This setup is for RedHat Enterprise Linux 5. (this should also work on Fedora and CentOS).
------------------------------------------------------------------------------------------------
Step 1. (Installation of PPP Package)
First we need to check whether we already have ppp package installed or not.
Code: Select all
[root@crystalnet.com]# rpm -qa | grep ppp
If the package in not installed you can download the package from
http://coolmudasir.googlepages.com/ppp- ... 5.i386.rpm
and install it using any of the two methods described below
You can also check for PPP latest packages atOnline installation: (Method 1)ORCode: Select all
[root@crystalnet.com]# rpm -ivh http://coolmudasir.googlepages.com/ppp-2.4.4-1.el5.i386.rpm
To download: (Method 2 - Part 1)To Install: (Method 2 - Part 2)Code: Select all
[root@crystalnet.com]# wget -ivh http://coolmudasir.googlepages.com/ppp-2.4.4-1.el5.i386.rpm
Code: Select all
[root@crystalnet.com]# rpm -ivh ppp-2.4.4-1.el5.i386.rpm
http://sourceforge.net/project/showfile ... _id=118989
------------------------------------------------------------------------------------------------
Step 2. (Installation of PPTP Package)
Again we will check if we the pptp package is already installed or not.
Code: Select all
[root@crystalnet.com]# rpm -qa | grep -t pptp
http://coolmudasir.googlepages.com/pptp ... 4.i386.rpm
and install the package using the command below
Code: Select all
[root@crystalnet.com]# rpm -ivh pptpd-1.3.3-1.rhel4.i386.rpm
http://sourceforge.net/project/showfile ... e_id=51373
------------------------------------------------------------------------------------------------
Step 3. (Check whether kernel supports MPPE-Microsoft Point-to-Point Encryption).
To check whether kernel supports MPPE simply issue the following.
Code: Select all
[root@crystalnet.com]# modprobe ppp-compress-18 && echo "MPPE Support available"
If the support for MPPE is not available then you will need to install DKMS and kernel_ppp_mppe RPM. You can check for latest DKMS and Kernel_ppp_mppe RPM at
http://sourceforge.net/project/showfile ... _id=120221
For convenience i have uploaded related RPM's to my web-site and can be easily downloaded and installed from there.
To install DKMS rpm
Code: Select all
[root@crystalnet.com]# rpm -ivh http://coolmudasir.googlepages.com/dkms-2.0.10-1.noarch.rpm
To install Kernel_ppp_mppe RPM
Code: Select all
[root@crystalnet.com]# rpm -ivh http://coolmudasir.googlepages.com/kernel_ppp_mppe-0.0.5-2dkms.noarch.rpm
Now you should reboot your computer, and then issue the modprobe command which was initially to check the MPPE Kernel Support.
------------------------------------------------------------------------------------------------
Step 4. (Configure PPTP Related Files)
The files we need to configure are
I have uploaded all sample files at1. /etc/pptpd.conf
2. /etc/ppp/options.pptpd
3. /etc/ppp/chap-secrets
You can download and take a look at it. Remember to copy these files at their respective locations.
I will not go in detailt o explain each and every option present in these files, it will take a very long time. I would prefer you to please download these files and read them as they are well commented.
------------------------------------------------------------------------------------------------
Step 5 (Starting and testing PPTP Service)
Code: Select all
[root@crystalnet.com]# service pptpd restart
The above command will restart PPTP Server and if any error occurs it will show.
Code: Select all
[root@crystalnet.com]# chkconfig pptpd on
This command will enable/start the PPTP Server at boot time.
Step 6 (Enable IP-Forwarding)
When the clients are connected, they will not be able to use internet as we have not enabled IP-Fowarding.
To enable IP-Forwarding issue the following.
Code: Select all
[root@crystalnet.com]# echo "echo 1 > /proc/sys/net/ipv4/ip_forward" >> /etc/rc.local
You can setup a complete firewall to work with this PPTP Setup.
Our PPTP Setup is now complete. I will be waiting for your comments about it, and also if you find any problems in this setup feel free to post here.