Contributor
•
2 Messages
VPN Server behind Pace router - How to configure router
My old U-verse router failed, AT$T replace it with a Pace 5268AC. Now my VPN router is not working. It has been working for 4 years with no problems.
Its in the DMZ, I have remote access to the VPN server, but can’t get VPN client to connect.
I’m in ASIA right now ! I call AT$T and after 15min they decided to connect me with a specialist, who put me on hold. …. AT$T
- I need a manual on the Pace 5268AC. Cant seem to find one on line!
- How do I set it up for remote access?
- How do I set it up so my VPN server to work?
HELP!
JefferMC
ACE - Expert
•
35.3K Messages
7 years ago
I do not believe that to be the case.
0
0
piersonk
Mentor
•
33 Messages
7 years ago
Well, I'm on the edge of my seat. Anyone care to share the solution?
0
0
generaltab
Contributor
•
2 Messages
7 years ago
piersonk,
Do you have any updates on this?
My situation is similar. Old router failed. AT&T replaced it with Pace 5268 AC and now my IPSec VPN doesn't work. Both Link Allocation and DMZ+ seem to produce the same results; the Pace can establish a link with the device at the other end (main office), where the VPN shows as "up", but I'm unable to reach anything beyond the gateway at either end.
Can alternate hardware, that works, be requested of AT&T?
Is it known what's in the way of reaching anything beyond the gateway?
Thanks,
0
0
piersonk
Mentor
•
33 Messages
7 years ago
General,
No, no update unfortunately. I wish I did but we seem to be at a dead end. @jculley6 went through the process of requesting and obtaining a replacement device, the NVG599, which is supposed to allow bridged traffic to pass, but apparently it also does not.
I'm fairly confident that ATT has done their part to ensure those of us who require advanced networking wont get it unless we upgrade to a static/business account (or whatever the h@ll). The real problem is that DMZ+ is not equivalent to bridging (OSI Layer 2). DMZ+ interferes with the IP layer which is what kills the tunneled traffic.
Going static might be the answer. Ill continue to watch this thread to see if someone comes up with a working solution. But as of right now, all we've been able to prove is that ATT has killed our ability to run a bridge.
PS: What model was your old router?
0
0
jculley6
Teacher
•
23 Messages
7 years ago
0
0
TSDotOrg
Teacher
•
6 Messages
7 years ago
The NVG599 does not block VPN traffic like the 5268AC does. My incoming/outgoing PPTP (GRE) VPNs work fine with my Linux server which is set up via IP passthrough.
The NAT session limit and lack of actual bridging remain an issue though, but I may have a possible workaround for this which I am going to experiment with over Christmas break. This is a very complex solution which will only work if you're an internet-only subscriber (no phone/TV) and also get your broadband via Ethernet (specifically, the ONT port on the RGs).
I'll follow up if anyone wants more details and/or if I have any luck.
0
0
JefferMC
ACE - Expert
•
35.3K Messages
7 years ago
Untrue.
0
0
piersonk
Mentor
•
33 Messages
7 years ago
Listen, we need a solution. If you have one, share it. Simply posting "untrue" does absolutely no good to anyone. If it's untrue, post something that's true.
0
0
JefferMC
ACE - Expert
•
35.3K Messages
7 years ago
0
0
piersonk
Mentor
•
33 Messages
7 years ago
I understand your points of contention, but I didn't say any of that. I didn't claim they blocked VPN. I claimed the Pace does. If you read my other posts I've noted this extensively because I need my VPN to work much more than I need to spend time in this forum.
The thread title is "VPN Server behind Pace router - How to configure router"
So I state and ask: I have more technical certifications than you can count with all of your fingers and toes, please feel free to speak technically with me. I have a commercial grade, VPN router behind the Pace (not going to give out model numbers, let's just say banks use the same mfg). I need to establish (reestablish actually, its was up for 8 straight years on my old provider) a very common site-to-site, VPN (GRE).
As per the threat title, how do I configure the Pace to allow this?
0
0