Disculpa debi ser mas explicito envió los archivos de configuración
Muchas gracias por tu respuesta, aca dejo todos los archivos de
configuración.
Feliz Día
Raul
/etc/pptpd.conf
option /etc/ppp/options.pptpd
debug
logwtmp
connections 100
localip 10.10.10.1
remoteip 10.10.10.200-220
/etc/ppp/chap-secrets
# Secrets for authentication using CHAP
# clientserver secret IP addresses
raulpptpd q1w2e3r410.10.10.201
/etc/ppp/options.pptdp
name pptpd
refuse-pap
refuse-chap
refuse-mschap
require-mschap-v2
require-mppe-128
proxyarp
lock
nobsdcomp
novj
novjccomp
nologfd
/etc/rc.local
#!/bin/sh
#
# This script will be executed *after* all the other init scripts.
# You can put your own initialization stuff in here if you don't
# want to do the full Sys V style init stuff.
touch /var/lock/subsys/local
echo 1 /proc/sys/net/ipv4/ip_forward
/etc/iptables
ifup eth0
route add -net 192.168.170.0 netmask 255.255.255.0 gw 192.168.1.250
route add -net 172.21.131.0 netmask 255.255.255.128 gw 192.168.1.253
Generado por la siguiente pagina : http://easyfwgen.morizot.net/gen/
/etc/iptables
#!/bin/sh
SYSCTL=/sbin/sysctl -w
# IPTables Location - adjust if needed
IPT=/sbin/iptables
IPTS=/sbin/iptables-save
IPTR=/sbin/iptables-restore
# Internet Interface
INET_IFACE=eth0
INET_ADDRESS=190.248.x.x
# Local Interface Information
LOCAL_IFACE=eth1
LOCAL_IP=192.168.1.1
LOCAL_NET=192.168.1.0/24
LOCAL_BCAST=192.168.1.255
# Localhost Interface
LO_IFACE=lo
LO_IP=127.0.0.1
# Save and Restore arguments handled here
if [ $1 = save ]
then
echo -n Saving firewall to /etc/sysconfig/iptables ...
$IPTS /etc/sysconfig/iptables
echo done
exit 0
elif [ $1 = restore ]
then
echo -n Restoring firewall from /etc/sysconfig/iptables ...
$IPTR /etc/sysconfig/iptables
echo done
exit 0
fi
###
#
# Load Modules
#
echo Loading kernel modules ...
# core netfilter module
/sbin/modprobe ip_tables
# the stateful connection tracking module
/sbin/modprobe ip_conntrack
# the module for full irc connection tracking
/sbin/modprobe ip_conntrack_irc
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/ip_forward
else
$SYSCTL net.ipv4.ip_forward=1
fi
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/tcp_syncookies
else
$SYSCTL net.ipv4.tcp_syncookies=1
fi
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/conf/all/rp_filter
else
$SYSCTL net.ipv4.conf.all.rp_filter=1
fi
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
else
$SYSCTL net.ipv4.icmp_echo_ignore_broadcasts=1
fi
if [ $SYSCTL = ]
then
echo 0 /proc/sys/net/ipv4/conf/all/accept_source_route
else
$SYSCTL net.ipv4.conf.all.accept_source_route=0
fi
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/conf/all/secure_redirects
else
$SYSCTL net.ipv4.conf.all.secure_redirects=1
fi
if [ $SYSCTL = ]
then
echo 1 /proc/sys/net/ipv4/conf/all/log_martians
else
$SYSCTL net.ipv4.conf.all.log_martians=1
fi
echo Flushing Tables ...
# Reset Default Policies
$IPT -P INPUT ACCEPT
$IPT -P FORWARD ACCEPT
$IPT -P OUTPUT ACCEPT
$IPT -t nat -P PREROUTING ACCEPT
$IPT -t nat -P POSTROUTING ACCEPT
$IPT -t nat -P OUTPUT ACCEPT
$IPT -t mangle -P PREROUTING ACCEPT
$IPT -t mangle -P OUTPUT ACCEPT
# Flush all rules
$IPT -F
$IPT -t nat -F
$IPT -t mangle -F
# Erase all non-default chains
$IPT -X
$IPT -t nat -X
$IPT -t mangle -X
if [ $1 = stop ]
then
echo Firewall completely flushed! Now running with no firewall.
exit 0
fi
###
#
# Rules Configuration
#
###
$IPT -P INPUT DROP
$IPT -P OUTPUT DROP
$IPT -P FORWARD DROP
echo Create and populate custom rule chains ...
$IPT -N bad_packets
# Create another chain to filter bad tcp packets
$IPT -N bad_tcp_packets
$IPT -N icmp_packets
$IPT -N udp_inbound
$IPT -N udp_outbound
$IPT -N tcp_inbound
$IPT -N tcp_outbound
$IPT -A bad_packets -p ALL -i $INET_IFACE -s $LOCAL_NET -j DROP
# Drop INVALID packets immediately
$IPT -A bad_packets -p ALL -m state --state INVALID -j DROP
$IPT -A bad_packets -p tcp -j bad_tcp_packets
$IPT -A bad_packets -p ALL -j RETURN
$IPT -A bad_tcp_packets -p tcp -i $LOCAL_IFACE -j RETURN
$IPT -A bad_tcp_packets -p tcp ! --syn -m state --state NEW -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags ALL NONE -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags ALL ALL -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
$IPT -A bad_tcp_packets -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
$IPT -A icmp_packets --fragment -p ICMP -j DROP
$IPT -A