- Configuring L2TP Access
- Configuring PPTP Access and Logging
- Configuring Internal Network Information for Clients
- Restricting Access to VPN
- Additional Command-Line Options
Configuring PPTP Access and Logging
By contrast, the PPTP tab is very basic. It contains only the checkbox to enable PPTP, the IP address range fields, and a checkbox to allow 40-bit encryption. As mentioned in Part 1 of this series, the PPTP protocol supports both 40-and 128-bit encryption, with 40-bit encryption being significantly less secure. By default, Mac OS X Server will only accept connections using 128-bit encryption. However, some older Windows computers may not be able to connect at that level.
You can use the Logging tab to specify how detailed you want your VPN service logs to be. The Verbose logging checkbox logs all VPN service events, giving your highly detailed logs as opposed to the basic log functions (which contains primarily service errors). Detailed logs can be useful for troubleshooting and backtracking security breaches. Because the VPN service involves allowing remote connections to your network, it is highly advisable to use detailed logs and to monitor them on a regular basis.