Solved

Configuring Netscreen/Juniper Firewall to allow remote desktop access to server

Posted on 2006-11-15
7
19,240 Views
Last Modified: 2013-11-21
Hi,

I need help configuring a netscreen/Juniper NS5GT firewall so that someone from outside can connect to a server on our LAN (IP address is 10.10.10.3) through Windows Remote Desktop.

Here is what I have tried and is NOT working.

I created a new custom service object named "MSTSC (desktop sharing)" with parameters of:
TCP src port: 0-65535, dst port: 3389-3389
UDP src port: 0-65535, dst port: 3389-3389

Then I created a new policy from Untrust to Trust with the following parameters:
Source Address: any
Destination address: any
Service: MSTSC (desktop sharing)
Application: (ignore)
Action: permit
Antivirus profile: none
Tunnel-VPN: none
Tunnel-L2TP: none

And under "Advanced"
NAT-Destination Translation is checked with Translate to IP set to 10.10.10.3 (map to port is unchecked)
Authetication is unchecked
Traffic shaping is unchecked

I have two other policies from Untrust to Trust:  One is to allow pinging (not sure it is doing anything) and one that was used to set up our VPN (which is working).  Both of those policies come before this new one I created for desktop sharing.

I only have one policy from Trust to Untrust which permits anything from any address to any address.

From outside the company LAN (e.g., at home), I try to connect through Remote Desktop sharing (from Win XP Pro) to the public IP address we all have when we are on the LAN (i.e., what www.showmyIP.com reports when I'm at the office), but the Remote Desktop App on my computer doesn't seem to be able to get a response from the server (don't remember the exact message, but it seems to time out)

Any suggestions?

I'm also planning to modify the policy to specify the From IP address for better security once I get it working, but let me know if you have any suggestions related to that or other issues of security.

Thanks!
Tim
0
Comment
Question by:timwhunt
7 Comments
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 17948645
1.  i wouldn't open this up since it is a rather large security hole. I would setup a VPN and have external users VPN in and THEN access remote desktop
2.  but if you want to use remote desktop and have external users directly remote in, then you will need to do one of two things
a) setup port forwarding so any request for port 3389 gets redirected to the LAN ip of 10.10.10.3
b. setup a static mapping of another external public IP (if you have one) that is mapped to 10.10.10.3
0
 

Author Comment

by:timwhunt
ID: 17948836
Thanks for the quick comments.  For employees we have VPN set up, but this is our phone PBX vendor who wants to remotely tweak configs just on our dedicated computer for the phone system.  It doesn't sound like they have the same VPN client, but it is very possible I could give them the parameters that they could use with their client.  But I thought this would be easier to set up (less/no configuration on their side) and I would think restricting this to their IP address would make it pretty secure.

I thought the configuration I described above would do what you call 2a, but please explain if and how it is different.

Thanks again,
Tim
0
 

Author Comment

by:timwhunt
ID: 18147201
Any other suggestions or thoughts?
0
Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

 
LVL 9

Expert Comment

by:David Piniella
ID: 19453849
set up a VIP in your interfaces for that particular client machine

it should be a CLI command like
set interface untrust vip untrust 3389 "RDP" 10.10.10.1

and then change the policy -- it should be from untrust to untrust (from outside your network to the untrust interface of your netscreen) and should look something like
set pol id 5 from "Untrust" to "Untrust" "Any" "VIP(untrust)" "3389" permit log

(the policy id "5" is just whatever policy # you have already...I used 5 as an example because I'm guessing you have 5 policies already)

Once that is done, have the vendor (or whoever) RDP to the FIREWALL's untrust address; it will do the PAT magic for you and then it'll work.
0
 
LVL 5

Accepted Solution

by:
ccreamer_22 earned 250 total points
ID: 20082325
If you have another public ip address your not using, Creating a MIP would work and just allow destination 3389 tcp/udp through. Also make sure that you can RDP to the server from inside your network so that you know that Windows firewall or allow RDP is not interfering. Making a MIP is found on http://kb.juniper.net/CUSTOMERSERVICE/index?page=kbdetail&record_id=0244022611e8310108012c3c1906630
0
 
LVL 9

Expert Comment

by:David Piniella
ID: 20082762
the way you describe it being setup, the NAT is only outbound, not inbound. For the inbound translation to be set (so that it works as you seem to expect it in situation 2a above -- this is better known as inbound PAT, not NAT btw), you have to setup a VIP or MIP as detailed above by mikeleebrla, myself or ccreamer_22.
0
 

Expert Comment

by:explorer648
ID: 24425071
I do not understand can you elebrate telling me how to do this using the web interface
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question