Solved

Firewall configuration to allow ultraVNC

Posted on 2011-02-10
7
870 Views
Last Modified: 2012-05-11
WatchGuard System Manager 11.0
What ports need to be open to allow remote install and uninstall of ultraVNC.  Im looking for suggestions for router configurations to use this software to connect to other networks to control/administer remote comptuers.  
0
Comment
Question by:jshval
7 Comments
 
LVL 1

Expert Comment

by:nitroxmike
Comment Utility
Are you going out the WatchGuard or trying to go in a WatchGuard firewall?  If you are attempting to come in the Watchguard I suggest you setup a SSL vpn and get access to the internal network that way instead of putting holes in the firewall that allow installing programs on computers behind the WatchGuard.
0
 

Author Comment

by:jshval
Comment Utility
Going out from the watchguard firewall.
0
 
LVL 5

Expert Comment

by:shadowmantx
Comment Utility
VNC uses ports 5800 and 5900.  Put port forwarding from WAN to LAN and that should work.  I like using it for remote control support.

Here is a useful guide that will help.

http://www.ezlan.net/vnc.html
0
 
LVL 1

Accepted Solution

by:
nitroxmike earned 500 total points
Comment Utility
In order to remotely install software you would need to open file sharing to the internet.  I do not recommend this at all.  Instead why don't you just setup a free Logmein or simular account and have the person connect and download the client to their computer.  Then it is their computer making the connection out of their network.  You can connect to them any time that way without exposing their C: drive to the internet.

Unless you are running v11.4 software and have turned on "Application Control" then Logmein will be allowed out through the standard http/https policy.
0
 
LVL 68

Expert Comment

by:Qlemo
Comment Utility
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Let’s list some of the technologies that enable smooth teleworking. 
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now