Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

I can RDP into virtual but not our office server.

I was wondering if anybody knows why I can remote into our office virtual server but not our main server 2008? I was able to remote in before I installed UTM9, with cheapie router.  the server is ***.***x.com:7811. I'm getting packets dropped from Port 5090. I have already forwarded ports for an Xbox to be online and I figured that this would be almost the same but I am I wrong?


This thread was automatically locked due to age.
  • If you want to RDP in usually you will need to forward port 3389.
    You can create a DNAT rule for traffic arriving at WAN (Address) for the selected port (service) and change destination to your server. Click automatic firewall rule (or create a rule yourself) and you should be done.
    If you also need to change ports, you can also enter a different service for the destination. I think you may need service 7811 for the matching condition and port 3389 for the destination since that is the default RDP port.

    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • no do not do a port forward and leave rdp exposed to the internet.  Use the htmp 5 portal and set it up for an rdp connection to your server or setup an ssl vpn to your network and use that to tunnel rdp.

    Owner:  Emmanuel Technology Consulting

    http://etc-md.com

    Former Sophos SG(Astaro) advocate/researcher/Silver Partner

    PfSense w/Suricata, ntopng, 

    Other addons to follow

  • Agree with William on this one. Exposing a Windows Remote Desktop server with a port forward is a bad idea. RDP, despite some recent improvements, is still not a secure protocol and is an easier way into a system for hackers.
  • +1 on William's advice here. It crossed my mind before I began typing my reaction, but forgot to mention it after all.

    Managing several Sophos UTMs and Sophos XGs both at work and at some home locations, dedicated to continuously improve IT-security and feeling well helping others with their IT-security challenges.

    Sometimes I post some useful tips on my blog, see blog.pijnappels.eu/category/sophos/ for Sophos related posts.

  • .... the server is ***.***x.com:7811. I'm getting packets dropped from Port 5090.....
    Guys, I believe he is trying to access his office server on port 7811 and is not asking for a DNAT rule. Of course I may be totally wrong [:O]