Link to home
Start Free TrialLog in
Avatar of jamiejolliffe
jamiejolliffe

asked on

Configuring a Dual-WAN Router for improved Terminal Services (RDP) performance

I have two servers, one a file server running Windows Server 2000 and the other is a terminal server running Windows Server 2003.  Most of my remote terminal services uses complain about the performance, particularly during the day when my office is full and has many people accessing the internet at the same time.

To try to improve the situation, I added a second WAN connection and purchased a FortiGate-50B dual wan firewall router.  The way I wanted it setup was to use my WAN1 (Bell DSL with static IP) solely for the port 3389 on the terminal server, and then use WAN2 (Rogers Cable) for all other internet usage (web browsing/e-mail/etc.).  The company that installed this had it setup this way at first, but the problem came up that I could no longer access Bell's SMTP server because it needs to go through the Bell ISP (it won't let you access their SMTP from another ISP, in my case Roger's).  They tried to fix this, but in the end they've setup load balancing with means that although I can access the SMTP, my Bell connection is being used for more that terminal services, and as a result the remote user's performance isn't much improved.

Does anyone know how I can setup my FortiGate-50B so that:

All 3389 traffic uses WAN1 (Bell)
All 25 traffic (SMTP) uses WAN1 (Bell)
All other traffic (web browsing, port 587 SMTP, incoming mail, etc.) uses WAN2 (Rogers)

Thanks in advance!
ASKER CERTIFIED SOLUTION
Avatar of culverfranchising
culverfranchising

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of jamiejolliffe
jamiejolliffe

ASKER

Thanks for the info,

I had already setup that SMTP policy, with the exception of specifiying Protocol 6 (I had left the default Protocol 0, which would force SMTP through WAN1, but it would also force all other traffice (HTTP 80, etc.) through WAN1.  Changing to Protocol 6 seems to have done what I want by only forcing SMTP through WAN1 while still sending the other traffice through WAN2.

To date, I have been using a "Virtual IP" to map all 3389 traffice to the internal IP of my terminal server.  Is there any reason for me to setup the policy you mentioned above for port 3389 as well (keep in mind that obviously all 3389 communication would be external access, no internal 3389 connections would exist)?
Policy Routes are only used for traffic that is heading outbound to another interface on the device.  Virutal IP's are used to map inbound services from interface to another, of which in your case you are correctly using.  The only other recommendation I would have would be to configure failover routing using static routes, and then configure the same firewall rule you have currently to your other WAN connection.   This will make sure in the event of an outage on your WAN interface that is servicing the TS sessions that you can still gain access through your second WAN interface.
Thanks, I will set that up.  The only issue there is that my second WAN does not have static IP, so I will need to setup dynamic DNS for it to be a viable backup connection for my remote users.
Thanks!