Jump to content

RDP - Remote Desktop Access via Internet ?


kernol
 Share

Go to solution Solved by kernol,

Recommended Posts

Just installed Endpoint Security 6 on Windows 10 desktop with ESET firewall active.

Can RDP locally from one workstation to another - but can no longer RDP from external.

Windows firewall did allow RDP from external via internet - and still does if I disable ESET firewall completely.

 

Can someone please supply rule to be added to permit RDP through ESET firewall from internet - and what setting to select - Automatic mode; Interactive mode; Policy based mode or Learning mode ??  NB - need to RDP from a laptop - so don't have fixed public ip!

 

Many thanks

 

Link to comment
Share on other sites

  • Administrators

RDP is allowed in the Trusted zone by default. From a security point of view, it'd be better to allow the above mentioned port just for a specific remote IP address or add it to the trusted zone. 

Link to comment
Share on other sites

RDP is allowed in the Trusted zone by default. From a security point of view, it'd be better to allow the above mentioned port just for a specific remote IP address or add it to the trusted zone. 

Thanks Marcos

 

I use CISCO Anyconnect to VPN to my office and having connected use Remote Desktop to access my office PC from my home PC - or on the road from my laptop.

Under Windows 10 Firewall - this was not a problem - because I assume it sees my connection as being from within the trusted zone.

With ESET Firewall - this connection is blocked!

 

I too would prefer not to open port 3389/TCP from everywhere - but home PC and laptop on the move have dynamic ip addresses - so confining the port to a single ip won't work.

 

Is there a more secure solution?

 

Many thanks

John

Link to comment
Share on other sites

  • Administrators

As long as the IP address is in the Trusted zone, you should be able to connect via RDP as it's allowed in the Trusted zone by default. You can also run the Firewall troubleshooting wizard to see a list of recently blocked communications and to allow the desired one(s).

Link to comment
Share on other sites

  • Solution

As long as the IP address is in the Trusted zone, you should be able to connect via RDP as it's allowed in the Trusted zone by default. You can also run the Firewall troubleshooting wizard to see a list of recently blocked communications and to allow the desired one(s).

 

Many thanks for that tip Marcos - the wizard uncovered the ip address used by my CISCO VPN so I was able to add the private ip range so that multiple workers could use RDP to gain access to their workstations.  Far safer than simply opening the port for "any" access from anywhere.  Remote users have to authenticate through the CISCO before they will be able to use Remote Desktop from outside our internal network.

 

It also uncovered a problem between an HP Multi-functional printer which provides e-Print services to remote users who print from mobile devices to the office printer [iDS was blocking them].

 

Problems solved - thanks

John

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...