Solved

Securing machines on network for remote access, but allowing internal Administration.

Posted on 2014-11-06
10
188 Views
Last Modified: 2014-11-12
We have VMware 5.5 and Windows server environment. Currently we have very little control of our WAN, as it's a ISP managed router and Firewall, so anything we do has to go through a ticketing process with 24-48 turn around time. We are leaving this provider and bringing most if not all in house. What I need to do is put some VMs and a couple physical PCs in a secure remote access environment, but yet still have access to administer and pull information off, when a user has completed a project. I'm currently configuring and securing RDP as much as possible to the physical machines but tends to be tedious. We have source code we are trying to secure as the developers work.

If anyone needs more network design information I can provide.

I'm wondering if we put something like a Sonicwall firewall in place, can I accomplish this with a DMZ or another configuration?   Ideas?
0
Comment
Question by:Harold
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 5
10 Comments
 
LVL 120
ID: 40426244
Do the computers need to have access to a LAN at all.

e.g. you can host VMs on vSphere and just "turn off" networking, you will still be able to access the servers, via the console, using vSphere Clients and Web Client, using permissions to who has access.
0
 
LVL 1

Author Comment

by:Harold
ID: 40426253
Andrew, yes that's my problem, some are development machines that we have internal people that will need access to the code, when completed.
Right now, I'm the only person that uses the vSphere client.
0
 
LVL 120

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40426407
You could give them access via vSphere Client, and access only?

Do they need to download the code ?
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 
LVL 1

Author Comment

by:Harold
ID: 40426491
Yes, there is an app. being developed as a SaaS,  so output from this will need to be accessed per needs of client. Also the development machine will need access to pull off source code as needed as well.

For the development machine I looked at locking down RDP, by disabling clipboard, printing etc..., but that defeats the purpose, as the developer needs local PC admin privileges to install and uninstall the program for testing during development.
0
 
LVL 1

Author Comment

by:Harold
ID: 40434877
Andrew: is the vSphere client the only option? A DMZ is not an option?
0
 
LVL 120

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40434887
You could use DMZ with Access Control to the DMZ with IP Address.
0
 
LVL 1

Author Comment

by:Harold
ID: 40434949
Andrew: You have any information on how I could setup a DMZ within our current VMware infrastructure or do we need to buy an appliance?
0
 
LVL 120
ID: 40434992
You can certainly create a DMZ using VMware vSphere and networking and vSwitches, but there is no method to restrict access to it. e.g. block IP Addresses.

Maybe you could use Windows Firewall, and limit access to the VM, with Firewall Rules?

e.g. limit access via RDP, based on userid and firewall access.
0
 
LVL 1

Author Comment

by:Harold
ID: 40435075
Andrew: have you worked with VMware vCloud Neworking and Security. Supposedly give you a true DMZ but in a virtual application.
0
 
LVL 120
ID: 40435224
Yes, we have, that's what we do.

If you contain, a server in a hypervisor, using vSphere networking, you cannot access it from the outside world.
0

Featured Post

Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Datacenter object VMWare 7 59
Which vmware product do I need. 8 57
SBS2011 fails to start 36 60
Problem to Citrix 2 8
In this article, I will show you HOW TO: Create your first Windows Virtual Machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, the Windows OS we will install is Windows Server 2016.
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question