What is the secure way to set up access with Remote Desktop behind a 4port router belkin?

Posted on 2005-03-07
Medium Priority
Last Modified: 2010-04-09
We have a 4 port router with a standard firewall and I was going to forward a port to a machine behind the firewall to use Remote Desktop, however I wanted to do it in a secure manner.
Question by:ongbak
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
LVL 38

Accepted Solution

Rich Rumble earned 2000 total points
ID: 13491392
The best way is VPN'ing into a router/firewall then using RD. Port forwarding is good, and if possible using an access list limit what IP's can see this port being open. If you know that your going to connect to that PC from a certain range of IP's permit only the ones you will access that port from. That's the ideal way. But if you will be accessing this pc from various sources that you will not be able to tell the IP of- then you may think about the VPN solution.

But there are a few other ways to be secure when doing this sort of thing. Terminal Service (aka Remote Desktop) listening port's are easily changed to something innocuous. If you have windows 2000 clients that will connect to the RD with the default listening port changed, I suggest downloading the Remote Desktop Client For Xp and install it on the 2000 workstation, as it makes connecting to a non-standard TS/RD port easier
To connect type in the ip or the DNS name of the RD, and place a colon then the port number
http://support.microsoft.com/kb/306759 (change the RD listening port)

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question