diff --git a/data/templates/accel-ppp/pptp.config.j2 b/data/templates/accel-ppp/pptp.config.j2
index 78a629d2d..0082e55bf 100644
--- a/data/templates/accel-ppp/pptp.config.j2
+++ b/data/templates/accel-ppp/pptp.config.j2
@@ -1,112 +1,115 @@
 ### generated by accel_pptp.py ###
 [modules]
 log_syslog
 pptp
 shaper
 {% if auth_mode == 'local' %}
 chap-secrets
 {% elif auth_mode == 'radius' %}
 radius
 {% endif %}
 ippool
 {% for proto in auth_proto %}
 {{ proto }}
 {% endfor %}
 
 [core]
 thread-count={{ thread_cnt }}
 
 [log]
 syslog=accel-pptp,daemon
 copy=1
 level=5
 
 {% if dnsv4 %}
 [dns]
 {%     for dns in dnsv4 %}
 dns{{ loop.index }}={{ dns }}
 {%     endfor %}
 {% endif %}
 
 {% if wins %}
 [wins]
 {%     for server in wins %}
 wins{{ loop.index }}={{ server }}
 {%     endfor %}
 {% endif %}
 
 
 [pptp]
 ifname=pptp%d
 {% if outside_addr %}
 bind={{ outside_addr }}
 {% endif %}
 verbose=1
 ppp-max-mtu={{ mtu }}
 mppe={{ ppp_mppe }}
 echo-interval=10
 echo-failure=3
 
 
 [client-ip-range]
 0.0.0.0/0
 
 [ip-pool]
 tunnel={{ client_ip_pool }}
 gw-ip-address={{ gw_ip }}
 
 [ppp]
 verbose=5
 check-ip=1
 single-session=replace
 
 {% if auth_mode == 'local' %}
 [chap-secrets]
 chap-secrets={{ chap_secrets_file }}
 {% elif auth_mode == 'radius' %}
 [radius]
 verbose=1
 {%     for r in radius_server %}
 server={{ r.server }},{{ r.key }},auth-port={{ r.port }},acct-port={{ r.acct_port }},req-limit=0,fail-time={{ r.fail_time }}
 {%     endfor %}
 
+{%     if radius_acct_interim_interval is vyos_defined %}
+acct-interim-interval={{ radius_acct_interim_interval }}
+{%     endif %}
 {%     if radius_acct_inter_jitter %}
 acct-interim-jitter={{ radius_acct_inter_jitter }}
 {%     endif %}
 
 acct-timeout={{ radius_acct_tmo }}
 timeout={{ radius_timeout }}
 max-try={{ radius_max_try }}
 
 {%     if radius_nas_id %}
 nas-identifier={{ radius_nas_id }}
 {%     endif %}
 {%     if radius_nas_ip %}
 nas-ip-address={{ radius_nas_ip }}
 {%     endif %}
 {%     if radius_source_address %}
 bind={{ radius_source_address }}
 {%     endif %}
 {% endif %}
 {# Both chap-secrets and radius block required the gw-ip-address #}
 {% if gw_ip is defined and gw_ip is not none %}
 gw-ip-address={{ gw_ip }}
 {% endif %}
 
 {% if radius_shaper_enable %}
 [shaper]
 verbose=1
 {%     if radius_shaper_attr %}
 attr={{ radius_shaper_attr }}
 {%     endif %}
 {%     if radius_shaper_multiplier %}
 rate-multiplier={{ radius_shaper_multiplier }}
 {%     endif %}
 {%     if radius_shaper_vendor %}
 vendor={{ radius_shaper_vendor }}
 {%     endif %}
 {% endif %}
 
 [cli]
 tcp=127.0.0.1:2003
 
diff --git a/src/conf_mode/vpn_pptp.py b/src/conf_mode/vpn_pptp.py
index 986a19972..b9d18110a 100755
--- a/src/conf_mode/vpn_pptp.py
+++ b/src/conf_mode/vpn_pptp.py
@@ -1,301 +1,305 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2018-2023 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
 import os
 import re
 
 from copy import deepcopy
 from stat import S_IRUSR, S_IWUSR, S_IRGRP
 from sys import exit
 
 from vyos.config import Config
 from vyos.template import render
 from vyos.util import call, get_half_cpus
 from vyos import ConfigError
 
 from vyos import airbag
 airbag.enable()
 
 pptp_conf = '/run/accel-pppd/pptp.conf'
 pptp_chap_secrets = '/run/accel-pppd/pptp.chap-secrets'
 
 default_pptp = {
     'auth_mode' : 'local',
     'local_users' : [],
     'radius_server' : [],
     'radius_acct_inter_jitter': '',
+    'radius_acct_interim_interval': None,
     'radius_acct_tmo' : '30',
     'radius_max_try' : '3',
     'radius_timeout' : '30',
     'radius_nas_id' : '',
     'radius_nas_ip' : '',
     'radius_source_address' : '',
     'radius_shaper_attr' : '',
     'radius_shaper_enable': False,
     'radius_shaper_multiplier': '',
     'radius_shaper_vendor': '',
     'radius_dynamic_author' : '',
     'chap_secrets_file': pptp_chap_secrets, # used in Jinja2 template
     'outside_addr': '',
     'dnsv4': [],
     'wins': [],
     'client_ip_pool': '',
     'mtu': '1436',
     'auth_proto' : ['auth_mschap_v2'],
     'ppp_mppe' : 'prefer',
     'thread_cnt': get_half_cpus()
 }
 
 def get_config(config=None):
     if config:
         conf = config
     else:
         conf = Config()
     base_path = ['vpn', 'pptp', 'remote-access']
     if not conf.exists(base_path):
         return None
 
     pptp = deepcopy(default_pptp)
     conf.set_level(base_path)
 
     if conf.exists(['name-server']):
         pptp['dnsv4'] = conf.return_values(['name-server'])
 
     if conf.exists(['wins-server']):
         pptp['wins'] = conf.return_values(['wins-server'])
 
     if conf.exists(['outside-address']):
         pptp['outside_addr'] = conf.return_value(['outside-address'])
 
     if conf.exists(['authentication', 'mode']):
         pptp['auth_mode'] = conf.return_value(['authentication', 'mode'])
 
     #
     # local auth
     if conf.exists(['authentication', 'local-users']):
         for username in conf.list_nodes(['authentication', 'local-users', 'username']):
             user = {
                 'name': username,
                 'password' : '',
                 'state' : 'enabled',
                 'ip' : '*',
             }
 
             conf.set_level(base_path + ['authentication', 'local-users', 'username', username])
 
             if conf.exists(['password']):
                 user['password'] = conf.return_value(['password'])
 
             if conf.exists(['disable']):
                 user['state'] = 'disable'
 
             if conf.exists(['static-ip']):
                 user['ip'] = conf.return_value(['static-ip'])
 
             if not conf.exists(['disable']):
                 pptp['local_users'].append(user)
 
     #
     # RADIUS auth and settings
     conf.set_level(base_path + ['authentication', 'radius'])
     if conf.exists(['server']):
         for server in conf.list_nodes(['server']):
             radius = {
                 'server' : server,
                 'key' : '',
                 'fail_time' : 0,
                 'port' : '1812',
                 'acct_port' : '1813'
             }
 
             conf.set_level(base_path + ['authentication', 'radius', 'server', server])
 
             if conf.exists(['disable-accounting']):
                 radius['acct_port'] = '0'
 
             if conf.exists(['fail-time']):
                 radius['fail_time'] = conf.return_value(['fail-time'])
 
             if conf.exists(['port']):
                 radius['port'] = conf.return_value(['port'])
 
             if conf.exists(['acct-port']):
                 radius['acct_port'] = conf.return_value(['acct-port'])
 
             if conf.exists(['key']):
                 radius['key'] = conf.return_value(['key'])
 
             if not conf.exists(['disable']):
                 pptp['radius_server'].append(radius)
 
         #
         # advanced radius-setting
         conf.set_level(base_path + ['authentication', 'radius'])
 
+        if conf.exists(['accounting-interim-interval']):
+            pptp['radius_acct_interim_interval'] = conf.return_value(['accounting-interim-interval'])
+
         if conf.exists(['acct-interim-jitter']):
             pptp['radius_acct_inter_jitter'] = conf.return_value(['acct-interim-jitter'])
 
         if conf.exists(['acct-timeout']):
             pptp['radius_acct_tmo'] = conf.return_value(['acct-timeout'])
 
         if conf.exists(['max-try']):
             pptp['radius_max_try'] = conf.return_value(['max-try'])
 
         if conf.exists(['timeout']):
             pptp['radius_timeout'] = conf.return_value(['timeout'])
 
         if conf.exists(['nas-identifier']):
             pptp['radius_nas_id'] = conf.return_value(['nas-identifier'])
 
         if conf.exists(['nas-ip-address']):
             pptp['radius_nas_ip'] = conf.return_value(['nas-ip-address'])
 
         if conf.exists(['source-address']):
             pptp['radius_source_address'] = conf.return_value(['source-address'])
 
         # Dynamic Authorization Extensions (DOA)/Change Of Authentication (COA)
         if conf.exists(['dae-server']):
             dae = {
                 'port' : '',
                 'server' : '',
                 'key' : ''
             }
 
             if conf.exists(['dynamic-author', 'ip-address']):
                 dae['server'] = conf.return_value(['dynamic-author', 'ip-address'])
 
             if conf.exists(['dynamic-author', 'port']):
                 dae['port'] = conf.return_value(['dynamic-author', 'port'])
 
             if conf.exists(['dynamic-author', 'key']):
                 dae['key'] = conf.return_value(['dynamic-author', 'key'])
 
             pptp['radius_dynamic_author'] = dae
 
         # Rate limit
         if conf.exists(['rate-limit', 'attribute']):
             pptp['radius_shaper_attr'] = conf.return_value(['rate-limit', 'attribute'])
 
         if conf.exists(['rate-limit', 'enable']):
             pptp['radius_shaper_enable'] = True
 
         if conf.exists(['rate-limit', 'multiplier']):
             pptp['radius_shaper_multiplier'] = conf.return_value(['rate-limit', 'multiplier'])
 
         if conf.exists(['rate-limit', 'vendor']):
             pptp['radius_shaper_vendor'] = conf.return_value(['rate-limit', 'vendor'])
 
     conf.set_level(base_path)
     if conf.exists(['client-ip-pool']):
         if conf.exists(['client-ip-pool', 'start']) and conf.exists(['client-ip-pool', 'stop']):
             start = conf.return_value(['client-ip-pool', 'start'])
             stop  = conf.return_value(['client-ip-pool', 'stop'])
             pptp['client_ip_pool'] = start + '-' + re.search('[0-9]+$', stop).group(0)
 
     if conf.exists(['mtu']):
         pptp['mtu'] = conf.return_value(['mtu'])
 
     # gateway address
     if conf.exists(['gateway-address']):
         pptp['gw_ip'] = conf.return_value(['gateway-address'])
     else:
         # calculate gw-ip-address
         if conf.exists(['client-ip-pool', 'start']):
             # use start ip as gw-ip-address
             pptp['gateway_address'] = conf.return_value(['client-ip-pool', 'start'])
 
     if conf.exists(['authentication', 'require']):
         # clear default list content, now populate with actual CLI values
         pptp['auth_proto'] = []
         auth_mods = {
             'pap': 'auth_pap',
             'chap': 'auth_chap_md5',
             'mschap': 'auth_mschap_v1',
             'mschap-v2': 'auth_mschap_v2'
         }
 
         for proto in conf.return_values(['authentication', 'require']):
             pptp['auth_proto'].append(auth_mods[proto])
 
     if conf.exists(['authentication', 'mppe']):
         pptp['ppp_mppe'] = conf.return_value(['authentication', 'mppe'])
 
     return pptp
 
 
 def verify(pptp):
     if not pptp:
         return None
 
     if pptp['auth_mode'] == 'local':
         if not pptp['local_users']:
             raise ConfigError('PPTP local auth mode requires local users to be configured!')
 
         for user in pptp['local_users']:
             username = user['name']
             if not user['password']:
                 raise ConfigError(f'Password required for local user "{username}"')
 
     elif pptp['auth_mode'] == 'radius':
         if len(pptp['radius_server']) == 0:
             raise ConfigError('RADIUS authentication requires at least one server')
 
         for radius in pptp['radius_server']:
             if not radius['key']:
                 server = radius['server']
                 raise ConfigError(f'Missing RADIUS secret key for server "{ server }"')
 
     if len(pptp['dnsv4']) > 2:
         raise ConfigError('Not more then two IPv4 DNS name-servers can be configured')
 
     if len(pptp['wins']) > 2:
         raise ConfigError('Not more then two IPv4 WINS name-servers can be configured')
 
 
 def generate(pptp):
     if not pptp:
         return None
 
     render(pptp_conf, 'accel-ppp/pptp.config.j2', pptp)
 
     if pptp['local_users']:
         render(pptp_chap_secrets, 'accel-ppp/chap-secrets.j2', pptp)
         os.chmod(pptp_chap_secrets, S_IRUSR | S_IWUSR | S_IRGRP)
     else:
         if os.path.exists(pptp_chap_secrets):
              os.unlink(pptp_chap_secrets)
 
 
 def apply(pptp):
     if not pptp:
         call('systemctl stop accel-ppp@pptp.service')
         for file in [pptp_conf, pptp_chap_secrets]:
             if os.path.exists(file):
                 os.unlink(file)
 
         return None
 
     call('systemctl restart accel-ppp@pptp.service')
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         exit(1)