10.201.130.1[500] used as isakmp port
(fd=10)
Mar 3 06:24:35        racoon: INFO: 10.201.130.254[500] used as isakmp port
(fd=7)
Mar 3 06:24:35        racoon: INFO: 127.0.0.1[500] used as isakmp port
(fd=8)
Mar 3 06:24:35        racoon: INFO: 192.168.1.10[500] used as isakmp port
(fd=9)
Mar 3 06:24:35        racoon: INFO: 10.201.130.1[500] used as isakmp port
(fd=10)
Mar 3 06:24:36        racoon: INFO: 10.201.130.254[500] used as isakmp port
(fd=7)
Mar 3 06:24:36        racoon: INFO: 127.0.0.1[500] used as isakmp port
(fd=8)
Mar 3 06:24:36        racoon: INFO: 192.168.1.10[500] used as isakmp port
(fd=9)
Mar 3 06:24:36        racoon: INFO: 10.201.130.1[500] used as isakmp port
(fd=10)
Mar 3 06:24:36        racoon: INFO: 10.201.130.254[500] used as isakmp port
(fd=7)
Mar 3 06:24:36        racoon: INFO: 127.0.0.1[500] used as isakmp port
(fd=8)
Mar 3 06:24:36        racoon: INFO: 192.168.1.10[500] used as isakmp port
(fd=9)
Mar 3 06:24:36        racoon: INFO: 10.201.130.1[500] used as isakmp port
(fd=10)

FireWall-Log:

21:41:40.063666          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1772           TCP
21:42:02.699821          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1772           TCP
21:48:30.572166          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
21:48:31.721336          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
21:48:34.135495          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
21:48:48.520808          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
21:49:07.734373          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
21:49:30.573896          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1806           TCP
06:00:56.521197          PPTP      10.201.130.96
IGMP.MCAST.NET                     IGMP
06:02:08.710620          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:02:09.671292          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:02:11.684089          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:02:15.706747          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:02:23.652354          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:02:39.749684          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP
06:03:08.614275          LAN       co00s200.orthotop.ch, port 3389
10.201.130.96, port 1079           TCP

-------------------------------------
Simon Vetterli
Margarethenstrasse 1
CH-8152 Glattbrugg
Switzerland
-------------------------------------
http://www.thaipath.ch
simon dot vetterli at thaipath dot ch
mobile: +41 76 336 1155
phone: +41 44 500 2164
------------------------------------- 


-- 
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.0.375 / Virus Database: 268.1.1/273 - Release Date: 02.03.2006