Link to home
Start Free TrialLog in
Avatar of timwhunt
timwhunt

asked on

Configuring Netscreen/Juniper Firewall to allow remote desktop access to server

Hi,

I need help configuring a netscreen/Juniper NS5GT firewall so that someone from outside can connect to a server on our LAN (IP address is 10.10.10.3) through Windows Remote Desktop.

Here is what I have tried and is NOT working.

I created a new custom service object named "MSTSC (desktop sharing)" with parameters of:
TCP src port: 0-65535, dst port: 3389-3389
UDP src port: 0-65535, dst port: 3389-3389

Then I created a new policy from Untrust to Trust with the following parameters:
Source Address: any
Destination address: any
Service: MSTSC (desktop sharing)
Application: (ignore)
Action: permit
Antivirus profile: none
Tunnel-VPN: none
Tunnel-L2TP: none

And under "Advanced"
NAT-Destination Translation is checked with Translate to IP set to 10.10.10.3 (map to port is unchecked)
Authetication is unchecked
Traffic shaping is unchecked

I have two other policies from Untrust to Trust:  One is to allow pinging (not sure it is doing anything) and one that was used to set up our VPN (which is working).  Both of those policies come before this new one I created for desktop sharing.

I only have one policy from Trust to Untrust which permits anything from any address to any address.

From outside the company LAN (e.g., at home), I try to connect through Remote Desktop sharing (from Win XP Pro) to the public IP address we all have when we are on the LAN (i.e., what www.showmyIP.com reports when I'm at the office), but the Remote Desktop App on my computer doesn't seem to be able to get a response from the server (don't remember the exact message, but it seems to time out)

Any suggestions?

I'm also planning to modify the policy to specify the From IP address for better security once I get it working, but let me know if you have any suggestions related to that or other issues of security.

Thanks!
Tim
Avatar of mikeleebrla
mikeleebrla
Flag of United States of America image

1.  i wouldn't open this up since it is a rather large security hole. I would setup a VPN and have external users VPN in and THEN access remote desktop
2.  but if you want to use remote desktop and have external users directly remote in, then you will need to do one of two things
a) setup port forwarding so any request for port 3389 gets redirected to the LAN ip of 10.10.10.3
b. setup a static mapping of another external public IP (if you have one) that is mapped to 10.10.10.3
Avatar of timwhunt
timwhunt

ASKER

Thanks for the quick comments.  For employees we have VPN set up, but this is our phone PBX vendor who wants to remotely tweak configs just on our dedicated computer for the phone system.  It doesn't sound like they have the same VPN client, but it is very possible I could give them the parameters that they could use with their client.  But I thought this would be easier to set up (less/no configuration on their side) and I would think restricting this to their IP address would make it pretty secure.

I thought the configuration I described above would do what you call 2a, but please explain if and how it is different.

Thanks again,
Tim
Any other suggestions or thoughts?
Avatar of David Piniella
set up a VIP in your interfaces for that particular client machine

it should be a CLI command like
set interface untrust vip untrust 3389 "RDP" 10.10.10.1

and then change the policy -- it should be from untrust to untrust (from outside your network to the untrust interface of your netscreen) and should look something like
set pol id 5 from "Untrust" to "Untrust" "Any" "VIP(untrust)" "3389" permit log

(the policy id "5" is just whatever policy # you have already...I used 5 as an example because I'm guessing you have 5 policies already)

Once that is done, have the vendor (or whoever) RDP to the FIREWALL's untrust address; it will do the PAT magic for you and then it'll work.
ASKER CERTIFIED SOLUTION
Avatar of ccreamer_22
ccreamer_22
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
the way you describe it being setup, the NAT is only outbound, not inbound. For the inbound translation to be set (so that it works as you seem to expect it in situation 2a above -- this is better known as inbound PAT, not NAT btw), you have to setup a VIP or MIP as detailed above by mikeleebrla, myself or ccreamer_22.
I do not understand can you elebrate telling me how to do this using the web interface