Selamat malam para master, mau bertanya tentang vpn pptp??, saat ini client vpn pptp saya sudah bisa konek ke vpn client, akan tetapi tidak bisa browse komputer atau folder share di jaringan vpn server, tapi klo kita remote desktop komputer di vpn server bisa, kira2 salahnya dimana ya, mohon bantuannya. Terima kasih sebelumnya
berikut saya sertakan firewall yang saya buat :

0 ;;; Accept established connections
chain=input action=accept connection-state=established

1 ;;; Accept related connections
chain=input action=accept connection-state=related

2 ;;; UDP
chain=input action=accept protocol=udp

3 ;;; Allow_limited_pings
chain=input action=accept protocol=icmp limit=50/5s,2

4 ;;; FTP
chain=input action=accept protocol=tcp src-address-list=ournetwork
dst-port=21

5 ;;; SSH_for_secure_shell
chain=input action=accept protocol=tcp src-address-list=ournetwork
dst-port=22

6 ;;; Telnet
chain=input action=accept protocol=tcp src-address-list=ournetwork
dst-port=23

7 ;;; Web
chain=input action=accept protocol=tcp src-address-list=ournetwork
dst-port=80

8 ;;; winbox
chain=input action=accept protocol=tcp src-address-list=ournetwork
dst-port=8291

9 ;;; pptp-server
chain=input action=accept protocol=tcp dst-port=1723

10 ;;; PPTP & EOIP
chain=input action=accept protocol=tcp dst-port=47

11 ;;; Drop Blaster Worm
chain=virus action=drop protocol=tcp dst-port=135-139

12 ;;; Drop Messenger Worm
chain=virus action=drop protocol=udp dst-port=135-139

13 ;;; Drop Blaster Worm
chain=virus action=drop protocol=tcp dst-port=445

14 ;;; Drop Blaster Worm
chain=virus action=drop protocol=udp dst-port=445

15 ;;; Exchange
chain=virus action=drop protocol=tcp dst-port=593

16 ;;; Virus Latin
chain=virus action=drop protocol=tcp dst-port=1024-1030

17 ;;; Drop MyDoom
chain=virus action=drop protocol=tcp dst-port=1080

18 ;;; _____________
chain=virus action=drop protocol=tcp dst-port=1214

19 ;;; ndm requester
chain=virus action=drop protocol=tcp dst-port=1363

20 ;;; ndm server
chain=virus action=drop protocol=tcp dst-port=1364

21 ;;; screen cast
chain=virus action=drop protocol=tcp dst-port=1368

22 ;;; hromgrafx
chain=virus action=drop protocol=tcp dst-port=1373

23 ;;; cichlid
chain=virus action=drop protocol=tcp dst-port=1377

24 ;;; Worm
chain=virus action=drop protocol=tcp dst-port=1433-1434

25 ;;; Bagle Virus
chain=virus action=drop protocol=tcp dst-port=2745

26 ;;; Drop Dumaru.Y
chain=virus action=drop protocol=tcp dst-port=2283

27 ;;; Drop Beagle
chain=virus action=drop protocol=tcp dst-port=2535

28 ;;; Drop Beagle.C-K
chain=virus action=drop protocol=tcp dst-port=2745

29 ;;; Drop MyDoom
chain=virus action=drop protocol=tcp dst-port=3127-3128

30 ;;; Drop Backdoor OptixPro
chain=virus action=drop protocol=tcp dst-port=3410

31 ;;; Worm
chain=virus action=drop protocol=tcp dst-port=4444

32 ;;; Worm
chain=virus action=drop protocol=udp dst-port=4444

33 ;;; Drop Sasser
chain=virus action=drop protocol=tcp dst-port=5554

34 ;;; Drop Beagle.B
chain=virus action=drop protocol=tcp dst-port=8866

35 ;;; Drop Dabber.A-B
chain=virus action=drop protocol=tcp dst-port=9898

36 ;;; Drop MyDoom.B
chain=virus action=drop protocol=tcp dst-port=10080

37 ;;; Drop NetBus
chain=virus action=drop protocol=tcp dst-port=12345

38 ;;; Drop Kuang2
chain=virus action=drop protocol=tcp dst-port=17300

39 ;;; Drop SubSeven
chain=virus action=drop protocol=tcp dst-port=27374

40 ;;; Drop PhatBot, Agobot, Gaobot
chain=virus action=drop protocol=tcp dst-port=65506


41 ;;; Jebakan SSH
chain=input action=add-src-to-address-list protocol=udp
address-list=SSH Attacker address-list-timeout=1s
in-interface=ether1-WAN dst-port=22

42 ;;; Drop Ilegal SSH
chain=input action=drop src-address-list=SSH Attacker
in-interface=ether1-WAN

43 ;;; Drop Invalid Connection
chain=forward action=drop connection-state=invalid

44 ;;; jump to the virus chain
chain=forward action=jump jump-target=virus

45 ;;; Drop_invalid_connections
chain=input action=drop connection-state=invalid

46 ;;; Log_everything_else
chain=input action=log log-prefix="DROP INPUT"

47 ;;; Logeverythingelse
chain=input action=log log-prefix="DROP INPUT"