Introducing PureSquare – for security beyond VPNs

Visit our website

The newly launched password manager is a secure way to store, share, and generate strong passwords. Try PureKeep!

Setup PureVPN PPTP via Command Line on Linux Debian/CentOS

Dec 26, 2019
Sep 01, 2022
0 Comments
Download PDF
NOTE
Starting June 15th, 2021, PureVPN will discontinue offering support for PPTP, L2TP, and SSTP protocols on the majority of VPN locations.

However, at the popular request of our users, we will continue to support the following locations for users to connect using PPTP, L2TP, and SSTP protocols:

Germany: de1.pointtoserver.com
Netherlands: nl1.pointtoserver.com
United Kingdom: ukl1.pointtoserver.com
United States: usil1.pointtoserver.com
United States: ustx1.pointtoserver.com
United States: usca1.pointtoserver.com
United States: usfl1.pointtoserver.com
United States: usny1.pointtoserver.com
United States: uswdc1.pointtoserver.com
Australia: au-sd1.pointtoserver.com

Don’t know how to get started with PureVPN on Debian/CentOS? Check out our tutorial, put together to help you configure PureVPN using PPTP via the command line on Linux:

Things to Consider:

  1. You have a working internet connection
  2. Linux CentOS
  3. A Premium PureVPN account (if you haven’t bought it yet, click👉 here to buy)
Find your VPN credentials for manual configuration.

To find your VPN credentials log into the PureVPN members area. Click 👉 here to visit member area.

  • Login to the Member area using your PureVPN registered email address and password.
  • From manage account section, go to the Subscriptions tab.
  • On Subscription tab scroll down to be able to view your VPN credentials
  • You will be able to see and copy your VPN credentials.
  • Note down your PureVPN username and click the Eye icon to make your password visible and use it in the manual configuration.
How to Setup PureVPN PPTP via Command Line on Linux Debian/CentOS.
  • First check if the ppp-generic module exists. If it doesn’t, the connection will not work. Open your terminal and type:
modprobe ppp-generic
  • Next, install the PPTP daemon by typing the following in your terminal:
sudo apt-get install pptp-linux pptpd ppp curl.
  • Press “y” and then enter to download and install the packages.
  • Run the command to open Editor and type the following details as mentioned:
sudo nano /etc/ppp/chap-secrets.
  • Now enter the chap-secrets file as shown below:
vpnusernamePPTPvpnpassword*.
  • Press Tab button to give space in place of <tab>
  • Press CTRL+O to save the file, and CTRL+X to exit the editor.
  • Run the following command to create a PureVPN file:
sudo nano/etc/ppp/peers/purevpn.
  • Enter the following information:
pty “pptp usca1.pointtoserver.com –nolaunchpppd”
name yourVPNusername
remotename PPTP
require-mppe-128
file /etc/ppp/options.pptp
ipparam purevpn.
  • To save the file, press CTRL+O.  To exit the editor, press CTRL+X.
  • Please note: that we have currently usca1.pointtoserver.com as the server address. You can, however, choose any server of your choice from the servers mentioned in above notes.
  • Now run the command:
sudo nano /etc/ppp/options.pptp.

(Please make sure there is space after sudo and nano)

  • Edit the file as follows and make sure there is no ‘#’ sign before these lines:
lock
noauth
refuse-pap
refuse-eap
refuse-chap
nobsdcomp
nodeflate
require-mppe-128.
  • Once this is done, press CTRL+O to save and CTRL+X to exit.
  • Now run the command below and add the following line in it.
sudo nano /etc/ppp/ip-up.local
/sbin/route add default ppp0.
  • Once done, Save and Exit the file.
  • In order to execute the file, run the following command:
sudo chmod 755 /etc/ppp/ip-up.local.
  • Connect to the VPN by running:
sudo pppd call purevpn.
  • Use the following command to check the accuracy of your VPN IP and location:
curl ipinfo.io.
  • To disconnect the VPN, type the following command:
sudo pkill pppd.
  • Note: If you are unable to connect, please check your connection logs by running the following command:
sudo cat /var/log/messages | grep pppd.
Was this article helpful? Rate and share your comments below. Your input matters to us and everyone else in the Cyber Security Community.

How helpful did you find this answer?

Comments (0 )