Question about securing RDP, that is simply port forwarded via router.<\/p>\n
Advertisement
I realize, automated bots will descend on opened ports and run their brute force attack methods. What I’m wondering; can updating windows firewall rule, to only allow connections from some wan IP address, be enough, to protect an RDP connection. I’ve tried and gone from seeing constant attacks (no firewall rule), vs no attacks (with firewall rule). No attacks that I’m aware of. What are peoples thoughts on this method, for securing RDP? Is there a way, for hackers to circumvent such a rule? Can hackers hack an active session; I would think not, since RDP traffic is encrypted.<\/p>","upvoteCount":4,"answerCount":42,"datePublished":"2020-07-13T14:25:30.000Z","author":{"@type":"Person","name":"spiceuser-68k4n","url":"https://community.spiceworks.com/u/spiceuser-68k4n"},"suggestedAnswer":[{"@type":"Answer","text":"
Advertisement
Question about securing RDP, that is simply port forwarded via router.<\/p>\n
I realize, automated bots will descend on opened ports and run their brute force attack methods. What I’m wondering; can updating windows firewall rule, to only allow connections from some wan IP address, be enough, to protect an RDP connection. I’ve tried and gone from seeing constant attacks (no firewall rule), vs no attacks (with firewall rule). No attacks that I’m aware of. What are peoples thoughts on this method, for securing RDP? Is there a way, for hackers to circumvent such a rule? Can hackers hack an active session; I would think not, since RDP traffic is encrypted.<\/p>","upvoteCount":4,"datePublished":"2020-07-13T14:25:30.000Z","url":"https://community.spiceworks.com/t/rdp-secure-port-forward-method/769027/1","author":{"@type":"Person","name":"spiceuser-68k4n","url":"https://community.spiceworks.com/u/spiceuser-68k4n"}},{"@type":"Answer","text":"
IPs can be spoofed, so if someone find out what you are set to you could be in trouble.<\/p>\n
Why do you want to do it this way instead of using an accepted secure method?<\/p>","upvoteCount":2,"datePublished":"2020-07-13T14:34:55.000Z","url":"https://community.spiceworks.com/t/rdp-secure-port-forward-method/769027/2","author":{"@type":"Person","name":"DragonsRule","url":"https://community.spiceworks.com/u/DragonsRule"}},{"@type":"Answer","text":"
updating the windows firewall rule means that the connection attempts will still be comming through the router and to the host. So if there were an exploit or other you may be vulnerable. \nYou could add a similar firewall rule to the router so that it only allows connections form the same set of IP addresses on the port forward. This will stop the connections there. Also on the router using a different port to the default for rdp is advised - it will fool some simple port scan tools. \nTo increase security from this you would need to look at using either a VPN or reverse proxy and a web services rdp gateway.<\/p>","upvoteCount":1,"datePublished":"2020-07-13T14:37:12.000Z","url":"https://community.spiceworks.com/t/rdp-secure-port-forward-method/769027/3","author":{"@type":"Person","name":"matt7863","url":"https://community.spiceworks.com/u/matt7863"}},{"@type":"Answer","text":"
I’d be curious how the hacker could determine, what IP was listed as allowed. First off, they can’t see the port because it wont respond to them; they would need to know the port (I’m using random port number) and then spoof all IP’s against until seeing a response. Don’t think this would be likely. The accepted secure methods, in my opinion, are simply double bagging the security; usually VPN is suggested, but VPN can also be brute forced over time, so I’m experimenting with alternate methods.<\/p>","upvoteCount":2,"datePublished":"2020-07-13T15:27:06.000Z","url":"https://community.spiceworks.com/t/rdp-secure-port-forward-method/769027/4","author":{"@type":"Person","name":"spiceuser-68k4n","url":"https://community.spiceworks.com/u/spiceuser-68k4n"}},{"@type":"Answer","text":"
I’ve also tried at router level; for instance, our sonic walls have the ability to create rules that can only be accessed by certain IP or domain. \nAs for deploying vpn or reverse proxy and web rdp gateways, it’s not feasible, for small business clients who may only have 1-2 computers. \nI’ve heard many, say, the IP could be spoofed; how could a hacker know what IP i’m allowing; what would be the discovery technique?<\/p>","upvoteCount":0,"datePublished":"2020-07-13T15:31:48.000Z","url":"https://community.spiceworks.com/t/rdp-secure-port-forward-method/769027/5","author":{"@type":"Person","name":"spiceuser-68k4n","url":"https://community.spiceworks.com/u/spiceuser-68k4n"}},{"@type":"Answer","text":"