No, we're not doing any NAT at all on the border router. It's done  on a
seperate firewall..

Here's something that might make sense but our border router is plugged into
a hub. This hub is where this VPN box is plugged into along with a Solaris
running Raptor. Basically, Im running a parallel firewall / VPN config.

I have tried removing MPPE, configured it for MPPE 128, MPPE 40, passive,
stateful, pretty much any combination but it doesn't seem to work.

As far as the RADIUS go, It's not even reaching the stage where Radius
packets are being passed. It's pretty much just trying to negotiate the
authentication type and then it's getting dropped.

I will test some VPDN packet * debugs and then I'll try to post it again.

FYI, I used NT 4, Win2K, and win 98 as clients to test this out but all of
them failed pretty much at the same stage.

I'm using IOS 12.2.1... I wonder if there is a bug with this IOS?

Guys, I really appreciate this help!




""EA Louie""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Doing NAT anywhere?  Like at the Internet Border Router?
>
> -e-
>
> ----- Original Message -----
> From: "Rahul Kachalia"
> To:
> Sent: Wednesday, June 13, 2001 10:11 PM
> Subject: Re: PPP Negotiation question --- HELP!!! PLEASE! [7:8438]
>
>
> > Kenneth,
> >
> >   Few strange this from following trace..
> >
> > 1. PPTP does comes in & establishes connection & which brings vaccess
> > interface up too..if thats the case then why outgoing PPP packets are
not
> > shown in debug. Try turning "debug vpdn packet" "debug vpdn error" &
> "debug
> > vpdn event" on & see if you get traces after placing pptp call.
> >
> > 2. As you mentioned connection doesnt comes up, from following traces i
> > didnt found it went back down if its true then i need traces till that
> level
> > to see which process/layer failed to establish connection .
> >
> > 3. You have configured AAA for login but i didnt saw any UDP packet
going
> to
> > internal network for getting authenticatad.
> >
> >   Just curious if you can try after removing MPPE if that works then try
> > configuring it to auto "ppp encrypt mppe auto", but i would prefer just
> try
> > without encryption first & see if that works. Tommorow i will simulate
in
> > lab to figure out whats causing it meanwhile you can provide above
traces.
> >
> >   Also let me know your email id, since this email id fails to deliver
> > message.
> >
> > thanks,
> > rahul.
> >
> > om: "Kenneth"
> > Reply-To: "Kenneth"
> > To: [EMAIL PROTECTED]
> > Subject: Re: PPP Negotiation question --- HELP!!! PLEASE! [7:8438]
> > Date: Wed, 13 Jun 2001 23:17:09 -0400
> >
> > Nothing came up with the debugs you listed except for ip packet detail
> >
> > The router is a 2621 with 2 Fastethernet ports. Fa0/0 is connected to
our
> > internal network, while Fa0/1 is connected to a border router to the
> > internet.  PPTP arrives on the Fa0/1 interface. Fa0/1 has a public IP
> > address while Fa0/0 has the private address.
> >
> > Here's the debug from debug ip packet det - I replaced the router's
public
> > ip with A.B.C.D
> >
> >
> > Jun 13 22:51:35: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 116, sending
> > Jun 13 22:51:35:     TCP src=22, dst=2604, seq=1252417216, ack=391149,
> > win=4028 ACK PSH
> > Jun 13 22:51:35: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 40, rcvd 3
> > Jun 13 22:51:35:     TCP src=2604, dst=22, seq=391149, ack=1252417292,
> > win=8120 ACK
> > Jun 13 22:51:36: IP: s=192.168.1.3 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:36: IP: s=192.168.1.1 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:36: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 44, rcvd 3
> > Jun 13 22:51:36:     TCP src=2626, dst=1723, seq=384185, ack=0, win=8192
> SYN
> > Jun 13 22:51:36: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 40, rcvd 3
> > Jun 13 22:51:36:     TCP src=2626, dst=1723, seq=384186, ack=79997953,
> > win=8576 ACK
> > Jun 13 22:51:36: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 196, rcvd 3
> > Jun 13 22:51:36:     TCP src=2626, dst=1723, seq=384186, ack=79997953,
> > win=8576 ACK PSH
> > Jun 13 22:51:37: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 208, rcvd 3
> > Jun 13 22:51:37:     TCP src=2626, dst=1723, seq=384342, ack=79998109,
> > win=8420 ACK PSH
> > Jun 13 22:51:37: %LINK-3-UPDOWN: Interface Virtual-Access1, changed
state
> to
> > up
> > Jun 13 22:51:37: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:37: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 64, rcvd 3
> > Jun 13 22:51:37:     TCP src=2626, dst=1723, seq=384510, ack=79998141,
> > win=8388 ACK PSH
> > Jun 13 22:51:37: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 53, rcvd 3, proto=47
> > Jun 13 22:51:37: IP: s=192.168.1.5 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:37: IP: s=192.168.1.10 (local), d=224.0.0.10
> (FastEthernet0/0),
> > len 60, sending broad/multicast, proto=88
> > Jun 13 22:51:37: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 55, rcvd 3, proto=47
> > Jun 13 22:51:38: IP: s=172.16.3.1 (local), d=224.0.0.10 (Loopback0), len
> 60,
> > sending broad/multicast, proto=88
> > Jun 13 22:51:38: IP: s=172.16.3.1 (Loopback0), d=224.0.0.10, len 60,
rcvd
> 2,
> > proto=88
> > Jun 13 22:51:38: %LINEPROTO-5-UPDOWN: Line protocol on Interface
> > Virtual-Access1, changed state to up
> > Jun 13 22:51:38: IP: s=192.168.1.97 (FastEthernet0/0), d=192.168.1.255
> > (FastEthernet0/0), len 229, rcvd 3
> > Jun 13 22:51:38:     UDP src=138, dst=138
> > Jun 13 22:51:38: IP: s=192.168.1.9 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:38: IP: s=192.168.1.33 (FastEthernet0/0), d=192.168.1.255
> > (FastEthernet0/0), len 78, rcvd 3
> > Jun 13 22:51:38:     UDP src=137, dst=137
> > Jun 13 22:51:39: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:39: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 57, rcvd 3, proto=47
> > Jun 13 22:51:39: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 51, rcvd 3, proto=47
> > Jun 13 22:51:39: IP: s=192.168.1.33 (FastEthernet0/0), d=192.168.1.255
> > (FastEthernet0/0), len 78, rcvd 3
> > Jun 13 22:51:39:     UDP src=137, dst=137
> > Jun 13 22:51:39: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 60, rcvd 3
> > Jun 13 22:51:39:     TCP src=2604, dst=22, seq=391149, ack=1252417292,
> > win=8120 ACK PSH
> > Jun 13 22:51:39: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 76, sending
> > Jun 13 22:51:39:     TCP src=22, dst=2604, seq=1252417292, ack=391169,
> > win=4008 ACK PSH
> > Jun 13 22:51:40: IP: s=192.168.1.33 (FastEthernet0/0), d=192.168.1.255
> > (FastEthernet0/0), len 78, rcvd 3
> > Jun 13 22:51:40:     UDP src=137, dst=137
> > Jun 13 22:51:40: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 40, rcvd 3
> > Jun 13 22:51:40:     TCP src=2604, dst=22, seq=391169, ack=1252417328,
> > win=8084 ACK
> > Jun 13 22:51:40: IP: s=192.168.1.3 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:40: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 60, rcvd 3
> > Jun 13 22:51:41:     TCP src=2604, dst=22, seq=391169, ack=1252417328,
> > win=8084 ACK PSH
> > Jun 13 22:51:41: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 76, sending
> > Jun 13 22:51:41:     TCP src=22, dst=2604, seq=1252417328, ack=391189,
> > win=3988 ACK PSH
> > Jun 13 22:51:41: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 40, rcvd 3
> > Jun 13 22:51:41:     TCP src=2604, dst=22, seq=391189, ack=1252417364,
> > win=8048 ACK
> > Jun 13 22:51:41: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:41: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 55, rcvd 3, proto=47
> > Jun 13 22:51:41: IP: s=192.168.1.1 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:41: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 60, rcvd 3
> > Jun 13 22:51:41:     TCP src=2604, dst=22, seq=391189, ack=1252417364,
> > win=8048 ACK PSH
> > Jun 13 22:51:41: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 100, sending
> > Jun 13 22:51:41:     TCP src=22, dst=2604, seq=1252417364, ack=391209,
> > win=3968 ACK PSH
> > Jun 13 22:51:41: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 60, rcvd 3
> > Jun 13 22:51:41:     TCP src=2604, dst=22, seq=391209, ack=1252417424,
> > win=8576 ACK PSH
> > Jun 13 22:51:41: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 100, sending
> > Jun 13 22:51:41:     TCP src=22, dst=2604, seq=1252417424, ack=391229,
> > win=3948 ACK PSH
> > Jun 13 22:51:41: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 40, rcvd 3
> > Jun 13 22:51:41:     TCP src=2604, dst=22, seq=391229, ack=1252417484,
> > win=8516 ACK
> > Jun 13 22:51:41: IP: s=192.168.1.10 (local), d=224.0.0.10
> (FastEthernet0/0),
> > len 60, sending broad/multicast, proto=88
> > Jun 13 22:51:41: IP: s=172.16.3.1 (local), d=224.0.0.10
(Virtual-Access1),
> > len 60, sending broad/multicast, proto=88
> > Jun 13 22:51:41: IP: s=172.16.3.1 (local), d=224.0.0.10
(Virtual-Access1),
> > len 60, encapsulation failed, proto=88
> > Jun 13 22:51:42: IP: s=192.168.1.5 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:42: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 53, rcvd 3, proto=47
> > Jun 13 22:51:42: IP: s=172.16.3.1 (local), d=224.0.0.10 (Loopback0), len
> 60,
> > sending broad/multicast, proto=88
> > Jun 13 22:51:42: IP: s=172.16.3.1 (Loopback0), d=224.0.0.10, len 60,
rcvd
> 2,
> > proto=88
> > Jun 13 22:51:43: IP: s=192.168.1.9 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:43: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:43: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 55, rcvd 3, proto=47
> > Jun 13 22:51:44: IP: s=192.168.1.50 (FastEthernet0/0),
d=255.255.255.255,
> > len 164, rcvd 2
> > Jun 13 22:51:44:     UDP src=1042, dst=12974
> > Jun 13 22:51:44: IP: s=192.168.1.15 (FastEthernet0/0), d=192.168.1.255
> > (FastEthernet0/0), len 213, rcvd 3
> > Jun 13 22:51:44:     UDP src=138, dst=138
> > Jun 13 22:51:45: IP: s=192.168.1.3 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:45: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:45: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 55, rcvd 3, proto=47
> > Jun 13 22:51:46: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 53, rcvd 3, proto=47
> > Jun 13 22:51:46: IP: s=192.168.1.1 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:46: IP: s=192.168.1.5 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:46: IP: s=192.168.1.10 (local), d=224.0.0.10
> (FastEthernet0/0),
> > len 60, sending broad/multicast, proto=88
> > Jun 13 22:51:46: IP: s=172.16.3.1 (local), d=224.0.0.10
(Virtual-Access1),
> > len 60, sending broad/multicast, proto=88
> > Jun 13 22:51:46: IP: s=172.16.3.1 (local), d=224.0.0.10
(Virtual-Access1),
> > len 60, encapsulation failed, proto=88
> > Jun 13 22:51:47: IP: s=172.16.3.1 (local), d=224.0.0.10 (Loopback0), len
> 60,
> > sending broad/multicast, proto=88
> > Jun 13 22:51:47: IP: s=172.16.3.1 (Loopback0), d=224.0.0.10, len 60,
rcvd
> 2,
> > proto=88
> > Jun 13 22:51:47: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 55, sending, proto=47
> > Jun 13 22:51:47: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 55, rcvd 3, proto=47
> > Jun 13 22:51:47: IP: s=192.168.1.9 (FastEthernet0/0), d=224.0.0.10, len
> 60,
> > rcvd 2, proto=88
> > Jun 13 22:51:47: IP: s=66.32.46.139 (FastEthernet0/1), d=A.B.C.D
> > (FastEthernet0/1), len 60, rcvd 3
> > Jun 13 22:51:47:     TCP src=2604, dst=22, seq=391229, ack=1252417484,
> > win=8516 ACK PSH
> > Jun 13 22:51:47: IP: s=A.B.C.D (local), d=66.32.46.139
(FastEthernet0/1),
> > len 60, sending
> > Jun 13 22:51:47:     TCP src=22, dst=2604, seq=1252417484, ack=391249,
> > win=3928 ACK PSH
> >
> >
> > ""Rahul Kachalia""  wrote in message
> > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> >  > Kenneth,
> >  >
> >  >     I cant see single LCP coming in..anyway provide following outputs
> > after
> >  > turning debugs on.
> >  >
> >  > show radius statistics.
> >  > debug aaa authen
> >  > debug ppp mppe pack
> >  > show ppp mppe virtual-access
> >  >
> >  >     if no traces comes up with this debugs..then turn "debug ip pack
> det"
> > &
> >  > place pptp call again I am expecting tcp packet here..if not then
there
> > is
> >  > definatly L2 problems.. Also looking from configs I can see only FE,
> may
> > i
> >  > know where is the PPTP call is arriving? Is it over PPPoE ( FE0/1 )??
> > Kindly
> >  > provide your topology based on configs I am assuming every thing is
> > local.
> >  >
> >  > thanks,
> >  > rahul.
> >  >
> >  > ----- Original Message -----
> >  > From: "Kenneth"
> >  > To:
> >  > Sent: Wednesday, June 13, 2001 5:49 PM
> >  > Subject: Re: PPP Negotiation question --- HELP!!! PLEASE! [7:8438]
> >  >
> >  >
> >  > > Here's my config, Rahul, I hope you can help me out on this. I also
> > have
> >  > the
> >  > > debugs included below the configs.
> >  > >
> >  > > !
> >  > > ! Last configuration change at 15:12:59 EDT Wed Jun 13 2001 by
> klorenzo
> >  > > !
> >  > > version 12.2
> >  > > no service single-slot-reload-enable
> >  > > service timestamps debug datetime localtime
> >  > > service timestamps log datetime localtime
> >  > > service password-encryption
> >  > > !
> >  > > hostname XXX
> >  > > !
> >  > > logging buffered 12000 debugging
> >  > > logging rate-limit console 10 except errors
> >  > > aaa new-model
> >  > > aaa authentication login default group radius local none
> >  > > aaa authentication login console group radius local none
> >  > > aaa authentication login vty group radius local
> >  > > aaa authentication ppp default group radius local
> >  > > aaa authorization exec default group radius local
> >  > > aaa authorization exec telnet group radius
> >  > > aaa accounting exec shell start-stop group radius
> >  > > aaa accounting network default start-stop group radius
> >  > > enable secret 5 XXX.
> >  > > !
> >  > > clock timezone EST -5
> >  > > clock summer-time EDT recurring
> >  > > ip subnet-zero
> >  > > no ip source-route
> >  > > !
> >  > > !
> >  > > no ip finger
> >  > > ip domain-name ctnet.com
> >  > > ip name-server 192.168.1.11
> >  > > !
> >  > > ip inspect audit-trail
> >  > > ip audit attack action alarm drop
> >  > > ip audit notify log
> >  > > ip audit po max-events 100
> >  > > ip dhcp-server 192.168.1.11
> >  > > no ip dhcp-client network-discovery
> >  > > ip ssh time-out 120
> >  > > ip ssh authentication-retries 3
> >  > > vpdn enable
> >  > > no vpdn logging local
> >  > > no vpdn logging remote
> >  > > no vpdn logging user
> >  > > !
> >  > > vpdn-group 1
> >  > > ! Default PPTP VPDN group
> >  > >  accept-dialin
> >  > >   protocol pptp
> >  > >   virtual-template 1
> >  > >
> >  > > !
> >  > > !
> >  > > call rsvp-sync
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > interface Loopback0
> >  > >  ip address 172.16.3.1 255.255.255.0
> >  > > !
> >  > > interface FastEthernet0/0
> >  > >  ip address 192.168.1.10 255.255.255.0
> >  > >  speed 100
> >  > >  full-duplex
> >  > > !
> >  > > interface Serial0/0
> >  > >  no ip address
> >  > >  shutdown
> >  > >  no fair-queue
> >  > > !
> >  > > interface FastEthernet0/1
> >  > >  ip address A.B.C.D 255.255.255.0
> >  > >  duplex auto
> >  > >  speed auto
> >  > >  pppoe enable
> >  > > !
> >  > > interface Virtual-Template1
> >  > >  ip unnumbered Loopback0
> >  > >  ip mroute-cache
> >  > >  peer default ip address pool testpool
> >  > >  ppp encrypt mppe 128
> >  > >  ppp authentication ms-chap
> >  > > !
> >  > > router eigrp 1000
> >  > >  passive-interface FastEthernet0/1
> >  > >  network 172.16.0.0
> >  > >  network 192.168.1.0
> >  > >  no auto-summary
> >  > >  no eigrp log-neighbor-changes
> >  > > !
> >  > > ip local pool testpool 172.16.3.2 172.16.3.10
> >  > > ip kerberos source-interface any
> >  > > ip classless
> >  > > ip route 0.0.0.0 0.0.0.0 A.B.C.D
> >  > > ip route X.Y.0.0 255.255.0.0 X.Y.1.1
> >  > > no ip http server
> >  > > !
> >  > > ip radius source-interface FastEthernet0/0
> >  > > !
> >  > > snmp-server community network~elites1 RO
> >  > > snmp-server location Cleveland,OH
> >  > > snmp-server contact Kenneth Lorenzo
> >  > > radius-server host 192.168.1.195 auth-port 1645 acct-port 1646
> >  > > radius-server retransmit 2
> >  > > radius-server timeout 10
> >  > > radius-server deadtime 2
> >  > > radius-server key 7 XXX!
> >  > > dial-peer cor custom
> >  > > !
> >  > > !
> >  > > !
> >  > > !
> >  > > banner motd ^C
> >  > >           **********************************************
> >  > >           *                                            *
> >  > >           *      Access to this router is logged       *
> >  > >           *     Unauthorized Access is not allowed     *
> >  > >           *       and will be persecuted to the        *
> >  > >           *          full extent of the law            *
> >  > >           *                                            *
> >  > >           **********************************************
> >  > > ^C
> >  > > !
> >  > > line con 0
> >  > >  exec-timeout 5 0
> >  > >  authorization exec telnet
> >  > >  accounting exec shell
> >  > >  login authentication console
> >  > >  transport input none
> >  > > line aux 0
> >  > >  no exec
> >  > >  authorization exec telnet
> >  > >  accounting exec shell
> >  > >  login authentication console
> >  > > line vty 0 4
> >  > >  authorization exec telnet
> >  > >  accounting exec shell
> >  > >  login authentication vty
> >  > >  transport input ssh
> >  > > line vty 5 15
> >  > >  authorization exec telnet
> >  > >  accounting exec shell
> >  > >  login authentication vty
> >  > >  transport input ssh
> >  > > !
> >  > > ntp clock-period 17179778
> >  > > ntp server 192.168.1.2
> >  > > end
> >  > >
> >  > >
> >  > > ------ Debugs ---
> >  > >
> >  > > Jun 13 15:23:47: Vi1 LCP: TIMEout: State REQsent
> >  > > Jun 13 15:23:47: Vi1 LCP: O CONFREQ [REQsent] id 38 len 15
> >  > > Jun 13 15:23:47: Vi1 LCP:    AuthProto MS-CHAP (0x0305C22380)
> >  > > Jun 13 15:23:47: Vi1 LCP:    MagicNumber 0x067E3C84
(0x0506067E3C84)
> >  > > Jun 13 15:23:47: Vi1 VPDN: O out
> >  > > Jun 13 15:23:49: Vi1 LCP: TIMEout: State REQsent
> >  > > Jun 13 15:23:49: Vi1 LCP: O CONFREQ [REQsent] id 39 len 15
> >  > > Jun 13 15:23:49: Vi1 LCP:    AuthProto MS-CHAP (0x0305C22380)
> >  > > Jun 13 15:23:49: Vi1 LCP:    MagicNumber 0x067E3C84
(0x0506067E3C84)
> >  > > Jun 13 15:23:49: Vi1 VPDN: O out
> >  > > Jun 13 15:23:49: Vi1 PPP: Outbound ip packet dropped, line protocol
> not
> > up
> >  > > Jun 13 15:23:51: Vi1 LCP: TIMEout: State REQsent
> >  > > Jun 13 15:23:51: Vi1 LCP: O CONFREQ [REQsent] id 40 len 15
> >  > > Jun 13 15:23:51: Vi1 LCP:    AuthProto MS-CHAP (0x0305C22380)
> >  > > Jun 13 15:23:51: Vi1 LCP:    MagicNumber 0x067E3C84
(0x0506067E3C84)
> >  > > Jun 13 15:23:51: Vi1 VPDN: O out
> >  > >
> >  > >
> >  > >
> >  > >
> >  > > ""Rahul Kachalia""  wrote in message
> >  > > [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> >  > > > Kenneth,
> >  > > >
> >  > > >     Can you paste those contents & if possible configs of router.
> >  > > >
> >  > > > thanks,
> >  > > > rahul.
> >  > > > ----- Original Message -----
> >  > > > From: "Kenneth"
> >  > > > To:
> >  > > > Sent: Wednesday, June 13, 2001 3:59 PM
> >  > > > Subject: PPP Negotiation question --- HELP!!! PLEASE! [7:8438]
> >  > > >
> >  > > >
> >  > > > > Can anyone shed light on this problem im having.
> >  > > > >
> >  > > > > I have 1 laptop with Sniffer pro and a router on the other end
> > running
> >  > > > PPTP
> >  > > > > set for Ms-chap authentication.
> >  > > > >
> >  > > > > When I tried to establish a PPTP session from the laptop to the
> >  > router,
> >  > > > all
> >  > > > > it does is it times out. The router is acting as a PPTP server.
> >  > > > >
> >  > > > > When I look at the sniffer's output, I can see the:
> >  > > > >
> >  > > > > 1) PPP ConfReq sent to the Router from my laptop
> >  > > > > 2) PPP ConfReq sent from the router to my laptop
> >  > > > > 3) PPP ConfAck sent from my laptop to the Router
> >  > > > >
> >  > > > > but when I look at the debug PPP negotiation on the router, all
I
> > see
> >  > is
> >  > > > > that the router keep sending out PPP ConfReq and it's timing
out.
> > It's
> >  > > not
> >  > > > > receiving any of the ConfAck being sent out by my laptop. I
don't
> > have
> >  > > any
> >  > > > > firewall installed on my laptop and I know for a fact that it
> > worked
> >  > > > talking
> >  > > > > to an NT Server-based PPTP.
> >  > > > >
> >  > > > > I'm really stumped with this problem. Any help would be greatly
> >  > > > appreciated.
> > _________________________________________________________________
> > Get your FREE download of MSN Explorer at http://explorer.msn.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=8500&t=8438
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to