228
Appendix E PPTP
N0115789
PPTP and the Business Secure Router
When the Business Secure Router is deployed in such a setup, it appears as a PC
to the ANT.
In Windows VPN or PPTP Pass-Through feature, the PPTP tunneling is created
from Windows 95, 98, and NT clients to an NT server in a remote location. Using
the pass-through feature, users on the network can access a different remote server
using the Business Secure Router's Internet connection. In SUA/NAT mode, the
Business Secure Router is able to pass the PPTP packets to the internal PPTP
server (for example, NT server) behind the NAT. You must configure port
forwarding for port 1723 to have the Business Secure Router forward PPTP
packets to the server. In the case above as the remote PPTP Client initializes the
PPTP connection, the user must configure the PPTP clients. The Business Secure
Router initializes the PPTP connection hence; there is no need to configure the
remote PPTP clients.
Figure 138
Business Secure Router as a PPTP client
PPTP protocol overview
PPTP is very similar to L2TP, since L2TP is based on both PPTP and L2F
(Cisco’s Layer 2 Forwarding). Conceptually, there are three parties in PPTP,
namely the PNS (PPTP Network Server), the PAC (PPTP Access Concentrator)
and the PPTP user. The PNS is the box that hosts both the PPP and the PPTP
stacks and forms one end of the PPTP tunnel. The PAC is the box that dials or
answers the phone calls and relays the PPP frames to the PNS. The PPTP user is
not necessarily a PPP client, it can also be a PPP server. Both the PNS and the
BCM50e Integrated Router
Summary of Contents for BCM50e
Page 18: ...18 Figures N0115789 ...
Page 22: ...22 Tables N0115789 ...
Page 28: ...28 Preface N0115789 ...
Page 38: ...38 Chapter 1 Getting to know your BCM50e Integrated Router N0115789 ...
Page 44: ...44 Chapter 2 Introducing the SMT N0115789 SMT menus at a glance Figure 6 SMT overview ...
Page 60: ...60 Chapter 4 LAN setup N0115789 ...
Page 82: ...82 Chapter 6 Remote Node setup N0115789 ...
Page 86: ...86 Chapter 7 IP Static Route Setup N0115789 ...
Page 114: ...114 Chapter 9 Network Address Translation NAT N0115789 ...
Page 136: ...136 Chapter 11 Filter configuration N0115789 ...
Page 140: ...140 Chapter 12 SNMP Configuration N0115789 ...
Page 144: ...144 Chapter 13 System security N0115789 ...
Page 172: ...172 Chapter 15 Firmware and configuration file maintenance N0115789 ...
Page 186: ...186 Chapter 17 Remote Management N0115789 ...
Page 206: ...206 Appendix B Triangle Route N0115789 ...
Page 226: ...226 Appendix D PPPoE N0115789 ...
Page 232: ...232 Appendix F N0115789 ...
Page 242: ...242 Appendix G IP subnetting N0115789 ...
Page 304: ...304 Appendix K Log descriptions N0115789 ...
Page 306: ...306 Appendix L Brute force password guessing protection N0115789 ...