Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


What is the secure way to set up access with Remote Desktop behind a 4port router belkin?

Posted on 2005-03-07
Medium Priority
Last Modified: 2010-04-09
We have a 4 port router with a standard firewall and I was going to forward a port to a machine behind the firewall to use Remote Desktop, however I wanted to do it in a secure manner.
Question by:ongbak
1 Comment
LVL 38

Accepted Solution

Rich Rumble earned 2000 total points
ID: 13491392
The best way is VPN'ing into a router/firewall then using RD. Port forwarding is good, and if possible using an access list limit what IP's can see this port being open. If you know that your going to connect to that PC from a certain range of IP's permit only the ones you will access that port from. That's the ideal way. But if you will be accessing this pc from various sources that you will not be able to tell the IP of- then you may think about the VPN solution.

But there are a few other ways to be secure when doing this sort of thing. Terminal Service (aka Remote Desktop) listening port's are easily changed to something innocuous. If you have windows 2000 clients that will connect to the RD with the default listening port changed, I suggest downloading the Remote Desktop Client For Xp and install it on the 2000 workstation, as it makes connecting to a non-standard TS/RD port easier
To connect type in the ip or the DNS name of the RD, and place a colon then the port number
http://support.microsoft.com/kb/306759 (change the RD listening port)

Featured Post

[Webinar On Demand] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This video shows how to quickly and easily deploy an email signature for all users in Office 365 and prevent it from being added to replies and forwards. (the resulting signature is applied on the server level in Exchange Online) The email signat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month10 days, 17 hours left to enroll

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question