0% found this document useful (0 votes)
31 views1 page

PPTP - RouterOS - MikroTik Documentation

The document provides an overview of the PPTP (Point-to-Point Tunneling Protocol), highlighting its security issues and ease of setup. It details the configuration of both PPTP clients and servers, including properties, authentication methods, and examples of commands for setup. PPTP is noted for its compatibility with various firewalls and routers, though it is not recommended for secure networks.

Uploaded by

shurfbolita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

PPTP - RouterOS - MikroTik Documentation

The document provides an overview of the PPTP (Point-to-Point Tunneling Protocol), highlighting its security issues and ease of setup. It details the configuration of both PPTP clients and servers, including properties, authentication methods, and examples of commands for setup. PPTP is noted for its compatibility with various firewalls and routers, though it is not recommended for secure networks.

Uploaded by

shurfbolita
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

 Espacios   Buscar  Entrar

 Virtual Private Networks Panel / RouterOS / Virtual Private Networks  

PPTP
6to4

EoIP
Creado por Artūrs C., actualizado por última vez por Oskars K. el dic 19, 2024 • 4 min de lectura

GRE

IPIP
Overview
PPTP has many known security issues and we do not recommend using it. However, this protocol is integrated into common operating systems, and it is easy to set it up. PPTP can be useful in
 IPsec networks where security is not of concern.
 L2TP IPv6 is not supported on this protocol.
OpenVPN PPTP traffic uses TCP port 1723 and IP protocol GRE (Generic Routing Encapsulation, IP protocol ID 47), as assigned by the Internet Assigned Numbers Authority (IANA). PPTP can be used with
most firewalls and routers by enabling traffic destined for TCP port 1723 and protocol 47 traffic to be routed through the firewall or router. PPTP includes PPP authentication and accounting for
 PPPoE
each PPTP connection. Full authentication and accounting of each connection may be done through a RADIUS client or locally.
PPTP

SSTP
PPTP Client
WireGuard
Properties
ZeroTier
Property Description
 Wired Connections
add-default-route (yes | no; Default: no) Whether to add PPTP remote address as a default route.
 Wireless
 Internet of Things allow (mschap2 | mschap1 | chap | pap; Default: Allowed authentication methods.
mschap2, mschap1, chap, pap)
 Hardware
connect-to (IP; Default: ) Remote address of PPTP server
 Diagnostics, monitoring and troub
default-route-distance (byte [0..255]; Default: 1) sets distance value applied to auto created default route, if add-default-route is also selected
 Extended features
dial-on-demand (yes | no; Default: no) connects to PPTP server only when outbound traffic is generated. If selected, then route with gateway address from
10.112.112.0/24 network will be added while connection is not established.

disabled (yes | no; Default: yes) Whether interface is disabled or not. By default it is disabled

keepalive-timeout (integer; Default: 60) Sets keepalive timeout in seconds.

max-mru (integer; Default: 1450) Maximum Receive Unit. Max packet size that PPTP interface will be able to receive without packet fragmentation.

max-mtu (integer; Default: 1450) Maximum Transmission Unit. Max packet size that PPTP interface will be able to send without packet fragmentation.

mrru (disabled | integer; Default: disabled) Maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets,
allowing full size IP or Ethernet packets to be sent over the tunnel.

name (string; Default: ) Descriptive name of the interface.

password (string; Default: "") Password used for authentication.

profile (name; Default: default-encryption)

user (string; Default: ) User name used for authentication.

PPTP Server
/interface pptp-server

An interface is created for each tunnel established to the given server. There are two types of interfaces in the PPTP server's configuration:

Static interfaces are added administratively if there is a need to reference the particular interface name (in firewall rules or elsewhere) created for the particular user;
Dynamic interfaces are added to this list automatically whenever a user is connected and its username does not match any existing static entry (or in case the entry is active already, as
there can not be two separate tunnel interfaces referenced by the same name);

Dynamic interfaces appear when a user connects and disappear once the user disconnects, so it is impossible to reference the tunnel created for that use in router configuration (for example, in
firewall), so if you need persistent rules for that user, create a static entry for him/her. Otherwise, it is safe to use a dynamic configuration.

 In both cases PPP users must be configured properly - static entries do not replace PPP configuration.

Properties

Property Description

authentication (pap | chap | mschap1 | Authentication methods that server will accept.
mschap2; Default: mschap1,mschap2)

default-profile (name; Default: default-


encryption)

enabled (yes | no; Default: no) Defines whether PPTP server is enabled or not.

keepalive-timeout (time; Default: 30) If server during keepalive period does not receive any packet, it will send keepalive packets every second five times. If the server does not
receives response from the client, then disconnect after 5 seconds. Logs will show 5x "LCP missed echo reply" messages and then
disconnect.

max-mru (integer; Default: 1450) Maximum Receive Unit. Max packet size that PPTP interface will be able to receive without packet fragmentation.

max-mtu (integer; Default: 1450) Maximum Transmission Unit. Max packet size that PPTP interface will be able to send without packet fragmentation.

mrru (disabled | integer; Default: disabled) Maximum packet size that can be received on the link. If a packet is bigger than tunnel MTU, it will be split into multiple packets, allowing
full size IP or Ethernet packets to be sent over the tunnel.

Example

PPTP Client
The following example demonstrates how to set up a PPTP client with username "MT-User", password "StrongPass" and server 192.168.62.2:

[admin@MikroTik] > interface pptp-client add connect-to=192.168.62.2 disabled=no name=pptp-out1 password=StrongPass user=MT-User
[admin@MikroTik] > interface pptp-client print
Flags: X - disabled; R - running
0 R name="pptp-out1" max-mtu=1450 max-mru=1450 mrru=disabled connect-to=192.168.62.2 user="MT-User"
password="StrongPass" profile=default-encryption keepalive-timeout=60 add-default-route=no
dial-on-demand=no allow=pap,chap,mschap1,mschap2

PPTP Server
On the other side we simply enable the PPTP server and create a PPP secret for a particular user:

[admin@MikroTik] > interface pptp-server server set enabled=yes


[admin@MikroTik] > ppp secret add local-address=10.0.0.1 name=MT-User password=StrongPass profile=default-encryption remote-address=10.0.0.5 service=pptp
[admin@MikroTik] > interface pptp-server print
Flags: D - dynamic; R - running
Columns: NAME, USER, MTU, CLIENT-ADDRESS, UPTIME, ENCODING
# NAME USER MTU CLIENT-ADDRESS UPTIM ENCODING
0 DR <pptp-MT-User> MT-User 1450 192.168.51.3 44m8s MPPE128 stateless

Sin etiquetas

Desarrollado por Atlassian Confluence 9.2.0 · Informar de un error · Noticias de Atlassian

You might also like