Solved

How to configure a Netscreen 5 series to allow MS Terminal Service

Posted on 2004-09-28
5
387 Views
Last Modified: 2013-11-21
I have a Netscreen 5XGT firewall that is in NAT mode, and I need to gonfigure it to allow me to acces a Windows 2000 Server using Terminal Service.... How do I do this ?

TIA
0
Comment
Question by:Thornton44
  • 3
  • 2
5 Comments
 
LVL 3

Expert Comment

by:ccceqo2
ID: 12172458
I don't understand if the network looks like this:

Your PC ----->  Netsceen -----> Internet ------> Terminal Server

Or do you mean the terminal server is behind the netscreen?

Internet -----> Netsceen ----> Terminal Server

Anyway, you need make sure that port 3389 is unblocked the whole way and forwarded to the server at the server end.
0
 

Author Comment

by:Thornton44
ID: 12173627
The problem is My PC ----->Internet------>Netscreen-------->W2K Terminal server.
I'll try again, but there is something I'm missing in the Netscreen config. I can TS just fine behind the Netscreen...in a 192.x.x.x space.
0
 

Author Comment

by:Thornton44
ID: 12175918
Okay, this is all about punching a hole in the Netscreen in NAT mode.....I hope I never run into one of these things again....
0
 
LVL 3

Expert Comment

by:ccceqo2
ID: 12179704
If you are sharing an IP address (nat mode), you need to configure the netscreen for port forwarding, from the external address (ie. the one from your isp) on port 3389 to the private ip of your server (eg 192.168.0.1) on port 3389.
0
 
LVL 3

Accepted Solution

by:
ccceqo2 earned 500 total points
ID: 12180187
You might need to connect up the the com port of the netscreen to get to the CLI.

Reference manual here:
http://www.juniper.net/techpubs/software/screenos/screenos4x/cli_4_0_0_rev_g.pdf

Happy reading.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question