Axxes Tel MV400 & VPN

HectiX

New Member
Joined
Aug 10, 2010
Messages
3
Can anyone help me setup VPN passthrough on a Neotel - Axess Tel MV400 3G Router? I have opened TCP port 1723 & the connection gets as far as authorising the username & password, but it will not establish the connection....

According to the manual, it does support VPN passthrough, but I can't seem to get it right. Any help would be apperciated...

:whistling:
 

jprestonnaidoo

Active Member
Joined
Apr 6, 2008
Messages
55
Sorry to thread-jack, but I'm also having trouble with the same router - firstly it won't update DynDns nor will it accept any incoming connections - I opened ports for OpenVPN, and when that didn't work, our DVR and for RDP, to no avail.

If anyone has successfully done this or the above, please help :confused:
 

HectiX

New Member
Joined
Aug 10, 2010
Messages
3
No problem. The DynDNS updating problem is fortunately bypassed using the update app available from DynDNS. Haven't used it myself yet, but from what I've heard, it works fine. As for the VPN, still no luck. Since I opened the port it comunicates with the server, but will not establish the connection (stalls on verifing user name & password). Apparently you need to allow PPTP tunneled data to pass through router by opening Protocol ID 47, which it seems, is not available on this router. Anyways, if you do find a solution, I would appeciate an update...
 

HectiX

New Member
Joined
Aug 10, 2010
Messages
3
Note that certain services such as IPSec and Microsoft's PPTP use non-TCP/UDP protocols so they may be more complicated to use. In particular, PPTP uses GRE (protocol 47) and IPSec uses ESP (protocol 50) and AH (protocol 51). Protocol numbers are not the same as port numbers.

Port Number: 47
Protocol Name: ni-ftp

Thanks for the input, but unfortunately incorrect. I have tried that. Back to square one...
 

james_turton

Active Member
Joined
Jul 25, 2006
Messages
65
A workaround

I was struggling with this too until I found a thread out there where someone had succeeded in getting GRE packets through using the "Default DMZ Server" setting under "WAN Settings". I specified my IMac's I.P. address in the same field and, sure enough, I could connect to my work's network using PPTP, Neotel and an Axesstel MV420.

IT'S NOT A GOOD SOLUTION - my iMac is now outside the Axesstel firewall. At the same time, it's still in the internal network so it's not really a DMZ setup at all. It's more like it stayed in the internal network but became the target a blanket port forwarding rule on the Axesstel. I went and reviewed the iMac's firewall settings and found that most of MS Office had registered itself for incoming connections. I turned that off. DO BE CAREFUL if you use this workaround, do check the firewall on the machine you specify for "DMZ". I plan to bring my iMac back "inside" and put a little OpenWRT box that I happen to have in the "DMZ" where it can act as a firewall & gateway for my internal network. At least it can be setup to forward the GRE packets to a host without forwarding absolutely everything to that host, which is more than can be said for the Axesstel.

If all you need after VPNing is remote desktop (or one or two apps) then another option is to run a minimal virtual machine (e.g. Ubuntu) with an RDC client on a box on your internal network and put the VM in the "DMZ". If you do this the VM's network interface must be bridged onto its host's network interface so that it gets an I.P. address that the Axesstel can reach.

It's a pity that the Axesstel firmware does not support acting as a "dumb modem" that just services PPPoE dial requests from a firewall / router that you can actually configure. I think it might work this way in USB mode, but that is not an option for me.

UPDATE: I put the OpenWRT box into the "DMZ" and took my iMac out. The OpenWRT box is setup as a firewall & gateway for my internal network, with the Axesstel connected to its WAN port and my other stuff to its LAN & WLAN ports. On OpenWRT, I enabled forwarding of TCP 1723 to my iMac and, dagnamit, my PPTP connection just works :) I guess that means that OpenWRT is GRE-friendly out of the box. I feel a bit less bleak with the Axesstel firmware now - perhaps "Default DMZ Server" was their curiously-named way of allowing you to use your own firewall / router. The only blemish left is the double NATing that I now have - need to stop the OpenWRT box from doing NAT since the Axesstel is doing it once already. Not that it's breaking anything at the moment. It ain't broke, so perhaps I... mmm...
 
Last edited:
Top