Nope, incorrect. PPTP can be enabled on OpenVZ servers. Yes I've tried on BuyVM's VPS.
You can get it working with a lot of tweaking on the Hostnode, but I personally wouldn't enable it for customers as those changes need to be removed again when the customer leaves as well and instead of having the hassle to get it to work in the first place, I would rather go with Xen.
██Host Mist - Helping People Say Hello World
██Shared | VPS | Dedicated
I've tried to install the OpenVPN under QuickWeb Supa VZ2 OpenVZ, with Tun/Tap enabled, and it works.
My VPN can also be used for browsing the internet using the server ip.
And also can make connections between users connected to the VPN via internet. - Works on QuickWeb Supa VZ2
For XEN, it just as simple as running the vpsnoc openvpn installation script, and then we can start connecting to the internet trough our VPS.
As for the 123Systems OpenVZ, I can only connect each users to the VPS, but can not connect to the internet altough it's Tun/Tap enabled. And the problem is with the iptables modules. Nat is not supported.
As for the 123/Systems OpenVZ, I can only connect each users to the VPS, but can not connect to the internet altough it's Tun/Tap enabled. And the problem is with the iptables modules. Nat is not supported.
You can open a ticket with the support department and they can help you with that.
〓〓 QuadraNet ├ CLOUD ├ DEDICATED ├ COLOCATION 〓〓Locations: Los Angeles, Dallas and Miami!! 〓〓andrew.moore[at]quadranet.com 〓〓http://www.QuadraNet.com
I want that my clients JUST connect via my vpn server to surf the internet, by creating a VPN connection in network connections, instead using "OpenVPN Windows GUI Client",
so i must create Key for these users?
I got some example from Indonesian based VPS provider (webcipta.net), for the configuration of VPN users. If we don't want to create each keys for each users, maybe we just can create the users instead.
In the VPS :
Adding the user
# adduser pengguna -m -s /bin/false
Changing the user password
# passwd "username"
And for the VPN COnfiguation in the user side, maybe like this :
Take a notice at the line "auth-user-pass".All user who want to connect to the VPS must login using their username and password. But please set the user rights to limited, only for VPN usage. <-- this is the weakness, someone can try to put some shell script and hack your server.
Secure way, is creating each keys for each clients.
Input Text down
iptables -A INPUT -i eth0 -p tcp --dport 1723 -j ACCEPT
iptables -A INPUT -i eth0 -p gre -j ACCEPT
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -i ppp+ -o eth0 -j ACCEPT
iptables -A FORWARD -i eth0 -o ppp+ -j ACCEPT
chmod 777 /etc/csf/csfpre.sh
Input Text down
service pptpd stop
service pptpd start
chmod 777 /etc/csf/csfpost.sh
every things looks ok but when i connect to vpn via windows
i got Error 619
log messages are:
Oct 29 10:52:25 c156 pptpd: CTRL: Client xxx.xxx.xxx.xxx control connection started
Oct 29 10:52:25 c156 pptpd: CTRL: Starting call (launching pppd, opening GRE)
Oct 29 10:52:25 c156 pppd: This system lacks kernel support for PPP. This could be because the PPP kernel module could not be loaded, or because PPP was not included in the kernel configuration. If PPP was included as a module, try `/sbin/modprobe -v ppp'. If that fails, check that ppp.o exists in /lib/modules/`uname -r`/net. See README.linux file in the ppp distribution for more details.
Oct 29 10:52:25 c156 pptpd: GRE: read(fd=6,buffer=8059680,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
Oct 29 10:52:25 c156 pptpd: CTRL: PTY read or GRE write failed (pty,gre)=(6,7)
Oct 29 10:52:25 c156 pptpd: CTRL: Client xxx.xxx.xxx.xxx control connection finished