Solved

Can you chain VPNs together?

Posted on 2006-11-13
5
284 Views
Last Modified: 2010-03-18
I can connect to my office using Cisco VPN 4.6.  Then I can connect to any internal computer using Remote Desktop.  However, if I then use PPTP on any remote computer to connect to my clients, I immediately lose my connection and my ability to reconnect until the remote client is disconnected from the PPTP.  Is there a way to connect to my remote office and then use PPTP on my remote computers to connect to my clients?
0
Comment
Question by:eluh
  • 2
  • 2
5 Comments
 
LVL 18

Accepted Solution

by:
carl_legere earned 500 total points
ID: 17935269
i suspect that your pptp connection has 'use remote gateway' turned on, which should be off to get this to work.

properties of the pptp connection
networking
tcpip
advanced
uncheck use default gateway on remote network
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17936327
When you are in the office, I assume you can vpn into the clients OK from the same PC that failed when you tried double-vpn'ing from when at home?

If you have vpn'ed in from home and taken over this PC, can it get to the Internet OK for normal web browsing?
When does the connection drop, after you get prompted for credentials or as soon as you hit return to initiate the connection?

Install ethereal on the PC you are going to rdp onto (www.ethereal.com) so that even if you lose the link temporarily you can reconnect and see what the traffic was doing.

Regards
keith
0
 

Author Comment

by:eluh
ID: 17936373
Thanks Carl and Keith.  I tried Carl's suggestion which worked perfectly and thanks Keith for the ethereal website.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17936401
welcome. Nice one Carl :)
0
 
LVL 18

Expert Comment

by:carl_legere
ID: 17937536
I do this all the time within a couple of sites.  Another thing you may start using as it matures is Hamachi, a software point to point vpn that you can use to pull together a couple of customers' access without disrupting thier networks, or lowering security.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question