The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets. A PPTP tunnel is instantiated by communication to the peer on TCP port 1723. This TCP connection is then used to initiate and manage a second GRE tunnel to the same peer.
NOTE: It is not necessary to add GRE (IP protocol 47) to the SonicWall in order to support PPTP pass-through (either for a client connecting to a server on the Internet, or clients on the WAN connecting to a server on the LAN side). GRE is handled automatically as needed whenever a PPTP connection is established. Currently,
Manually opening PPTP traffic from Internet to a server behind the SonicWall in SonicOS Enhanced involves the following steps:
TIP: The Public Server Wizard quickly configure your SonicWall to provide public access to an internal server. The Public Server Wizard is the most ambitious and functional wizard developed to date. It simplifies the complex process of creating a publicly and internally accessible server resource by automating above mentioned steps. Please refer How Can I Open Ports On The Firewall Using The Quick Configuration?
Scenario
The following example covers allowing PPTP service from the Internet to a server on the LAN with private IP address as 192.168.1.100. Once the configuration is complete, Internet users can access the PPTP service behind the SonicWall UTM appliance through the WAN (Public) IP address 1.1.1.1.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
EXAMPLE: In this example we have chosen to demonstrate using PPTP service, however the following steps apply to any service you wish to use (like HTTPS, SMTP, FTP, Terminal Services, SSH, etc).
Creating the necessary Address Objects
Address Object for Server on LAN
Name: PPTP Server Private
Zone Assignment: LAN
Type: Host
IP Address: 192.168.1.10
Address Object for Server's Public IP
Name: PPTP Server Public
Zone Assignment: WAN
Type: Host
IP Address: 1.1.1.1
Defining the appropriate NAT Policies
Adding appropriate NAT Policies Original Source: Any |
NOTE: Create a reflective policy: When you check this box, a mirror outbound or inbound NAT policy for the NAT policy you defined in the Add NAT Policy window is automatically created.
Loopback Policy
If you wish to access this server from other internal zones using the Public IP address Http://1.1.1.1 consider creating a Loopback NAT Policy else go to next step.
Creating Firewall Access Rules
CAUTION:The ability to define network access rules is a very powerful tool. Using custom access rules can disable firewall protection or block all access to the Internet. Use caution when creating or deleting network access rules.
Action: Allow |
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
ddress objects one for Server IP on LAN and another for Public IP of the server.
Address Object for Server on LAN Name: PPTP Server Private |
Address Object for Server's Public IP | ![]() |
Defining the appropriate NAT Policies
Adding appropriate NAT Policies Original Source: Any | |
NOTE: Create a reflective policy: When you check this box, a mirror outbound or inbound NAT policy for the NAT policy you defined in the Add NAT Policy window is automatically created.
Loopback Policy
If you wish to access this server from other internal zones using the Public IP address Http://1.1.1.1 consider creating a Loopback NAT Policy else go to next step.
Creating Firewall Access Rules
CAUTION:The ability to define network access rules is a very powerful tool. Using custom access rules can disable firewall protection or block all access to the Internet. Use caution when creating or deleting network access rules.
Action: Allow | ![]() |
Troubleshooting:
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
EXAMPLE: In this example we have chosen to demonstrate using PPTP service, however the following steps apply to any service you wish to use (like HTTPS, SMTP, FTP, Terminal Services, SSH, etc).
Creating the necessary Address Objects
TIP: For complete information on creating Address Objects refer: Address Object.
Address Object for Server on LAN Name: PPTP Server Private |
Address Object for Server's Public IP | ![]() |
Defining the appropriate NAT Policies
NOTE: To Add custom port in SonicOS Enhanced refer Service Objects.
Adding appropriate NAT Policies Original Source: Any | |
TIP: Create a reflective policy: When you check this box, a mirror outbound or inbound NAT policy for the NAT policy you defined in the Add NAT Policy window is automatically created.
Loopback Policy
If you wish to access this server from other internal zones using the Public IP address Http://1.1.1.1 consider creating a Loopback NAT Policy else go to next step
Creating Firewall Access Rules
CAUTION: The ability to define network access rules is a very powerful tool. Using custom access rules can disable firewall protection or block all access to the Internet. Use caution when creating or deleting network access rules.
Action: Allow | ![]() |
Troubleshooting