Last updated on June 9, 2020 by Dan Nanni
Point-to-Point Tunneling Protocol (PPTP) is a VPN tunneling protocol based on a client and server model. Microsoft Windows comes with a built-in PPTP client software, and so PPTP VPN is popular among Windows-running computers. PPTP server and client software is also available on Linux platform.
This tutorial describes how to set up a PPTP VPN server on Linux, and connect a Windows client to the server.
To set up a PPTP VPN server, you need to install PPTP VPN daemon software called
pptpd on Ubuntu or Debian:
$ sudo apt-get install pptpd
ppp and its development files with the following command:
$ sudo yum install ppp-devel
Note that on CentOS/RHEL,
ppp-devel is available from PowerTools repository, so you need to enable it first::
$ sudo yum config-manager --set-enabled powertools
After that, download the source code of the latest stable version of
pptpd-1.4.0.tar.gz) from the official source, and build it from the source.
$ sudo yum groupinstall 'Development Tools' $ tar -xf pptpd-1.4.0.tar.gz $ cd pptpd-1.4.0 $ ./configure $ make $ sudo make install
pptpd, go ahead and enable IP forwarding on the server.
pptpd by adding
localip (VPN server's IP address) and
remoteip (VPN client's IP addresses) in
/etc/pptpd.conf. In this example, the potential IP address of a VPN client is
10.0.0.2 or any IP address between
$ sudo vi /etc/pptpd.conf
localip 10.0.0.1 remoteip 10.0.0.2,10.0.0.10-30
Configure local DNS servers in
/etc/ppp/pptpd-options. For example, you could add public DNS servers provided by Google.
$ sudo vi /etc/ppp/pptpd-options
ms-dns 188.8.131.52 ms-dns 184.108.40.206
Configure user authentication using CHAP in
/etc/ppp/chap-secrets. In this example,
alice is a client's user name,
pptpd is server,
dfs is secret, and
* represents the allowed IP addresses of clients. In this case, any IP address is allowed.
$ sudo vi /etc/ppp/chap-secrets
alice pptpd dfs *
On Debian, Ubuntu or Linux Mint:
$ sudo /etc/init.d/pptpd restart
On CentOS or RHEL:
$ sudo service pptpd restart
$ sudo systemctl restart pptpd
Optionally, if the VPN server is behind a proxy, you need to set up port forwarding on TCP port
1723, which is used for VPN control channel.
Create a virtual private network connection.
Security tab, and mark "
Advanced (custom settings)". In the custom settings, choose "
Maximum strength encryption (disconnect if server declines)". If you do not perform this last step, you may get the following error in PPTP VPN server side (in
GRE: Bad checksum from pppd" error on the PPTP VPN server side
bad GRE checksum" error can also originate from router/AP's incapability of handling GRE packets. Some consumer-grade routers, wireless APs, or cable modems have a web-based management interface where you can enable or disable "
PPTP passthrough" or "
GRE passthrough" feature. So it is a good idea to check the management interface of your router/AP if PPTP VPN traffic goes through the router/AP.
Please note that this article is published by Xmodulo.com under a Creative Commons Attribution-ShareAlike 3.0 Unported License. If you would like to use the whole or any part of this article, you need to cite this web page at Xmodulo.com as the original source.