How to install a VPN and bypass blocks. Five reliable services. How to make a personal VPN

Deploying a VPN server on an enterprise network is a more complex task than setting up basic services - NAT, DHCP and file servers. Before getting down to business, it is necessary to clearly understand the structure of the future network and the tasks that must be solved with its help. In this article we will touch on the main questions, the answers to which you should know before you approach the server. This approach will allow you to avoid many typical problems and thoughtlessly copying settings from the example, and will also allow you to correctly configure the VPN specifically for your tasks and needs.

What is a VPN?

VPN ( Virtual Private Network) - virtual private network, this abbreviation hides a group of technologies and protocols that allow you to organize a logical (virtual) network on top of a regular network. It is widely used to differentiate access and improve the security of corporate networks, organize secure access to corporate network resources from the outside (via the Internet) and, more recently, by city network providers to organize Internet access.

What types of VPN are there?

Depending on the protocol used, VPNs are divided into:

  • PPTP(Point-to-point tunneling protocol) - a point-to-point tunnel protocol allows you to organize a secure connection by creating a special tunnel over a regular network. Today, this is the least secure of all protocols and is not recommended for use in external networks for working with information to which access to unauthorized persons is undesirable. To organize the connection, two network sessions are used: a PPP session is established using the GRE protocol for data transfer, and a connection is established on TCP port 1723 to initialize and manage the connection. In this regard, difficulties often arise in establishing such a connection in some networks, for example, hotel or mobile operators.
  • L2TP (Layer 2 Tunneling Protocol) is a Layer 2 tunneling protocol, a more advanced protocol based on PPTP and L2F (Cisco's Layer 2 Handover Protocol). Its advantages include much higher security due to encryption using the IPSec protocol and combining the data channel and control channel into one UDP session.
  • SSTP (Secure Socket Tunneling Protocol)-- a secure socket tunneling protocol based on SSL and allows you to create secure VPN connections via HTTPS. It requires an open port 443 to operate, which allows you to establish connections from anywhere, even behind a proxy chain.

What is VPN usually used for?

Let's look at a few of the most commonly used VPN applications:

  • Access to the Internet. Most often used by metropolitan network providers, but it is also a very common method in enterprise networks. The main advantage is a higher level of security, since access to the local network and the Internet is carried out through two different networks, which allows you to set different security levels for them. With the classic solution - distributing the Internet to a corporate network - it is practically impossible to maintain different levels of security for local and Internet traffic.
  • Access to the corporate network from outside, It is also possible to combine branch networks into a single network. This is actually what VPNs were designed for; it allows you to organize secure work in a single corporate network for clients located outside the enterprise. It is widely used to unite geographically dispersed departments, provide network access for employees on a business trip or vacation, and make it possible to work from home.
  • Consolidation of corporate network segments. Often, an enterprise network consists of several segments with varying levels of security and trust. In this case, a VPN can be used to communicate between segments; this is a much more secure solution than simply connecting networks. For example, in this way you can organize access for a warehouse network to individual resources of the sales department network. Since it is a separate logical network, all the necessary security requirements can be set for it without affecting the operation of individual networks.

Setting up a VPN connection.

The clients of the VPN server will most likely be workstations running Windows, while the server can run under Windows, Linux or BSD, so we will consider the connection settings using Windows 7 as an example. We will not dwell on basic settings, they are simple and understandable. Let’s dwell on one subtle point.

When connecting a regular VPN connection, the default gateway will be specified for the VPN network, that is, the Internet on the client machine will disappear or will be used through a connection on a remote network. It is clear that this is at least inconvenient, and in some cases can lead to double payment for traffic (once on a remote network, a second time on the provider’s network). To exclude this point on the bookmark Net in protocol properties TCP/IPv4 press the button Additionally and in the window that opens, uncheck Use default gateway on remote network.

We would not dwell on this issue in such detail if it were not for the massive occurrence of problems and the lack of basic knowledge about the reasons for this behavior of VPN connections among many system administrators.

In our article we will look at another pressing problem - the correct configuration of routing for VPN clients, which is the basis for the competent construction of enterprise-level VPN networks.

In the meantime, while the authorities and the RKN are building a fence for us that does not allow us to access blocked sites, software developers have solved all the problems for us. All that remains for ordinary users to do to open blocked sites is to turn on the VPN.

Now VPN is built in almost everywhere, every browser has an add-on. In addition, there are 100,500 applications for smartphones, and thousands of instructions for Windows.

Today I want to close this issue once and for all with this page of my blog. In this post, I will try to mention everything so that everyone can find their instructions and understand how to enable VPN on their device.

Enable VPN in Yandex Browser

If you are from Ukraine, the first problem you will encounter is loading the browser itself. All you need is to download the browser from the Yandex mirror. You can download the browser from this link - https://getyabrowser.com/ru/

Immediately after installation, your VPN will already be enabled. If suddenly blocked sites do not open for you, you need to do the following:

  • Open settings. In the upper right corner there are 3 dashes - ≡ and click settings.
  • Scroll to the "Turbo" section and select "Automatically turn on...".
  • Press 3 keys at the same time – Ctrl+Shift+Del and delete “files saved in the cache”.
  • Restart your browser and enjoy free surfing.

Second way:

If the above does not work for you for some reason, do not be upset. Yandex Browser supports all extensions from “Opera” and you can easily install a VPN plugin.

To do this, click on the 3 dashes ≡ in the upper right corner and click “Extensions”. Then scroll to the bottom of the page and click on “Catalog of extensions for Yandex.Browser”. Next, write VPN in the search and install any of the suggested plugins. Restart your browser, you're done!

Enable VPN in Opera

In Opera it’s exactly the same as in Yandex Browser. To be more precise, you can enable VPN in two ways:

  1. Built-in from Opera
  2. Install extension

Let's now look at each method separately.

Method one - built-in VPN

  1. Tap Menu, then Settings.
  2. Select "Security" from the left menu. You need the VPN section (enable it by checking the box).
  1. Ready. Now, next to the address bar you have a corresponding button where you can turn the VPN on/off and change the country in case of outages.

The second way is to install the extension.

I can’t even imagine why the built-in VPN didn’t suit you, but I think, just in case, it’s worth writing an alternative option:

To install the extension, you can open the directory through the “menu” button and write VPN in the search. Or just paste/open this link in the address bar - https://addons.opera.com/ru/search/?query=vpn

After installing the extension, restart your browser and you can open any blocked site.

Enable VPN in Google Chrome

Google Chrome does not have a built-in VPN, but it has the largest collection of extensions, among which you can quickly find everything and for free.

To enable VPN in Chrome you need to:

  • Click on the ellipsis in the upper right corner. Next “Additional tools”, then “Extensions”. Or paste in the address bar - chrome://extensions/
  • In the search, write “VPN”.
  • Install the selected extension.

I have “Free VPN Proxy Server Hotspot Shield - Unblock Sites”. Works flawlessly and has never slowed down. If you also want to install it for yourself, you can immediately follow the link - chrome://extensions/?id=and download.

VPN in Mozilla Firefox

As you understand, it’s exactly the same as in other browsers, but to get the full picture I’ll describe it in detail. To open access to all sites, do the following:

  • Paste/follow the link - https://addons.mozilla.org/ru/firefox/
  • On the right side you have the “Search for add-ons”. Type “VPN” into the search and press “Enter”
  • Then the choice is yours, but I recommend installing “Hoxx VPN Proxy” or “Hotspot Shield free VPN Proxy”.
  • Install the add-on, activate, restart the browser.

Ready. Now you have access to all resources on the Internet. As you can see, nothing complicated.

Browsers with built-in VPN

If you have no desire to install anything additional, you can use browsers that already have Proxy support built into their product. I certainly recommend using the ones discussed above, but suddenly you need a different one.

List of browsers with built-in Proxy:

  1. Yandex.Browser (about it above).
  2. Opera. See above.
  3. TOR. Old, popular. Download here - https://www.torproject.org/download/download-easy

During downloading, do not forget to select Russian language.

  1. Browser Go! From mail.ru. Download here - https://gobro.mail.ru
  2. Orbitum - it’s unclear what, I’m not leaving a link.
  3. FreeU is a bit dumb. I don't recommend it.

VPN for Android

If you use one of the browsers listed above, then enable VPN in it in the same way as in a regular browser (see above). If you prefer to use another application, then you need to install another one that will give full access.

To install a VPN on Android, you need:

  1. Open “Google play” and write “VPN” in the search.
  2. Select one of the applications and install.
  3. Launch the application and minimize it. Now you can open your browser and view any sites.

Personally, I would recommend the app “Turbo VPN – Unlimited Free VPN” to you. It is fast, light, and works more or less stably. Available at the link - https://play.google.com/store/apps/details?id=free.vpn.unblock.proxy.turbovpn

That's all. Nothing complicated!

Every year electronic communications are improving, and increasingly high demands are placed on information exchange for speed, security and quality of data processing.

And here we will look at a VPN connection in detail: what it is, why a VPN tunnel is needed, and how to use a VPN connection.

This material is a kind of introductory word to a series of articles where we will tell you how to create a vpn on various operating systems.

vpn connection what is it?

So, a virtual private network vpn is a technology that provides a secure (closed from external access) connection of a logical network over a private or public one in the presence of high-speed Internet.

Such a network connection of computers (geographically distant from each other at a considerable distance) uses a “point-to-point” connection (in other words, “computer-to-computer”).

Scientifically, this connection method is called a VPN tunnel (or tunnel protocol). You can connect to such a tunnel if you have a computer with any operating system that has an integrated VPN client that can “forward” virtual ports using the TCP/IP protocol to another network.

What is a VPN for?

The main benefit of a vpn is that negotiaters need a connectivity platform that not only scales quickly, but also (primarily) ensures data confidentiality, data integrity, and authentication.

The diagram clearly shows the use of VPN networks.

Rules for connections over a secure channel must first be written on the server and router.

How VPN works

When a connection occurs via VPN, the message header contains information about the IP address of the VPN server and the remote route.

Encapsulated data passing through a shared or public network cannot be intercepted because all information is encrypted.

The VPN encryption stage is implemented on the sender's side, and the recipient's data is decrypted using the message header (if there is a shared encryption key).

After the message is correctly decrypted, a VPN connection is established between the two networks, which also allows you to work on a public network (for example, exchange data with a client 93.88.190.5).

As for information security, the Internet is an extremely unsecured network, and a VPN network with the OpenVPN, L2TP / IPSec, PPTP, PPPoE protocols is a completely secure and safe way to transfer data.

Why do you need a VPN channel?

VPN tunneling is used:

Inside the corporate network;

To unite remote offices, as well as small branches;

To serve digital telephony with a wide range of telecommunications services;

To access external IT resources;

For building and implementing video conferences.

Why do you need a VPN?

VPN connection is required for:

Anonymous work on the Internet;

Downloading applications when the IP address is located in another regional zone of the country;

Safe work in a corporate environment using communications;

Simplicity and convenience of connection setup;

Ensuring high connection speed without interruptions;

Creating a secure channel without hacker attacks.

How to use VPN?

Examples of how VPN works can be given endlessly. So, on any computer in the corporate network, when you establish a secure VPN connection, you can use mail to check messages, publish materials from anywhere in the country, or download files from torrent networks.

VPN: what is it on your phone?

Access via VPN on a phone (iPhone or any other Android device) allows you to maintain anonymity when using the Internet in public places, as well as prevent traffic interception and device hacking.

A VPN client installed on any OS allows you to bypass many of the provider’s settings and rules (if the provider has set any restrictions).

Which VPN to choose for your phone?

Mobile phones and smartphones running Android OS can use applications from Google Playmarket:

  • - vpnRoot, droidVPN,
  • - tor browser for network surfing, also known as orbot
  • - InBrowser, orfox (firefox+tor),
  • - SuperVPN Free VPN Client
  • - OpenVPN Connect
  • - TunnelBear VPN
  • - Hideman VPN

Most of these programs are used for the convenience of “hot” system setup, placing launch shortcuts, anonymous Internet surfing, and selecting the type of connection encryption.

But the main tasks of using a VPN on a phone are checking corporate email, creating video conferences with several participants, and holding meetings outside the organization (for example, when an employee is on a business trip).

What is VPN on iPhone?

Let's look at which VPN to choose and how to connect it on an iPhone in more detail.

Depending on the type of network supported, when you first start the VPN configuration on your iPhone, you can select the following protocols: L2TP, PPTP and Cisco IPSec (in addition, you can “make” a VPN connection using third-party applications).

All of the listed protocols support encryption keys, user identification using a password and certification are carried out.

Additional features when setting up a VPN profile on an iPhone include: RSA security, encryption level, and authorization rules for connecting to the server.

For an iPhone phone from the appstore, you should choose:

  • - a free Tunnelbear application with which you can connect to VPN servers in any country.
  • - OpenVPN connect is one of the best VPN clients. Here, to launch the application, you must first import RSA keys via iTunes into your phone.
  • - Cloak is a shareware application, since for some time the product can be “used” for free, but to use the program after the demo period has expired, you will have to buy it.

VPN creation: selection and configuration of equipment

For corporate communications in large organizations or for connecting offices remote from each other, they use hardware equipment that can support continuous, secure work on the network.

To implement VPN technologies, the role of a network gateway can be: Unix servers, Windows servers, a network router and a network gateway on which VPN is installed.

A server or device used to create a VPN enterprise network or a VPN channel between remote offices must perform complex technical tasks and provide a full range of services to users both on workstations and on mobile devices.

Any router or VPN router must provide reliable operation on the network without freezes. And the built-in VPN function allows you to change the network configuration for working at home, in an organization or in a remote office.

Setting up VPN on the router

In general, setting up a VPN on a router is done using the router’s web interface. On “classic” devices, to organize a VPN, you need to go to the “settings” or “network settings” section, where you select the VPN section, specify the protocol type, enter the settings for your subnet address, mask and specify the range of IP addresses for users.

In addition, to secure the connection, you will need to specify encoding algorithms, authentication methods, generate negotiation keys, and specify the WINS DNS servers. In the “Gateway” parameters you need to specify the gateway IP address (your own IP) and fill in the data on all network adapters.

If there are several routers on the network, you need to fill out the VPN routing table for all devices in the VPN tunnel.

Here is a list of hardware equipment used to build VPN networks:

Dlink routers: DIR-320, DIR-620, DSR-1000 with new firmware or D-Link DI808HV Router.

Routers Cisco PIX 501, Cisco 871-SEC-K9

Linksys Rv082 router with support for about 50 VPN tunnels

Netgear router DG834G and routers models FVS318G, FVS318N, FVS336G, SRX5308

Mikrotik router with OpenVPN function. Example RouterBoard RB/2011L-IN Mikrotik

VPN equipment RVPN S-Terra or VPN Gate

ASUS routers models RT-N66U, RT-N16 and RT N-10

ZyXel routers ZyWALL 5, ZyWALL P1, ZyWALL USG

In this article, we will take a closer look at the process of setting up a VPN server in the Windows Server operating system, and also answer the questions: What is a VPN and how to set up a VPN connection?

What is a VPN connection?

VPN (Virtual Private Network) is a virtual private network that is used to provide a secure connection to the network. A technology that allows you to connect any number of devices into a private network. As a rule, via the Internet.

Although this technology is not new, it has recently gained relevance due to the desire of users to maintain data integrity or privacy in real time.

This connection method is called a VPN tunnel. You can connect to a VPN from any computer, with any operating system that supports a VPN connection. Or a VPN-Client is installed, which is capable of forwarding ports using TCP/IP to a virtual network.

What does a VPN do?

VPN provides remote connection to private networks

You can also safely combine several networks and servers

Computers with IP addresses from 192.168.0.10 to 192.168.0.125 are connected through a network gateway, which acts as a VPN server. The rules for connections via the VPN channel must first be written on the server and router.

VPN allows you to safely use the Internet when connecting even to open Wi-Fi networks in public areas (in shopping centers, hotels or airports)

And also bypass restrictions on displaying content in certain countries

VPN prevents cyber threats by an attacker intercepting information on the fly, unnoticed by the recipient.

How VPN works

Let's look at how a VPN connection works in principle.

Let's imagine that transmission is the movement of a packet along a highway from point A to point B; along the path of the packet there are checkpoints for passing the data packet. When using a VPN, this route is additionally protected by an encryption system and user authentication to secure the traffic containing the data packet. This method is called “tunneling” (tunneling - using a tunnel)

In this channel, all communications are reliably protected, and all intermediate data transmission nodes deal with an encrypted package and only when the data is transmitted to the recipient, the data in the package is decrypted and becomes available to the authorized recipient.

VPN will ensure the privacy of your information along with a comprehensive antivirus.

VPN supports such certificates as OpenVPN, L2TP, IPSec, PPTP, PPOE and it turns out to be a completely secure and safe way to transfer data.

VPN tunneling is used:

  1. Inside the corporate network.
  2. Consolidation of remote offices, as well as small branches.
  3. Access to external IT resources.
  4. For building video conferences.

Creating a VPN, selecting and configuring equipment.

For corporate communications in large organizations or combining offices remote from each other, hardware is used that is capable of maintaining uninterrupted operation and security in the network.

To use the VPN service, the role of the network gateway can be: Linux/Windows servers, a router and a network gateway on which the VPN is installed.

The router must ensure reliable operation of the network without freezes. The built-in VPN function allows you to change the configuration for working at home, in an organization or in a branch office.

Setting up a VPN server.

If you want to install and use a VPN server based on the Windows family, then you need to understand that client machines Windows XP/7/8/10 do not support this function; you need a virtualization system, or a physical server on the Windows 2000/2003/2008/ platform 2012/2016, but we will look at this feature on Windows Server 2008 R2.

1. First, you need to install the “Network Policy and Access Services” server role. To do this, open the server manager and click on the “Add role” link:

Select the Network and Access Policy Services role and click next:

Select "Routing and Remote Access Services" and click Next and Install.

2. After installing the role, you need to configure it. Go to Server Manager, expand the "Roles" branch, select the "Network and Access Policy Services" role, expand it, right-click on "Routing and Remote Access" and select "Configure and enable routing and remote access"

After starting the service, we consider the configuration of the role complete. Now you need to allow users access to the server and configure the issuance of IP addresses to clients.

Ports that VPN supports. After the service is raised, they open in the firewall.

For PPTP: 1723 (TCP);

For L2TP: 1701 (TCP)

For SSTP: 443 (TCP).

The L2TP/IpSec protocol is more preferable for building VPN networks, mainly for security and higher availability, due to the fact that a single UDP session is used for data and control channels. Today we will look at setting up an L2TP/IpSec VPN server on the Windows Server 2008 r2 platform.

You can try to deploy on the following protocols: PPTP, PPOE, SSTP, L2TP/L2TP/IpSec

Let's go to Server Manager: Roles - Routing and Remote Access, right-click on this role and select “ Properties", on the “General” tab, check the IPv4 router box, select “local network and demand call”, and IPv4 remote access server:

Now we need to enter the pre-shared key. Go to the tab Safety and in the field Allow special IPSec policies for L2TP connections, check the box and enter your key. (About the key. You can enter an arbitrary combination of letters and numbers there; the main principle is that the more complex the combination, the safer it is, and remember or write down this combination; we will need it later). In the Authentication Provider tab, select Windows Authentication.

Now we need to configure Connection security. To do this, go to the tab Safety and choose Authentication Methods, check the boxes EAP and Encrypted Authentication (Microsoft version 2, MS-CHAP v2):

Next let's go to the tab IPv4, there we will indicate which interface will accept VPN connections, and also configure the pool of addresses issued to L2TP VPN clients on the IPv4 tab (Set the Interface to “Allow RAS to select an adapter”):

Now let's go to the tab that appears Ports, right-click and Properties, select a connection L2TP and press Tune, we will display it in a new window Remote access connection (incoming only) And On-demand connection (incoming and outgoing) and set the maximum number of ports, the number of ports must match or exceed the expected number of clients. It is better to disable unused protocols by unchecking both checkboxes in their properties.

List of ports that we have left in the specified quantity.

This completes the server setup. All that remains is to allow users to connect to the server. Go to Server Manager Active Directory users – we find the user we want allow access press properties, go to the bookmark incoming calls

Today, Internet users increasingly use the term VPN. Some recommend using it more often, while others recommend avoiding it. Let's take a closer look at what is hidden behind this term.

VPN connection, what is it?

VPN(Virtual Private Network) is technology, which provides communication closed from external access in the presence of a high connection speed. This connection is carried out according to the principle “ dot - dot" In science, this connection method is called tunnel. You can join the tunnel at PC with any OS, wherein VPN client installed. This program “forwards” a virtual port using TCP/IP to another network.

To implement such a connection, you need a platform that quickly scales and ensures data integrity and confidentiality.

In order for the PC to IP address 192.168.1.1-100 connected via a gateway to an external network, you need to set the connection rules on the router. When a VPN connection is made, the message header contains the address of the remote PC. The message is encrypted by the sender and decrypted by the recipient using a shared key. After this, a secure connection is established between the two networks.

How to connect a VPN

A brief diagram of the protocol's operation was previously described. Now we’ll find out how to connect a client on a specific device.

On a computer and laptop

Before you set up VPN connection to Windows 7 PC, should specify IP address or server name. To do this in " Network Sharing Center" on " Control panels" need to " Create a new connection».

Select item "" - " (VPN)».

At the next stage you should specify Name And server address.

You need to wait for the connection to complete.

Let's check the VPN connection. To do this in " Control Panel" In chapter " Network connections» Call the context menu by double-clicking on the shortcut.

On the " Details" need to check IPv4 address. It must be within the IP range specified in the VPN settings.

On your phone, iPhone or tablet

Now let's look at how to create a VPN connection and configure it on gadgets running Android OS.

For this you need:

    smartphone, tablet; login, network password; server address.

To set up a VPN connection, you need to select “” in your phone settings and create a new one.

An icon with a new connection will appear on the screen.

The system requires a login and password. You need to enter the parameters and select the "" option. Then at the next session you will not have to confirm these data again.

Once the VPN connection is activated, a characteristic icon will appear on the toolbar.

If you click on the icon, the connection details will appear.

How to set up a VPN to work correctly

Let's take a closer look at how to automatically configure VPN on computers with Windows 10 OS.

Go to PC settings.

In chapter " Options"go to the subsection "".

... and add a new VPN connection.

On the next page you should specify the VPN connection parameters:

    Service provider - Windows;Connection name;Server address;VPN type;Username and password.

Once the connection is established, you need to connect to it.

How to create a VPN server

All providers record the activities of their clients. If a request is received from law enforcement agencies, they will provide complete information about which sites the offender visited. Thus, the provider relieves itself of all legal liability. But sometimes situations arise in which the user needs to protect his data:

    Companies transmit their data via the Internet via an encrypted channel. Many services on the Internet operate based on geographic location. For example, the Yandex.Music service operates only on IP from the Russian Federation and CIS countries. A Russian living in Europe will not be able to listen to his favorite music. In offices, access to social networks is often blocked.
You can, of course, clear your browser history every time you visit a site. But it’s easier to create and configure a VPN server. To do this, call the command line ( Win+R), and then enter your query ncpa.cpl and press Enter. In a new window click Alt and select "".

Next, you need to create a user and give him limited rights only to the VPN. You will also have to come up with a new long password. Select a user from the list. At the next stage you need to select the connection option " Through the Internet" Next you need to specify the connection parameters. If you don’t need access to files and folders when working with a VPN, you can uncheck all the boxes and click on the “” button.

How to use a VPN

After a new connection has been created, all you need to do is open the browser and load any page. Beginners can skip creating the connection and immediately download the VPN client from the Internet or install a special extension in the browser. After downloading the program, you need to launch it and click the “ Connect" The client will join another network and the user will be able to view sites prohibited in his region. The disadvantage of this method is that the IP is issued automatically. The user cannot select a country. But the connection is set up very quickly, by pressing just one button. The option of adding an extension also has disadvantages. Firstly, the user must be registered on the official website of the program, and, secondly, the extension often crashes. But the user can choose the country through which the connection to the external network will be made. The connection process itself also does not raise any questions. Just press the button " Start" and the browser will reboot on the new network. Let's look at how to install the extension using an example ZenMate VPN.Download the program from the official website. After installation, the following icon will appear in the browser:

Click on the icon. The extension window will appear:

If you move the mouse cursor to icon with the Russian flag, then the screen will display current IP. If you move the cursor over the icon with the Romanian flag, the IP of the selected server will appear. If desired, you can change the connection country. To do this, click on the globe and select one of the automatic addresses.

The disadvantage of the free version of the program is the small number of available servers and the imposition of advertising.

The most common mistakes

Various antivirus programs and firewalls may block the connection. In this case, an error code is displayed on the screen. Let's look at the most popular problems and ways to solve them.
Error Cause Solution
678 Encryption is not allowed in the OS You need to open the command line and check the “ProhibitIpSec” parameter in the registry “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\RasMan\Parameters”. It should be equal to 0. If the provider itself uses an encryption channel to provide services, then changing this setting will affect Internet access.
691 Incorrect login/password entered You need to log in to the network again
692 Firewall Error Disable your firewall
720/738 User is already connected Error 720 occurs only on Windows 7. All other operating systems display code 738. If you have to work from different PCs through one client, then you need to create several user names.
734 Automatic VPN You need to change the connection type from “Automatic” to “L2TP IPSec VPN” in the connection properties. If the error does not disappear, you need to re-create the connection.
766/781 Key not saved/not entered Open the VPN properties, on the “Security” tab, select “Advanced settings” and enter the key in the new window
768/789 (Windows 7, Vista, XP) IPSec doesn't work RMB on the shortcut “My Computer” - “Management”. In the “Services” section, select “IPSec”. Set the connection type to Auto.