Improve company productivity with a Business Account.Sign Up

x
?
Solved

Sonicwall  TZ100 RDP client session traffic priority

Posted on 2014-02-20
3
Medium Priority
?
730 Views
Last Modified: 2014-05-21
Greetings,

If possible, I would like to prioritize my RDP client session traffic thru my Sonicwall TZ100. We have an office with approx. 10 users connecting with  Remote Desktop connections (RDP client)  to a  remote office running a Remote Services  Server. There are approx. 20 users overall but only 10 utilize RDP. The office only has a fractional T1 (1.5 / 1/5) WAN connection. The RDP users are sporadically experiencing  very slow performance.

 Is there a way to prioritize the RDP session traffic over all other traffic to ensure we get the best RDP session performance?

To clarify: The office with the 10 RDP client users is the office I would like to prioritize the traffic with the Sonicwall TZ100.

Thank for your time.
0
Comment
Question by:COM1
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
Infamus earned 1500 total points
ID: 39875290
0
 

Author Comment

by:COM1
ID: 39878050
Thank you for responding Infamus.
I did configure sonicwall settings per the link with no improvement in speed of Remote Desktop performance. I am not sure this article covers what I need since I need to apply the BWM from the office that has the remote users....not the office where the Remote Server is located.
I don't receive any traffic stats from the Access Rule I created which makes me think it's not working correctly - I've attached a screenshot.
I'm not sure the mstsc.exe uses the term services port 3389 on the client pc...it may be just going out on port 80?


Thanks.Access-Rule-Traffic-Stats.pdf
0
 
LVL 12

Expert Comment

by:Infamus
ID: 40081427
How are the two offices connected?

Are you just allowing RDP on the firewall via internet or do they use VPN to connect to the remote site then RDP?

Is this WAN a internet connection?
0

Featured Post

Building an Effective Phishing Protection Program

Join Director of Product Management Todd OBoyle on April 26th as he covers the key elements of a phishing protection program. Whether you’re an old hat at phishing education or considering starting a program -- we'll discuss critical components that should be in any program.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
Cloud is selling like hotcakes in the town. Technology lovers and even businesses have joined the wagon to taste a piece of this delicious technology treat. But how many of us really know what cloud is?
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

585 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question