Setting up your VPN connection (PPTP) on your computer or mobile phone

These are tutorial to set up your VPN connection:

For Microsoft Windows:
You can establish secure, multiple-protocol Virtual Private Network (VPN) connections over public data networks such as the Internet using PPTP. By dialing into your Internet service provider's point of presence (POP), you can access your corporate networks and programs without dialing directly into the company's network. PPTP connects directly to the target server by creating a virtual network for each remote client. A Windows NT 4.0 Server administrator can monitor and manage such a virtual network just like any other remote access port. 

To use PPTP to connect to a server securely across the Internet, you must first install the PPTP protocol. To do so, follow these steps:
  1. In Control Panel, double-click Network, and then click the Protocols tab.
  2. Add Point To Point Tunneling Protocol.
  3. After the protocol is loaded, Remote Access Services Setup is invoked. You must add at least one VPN port as a port in RAS Setup. You may need to configure the newly created VPN adapter to "Dial out and receive calls." The default setting is "Receive calls only."
  4. Specify the protocols to run for the VPN port. You can install up to 256 VPN ports. Each VPN can be connected to a network.
  5. If you have Service Pack 3 or later installed, reapply the service pack, and then restart the computer.
To make a PPTP connection to a target server over the Internet, follow these steps:
  1. In Dial-Up Networking, make a new phone book entry for the target server. For the phone number, specify the IP address or host name of the server. Make sure to specify the VPN port you want to use. 

    NOTE: After you have a phone book entry set up, you can check and modify phone book settings by clicking More, and then clicking Edit Entry And Modem Properties. In the Phone Book Entry dialog box, verify that the Dial Using box specifies a VPN port. Click the Server tab, and verify that a protocol that the target server uses is selected. You can specify the security you want on the Security tab.
  2. Dial your ISP and make your connection to the Internet.
  3. When you are connected to your ISP, dial the target server to establish the PPTP connection.
 For Linux (Ubuntu)

VPN setup in Ubuntu 9.10

Install various VPN components

    1. PPTP
      • pptp-linux
      • network-manager-pptp
      b. VPNC
      • vpnc
      • network-manager-vpnc

      c. OpenConnect

      • openconnect
      • network-manager-openconnect
  • Reboot
  • PPTP VPN Configuration - This setup works for connecting to ISA 2004/2006 PPTP VPNs. It should work for connecting to MS PPTP VPN implementations in general. I can't speak for other PPTP VPN implementations.
    1. Create new PPTP connection
      • VPN Tab Settings
      • Set Connection name
      • Set Gateway
      • Set username (for domain-based user accounts, use domain\username)
      • DO NOT SET PASSWORD
      • DO NOT SET NT DOMAIN
      • PPTP Advanced Options (Advanced button)
      • uncheck all auth methods EXCEPT MSCHAPv2
      • check "Use Point-to-Point encryption (MPPE)"
        • leave Security set at "All Available (Default)"
        • trying to force encryption level causes this option to become unset
      • check "Allow stateful inspection"
      • uncheck "Allow BSD Data Compression"
      • uncheck "Allow Deflate Data Compression"
      • uncheck "Use TCP Header Compression"
      • uncheck "Send PPP Echo Packets" (although connection works either checked or unchecked)
      • save configuration
      b. Initial Connection attempt
      • enter password in login box
      • DO NOT check either password save box at this time
      • once connection establishes, verify remote connectivity - ping, rdp, ssh, etc.
      • disconnect VPN session
      c. 2nd connection attempt
      • enter password in login box
      • check both password save option boxes
      • once again verify remote connectivity
      • disconnect VPN session
      d. Subsequent connection attempts
      • VPN session should automatically connect using saved auth credentials
  • VPNC VPN Configuration - This setup works connecting to an ASA5510 - software version 8.2(1). I didn't have any other Cisco devices to test against.
    1. Create new VPNC connection
      • set connection name
      • set Gateway
      • set Group Name
      • set User Password to "Saved" and enter password
      • set Group Password to "Saved" and enter password
      • set username
      • set domain (if applicable)
      • leave Encryption Method at "Secure (Default)"
      • set NAT traversal to "NAT-T"
      • save configuration
      b. Initial Connection attempt
      • open VPNC connection
      • if prompted, select "Always Allow" if you want connection to be automatic
      • verify remote connectivity - ping, rdp, ssh, etc.
      • disconnect VPN session
      c. Subsequent connection attempts
      • open VPNC connection - session should automatically connect
  • OpenConnect VPN Configuration - This setup works connecting to an ASA5510 - software version 8.2(1). I didn't have any other Cisco devices to test against.

    1. Create new OpenConnect connection

      • set connection name
      • set Gateway
      • set Authentication type to "Password/SecurID"
      • no need to set username, OpenConnect won't store it yet

      • save configuration
      b. Initial connection attempt
      • open VPN connection
      • check "Automatically start connecting next time"
      • click Close
      • you will get the "No Valid VPN Secrets" VPN failure message
      c. 2nd connection attempt
      • open VPN connection
      • accept certificate (if prompted)
      • change Group (if necessary)
      • enter username (may need to be domain\username)
      • enter password
      • click Login
      • if VPN connection fails, see note below
      • verify remote connectivity - ping, rdp, ssh, etc.
      • disconnect session
      d. Subsequent connection attempts
      • open VPN connection
      • enter password
      • session should connect

    Note: If you get the "Login Failed" message, cancel and wait 15-30 minutes before attempting to connect again. Also, I ended up having to use the NT style domain\username pair for authentication, even though a Cisco AnyConnect client connecting to the same ASA only requires username.

    More Detail: OpenConnect has been brutal to get connected. I got failed attempt after failed attempt. When I checked the NPS (IAS) log and the Security Event log on the W2K8 domain controller, I could see my user account authenticating properly via RADIUS from the ASA. Yet theOpenConnect client came back with a "Login Failed" message. I'm not an ASA expert, so I have no idea what to check in the ASA configuration to troubleshoot this problem, other than the basic AAA configuration. But I believe the problem lies in the ASA configuration because when I get theOpenConnect "Login Failed" message, the AnyConnect client from my Windows laptop fails as well. I think it may be a ridiculously short timeout or max failure setting. Whatever the issue is, I have to wait for some length of time (~15-30 minutes) for whatever the problem is to reset.

    However, once I finally get the OpenConnect client to successfully connect, it worked from then on. (Just don't mess with the connection configuration, or you will get to go thru this whole process again.)

 

VPN setup in Ubuntu 10.04

Ubuntu 10.04 comes preinstalled with VPN support.

This features is available under the networks connections tab.


For Android

Android has integrated support for PPTP and L2TP VPNs. You can connect to these types of VPNs without installing any third-party apps.

To connect to a compatible VPN, open the Settings app and tap More under Wireless & networks. (On Android 2.3, tap Wireless & networks.)

more-wireless-and-networks-settings

Tap the VPN option on the Wireless & networks screen. (On Android 2.3, tap VPN Settings.)

android-vpn-settings

Tap the + button and provide the VPN’s details. Enter a name to help you remember which VPN is which into the Name field, select the type of VPN server you’re connecting to, and enter the VPN server’s address (either an address like vpn.example.com or a numerical IP address).

android-create-vpn-profile

Tap the VPN to connect once you have set it up. You can have multiple VPN servers configured and switch between them from the VPN screen.

You will need the username and password your VPN requires when you connect. However, you can save this account information for next time.

android-vpn-credentials

While connected to a VPN, you will see a persistent “VPN activated” notification in your notifications drawer. To disconnect, tap the notification and tap Disconnect.

android-vpn-activated

Always-On VPN Mode

Android 4.2 includes the option to enable always-on VPN mode. When this option is enabled, Android will never allow data to be sent except over the VPN. This can be useful if you are using public Wi-Fi and want to ensure your VPN is always used.

To enable this option, you must first connect to a VPN and save your account information. You will then find the option under the menu button.

android-always-on-vpn

Again, this feature is only offered in Android 4.2, so you won’t see it if your smartphone or tablet uses an older version of Android.

 
For other OS please check on the internet for a complete tutorial.

Let us know if you have any difficulty to set up your VPN connection
 
 
 
 
  • 2 Users Found This Useful
Was this answer helpful?

Related Articles

how to transfer a domain name to our service?

You can transfer your domain to our service as long as you have an EPP code. You can get the EPP...

Detail information of Nameserver, IP address and many more to configure on your CPanel hosting account

Detail information on nameservers, IP addresses and email configuration on your Cpanel hosting...

Purchasing with different currencies

If you want to purchase by using different currencies click "Step 1: Choose product" and choose...

OPENVPN tutorial

Dear Customer,First thing that you need is an .ovpn file that we have provided for you to access...

how to access your cpanel hosting account

Read our article on the easy way to access your cPanel hosting account

Powered by WHMCompleteSolution