Solved

windows 7 PPTP client connection TCP port cnfiguration

Posted on 2014-03-15
3
3,369 Views
Last Modified: 2014-03-16
I am planning to set up a PPTP VPN server on a windows 2008 R2 server behind a BT hub 3 and will configure the hub for port mapping so as to listen on the public side using a non-standard PPTP port number (for added security).
How can I configure/set-up a network connection to the server on a windows 7 PC to use the non-standard port ?
0
Comment
Question by:alcindor
3 Comments
 
LVL 19

Expert Comment

by:helpfinder
ID: 39931820
not directly an answer, but PPTP is VPN with vulnerability which was demonstrate as weak and easy to break.
Consider another type like L2PT (wich is built in VPN in common OS like windows, mac, android) or IPsec
0
 
LVL 2

Author Comment

by:alcindor
ID: 39932002
I am using PPTP because I haven't managed to configure L2TP on my practice server. Also, the server that I have to practice on is a cloud server with a public address (not behind a NAT router) and the server that I will be configuring will be behind a NAT router. I also intend to configure the firewall on the NAT router to only accept PPTP traffic from specific IP hosts which should provide an additional level of security.
I have managed to set up a PPTP VPN server and a remote client connection.
0
 
LVL 27

Accepted Solution

by:
davorin earned 500 total points
ID: 39932451
Hi,

I have never tried this and probably I will never try, at least for security reasons, because I think that will give me more troubles than to the attacker. Also I'm not fun of "security by obscurity" measures. http://technet.microsoft.com/en-us/magazine/2008.06.obscurity.aspx
With googling a little bit I have found two options, that may work.
- changing port in registry
http://superuser.com/questions/381362/change-pptp-control-connections-tcp-port-number
- or using client that supports changing of connection parameters (openvpn?)
https://secure.dd-wrt.com/phpBB2/viewtopic.php?t=3359&highlight=&sid=b6e140aac6dcc082e084ba32623bcf20

Hope this will help you a little bit.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now