Enable Remote Desktop Windows Server 2012 Firewall

Get answers from your peers along with millions of IT pros who visit Spiceworks.
Join Now

I am able to remote to my server from within the LAN and I already have a physically installed firewall wall that is working. my question;

How do I remote/connect to my Windows server 2012 r2 standard out of my local area network and what are the bestpractices?
Best Answer
Pure Capsaicin
OP
Gary D Williams
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:21 UTC
Windows Server expert
260 Best Answers
311 Helpful Votes

Best practice is to ALWAYS VPN in to your network and then RDP to server just like you are on the LAN.

View this "Best Answer" in the replies below »
Popular Topics in Windows Server
  • Are you smarter than most IT pros?
  • Where do you get cert training?
  • MS Account Lockout Tools won't run from 2019 server ?
  • Hyper-V Virtual Machine Error applying Hard Drive Changes
TEST YOUR SMARTS
Which of the following retains the information it's storing when the system power is turned off?
  • ROM
  • CPU
  • RAM
  • GPU
Submit »
88% of IT pros got this right.
Challenge
×
  • prev
  • 1
  • 2
  • next

41 Replies

· · ·
Pure Capsaicin
OP
Best Answer
Gary D Williams
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:21 UTC
Windows Server expert
260 Best Answers
311 Helpful Votes

Best practice is to ALWAYS VPN in to your network and then RDP to server just like you are on the LAN.

33
· · ·
Pure Capsaicin
OP
Rod-IT Dec 26, 2016 at 21:21 UTC
Windows Server expert
217 Best Answers
376 Helpful Votes

A direct VPN to this network is going to be your best option, while others exist, they are not secure.

6
· · ·
Pure Capsaicin
OP
dbeato
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:22 UTC

To emphasize all the above :] VPN is the way to go!

4
· · ·
· · ·
Chipotle
OP
P.Pardus
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:27 UTC

Depends on what you need access to, for Remote Desktop, a VPN connection would be best, then you can log on to Remote Desktop.. Or use vnc connect...

0
· · ·
Anaheim
OP
nevillet Dec 26, 2016 at 21:37 UTC
Thank y'all for the quick response !!!
What is required for me to setup a VPN, do i need a static IP from my internet provider
  • Gary D Williams
    Pure Capsaicin
0
· · ·
Jalapeno
OP
gregna
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:41 UTC

Most routers, cisco, ubiquity, sonicwall, zyxel, have this built into them. Windows server also as this built in if you want to forward the ports required.

Yes, you need a static IP, or you can use dynDNS to make your dynamic IP static.

2
· · ·
Pure Capsaicin
OP
Gary D Williams
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 21:41 UTC
Windows Server expert
260 Best Answers
311 Helpful Votes

Ideally yes but if you don't have a static IP you can use dynamic DNS. You could set up something like soft ether or openvpn or see what VPN services your router offers.

Finally, have you considered hosting the server in the cloud? Azure and AWS will host a Windows 2012 R2 server quite happily.

3
· · ·
Anaheim
OP
nevillet Dec 26, 2016 at 22:13 UTC

the cloud option looks interestingI didn'tknow about it, to be honest, thanks

0
· · ·
Pure Capsaicin
OP
Gary D Williams
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 22:15 UTC
Windows Server expert
260 Best Answers
311 Helpful Votes

Have a look at this//azure.microsoft.com/en-gb/

I'll also tag Brittany who should be able to provide some more information 

  • Brittany for Microsoft
    Chipotle
2
· · ·
Thai Pepper
OP
Ricardo272
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 23:01 UTC

Going back to the original question;

Enable Remote Access on the PC you want to access with Remote Desktop.

Enable Remote Desktop in your firewall andd open the port that you want to use.

Set a fixed IP address on the computer you want to connect to or use Dyndns for a fixed link.

Configure your router to forward TCP port 3389 to the destination computers IP address [the computer you want to connect to]

test it using remote desktop with the IP:3389 or dyndnslink:3389

One last suggestion open that port in your firewall is a security treat; change the default port to a different one.

1
· · ·
Pure Capsaicin
OP
Gary D Williams
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 26, 2016 at 23:02 UTC
Windows Server expert
260 Best Answers
311 Helpful Votes

Ricardo272 wrote:

One last suggestion open that port in your firewall is a security treat; change the default port to a different one.

security by obscurity is still a threat.

8
· · ·
Pure Capsaicin
OP
Rod-IT Dec 26, 2016 at 23:09 UTC
Windows Server expert
217 Best Answers
376 Helpful Votes

Ricardo272 wrote:

Configure your router to forward TCP port 3389 to the destination computers IP address [the computer you want to connect to]

RDP isn't secure, I avoided suggesting this for obvious reasons
7
· · ·
Thai Pepper
OP
DaveA-DoIT
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 04:46 UTC

As others have said, use a VPN... Don't forward the RDP port through your router/firewall, even using a random external port.

What type of firewall do you have? Most of them come with VPN options built in and can take very little work to setup.

3
· · ·
Sonora
OP
thomasperrin Dec 27, 2016 at 09:23 UTC
1st Post

depends on the number of rdp, why not a RD Gateway?

it needs to forward 443 port on the firewall as it use a ssl tunnel and being installed on a 2012r2 server[is existing at least since 2008r2].

it might be easier to deploy, less expensive and security is suppose to be as good as a vpn.

4
· · ·
Anaheim
OP
nevillet Dec 27, 2016 at 15:37 UTC

I had to disconnect my physical firewall from the network in order to setup the VPN connection, then I did a port forward on my router firewall of 1723;

now that the VPNis working I will try to add the t30 WatchGuardfirewall to my network. I had to do this just to reduce my error margin since its the first time I am setting up something of this nature;

so far it's working but I don'thave accessto shared drives and printers when i connect to the VPN

  • DaveA-DoIT
    Thai Pepper
  • thomasperrin
    Sonora
0
· · ·
Thai Pepper
OP
TAHIN
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 15:53 UTC

There is absolutely no need to port forward RDP when you have something likeDirect Accessat your disposal. It is pretty slick on Server 2012 R2. Normally an enterprise goes the VPN route, but depending on your company and equipment maybe your situation is different. I'd just like to mention this other option.

DirectAccess vs VPN comparison:

//directaccess.richardhicks.com/2016/02/08/directaccess-vs-vpn/

Another://channel9.msdn.com/Shows/OEMTV/OEM1715

Requirements:

//technet.microsoft.com/en-us/library/dn464273[v=ws.11].aspx

Lab it up and try it out. This is how we connect to our lab domain on a different ISP.

2
· · ·
Serrano
OP
Reggie Hux Dec 27, 2016 at 17:41 UTC

Be careful with the VPN... If you connect to SSL VPN from a home PC on Windows, you have effectively introduced that PC into your corporate network. That can have a lot of unintended consequences. Maybe not today, but someday. Especially if you start handing out VPN access to others...

So if this is a production, working, business network, please be extremely thorough and careful...

5
· · ·
Thai Pepper
OP
DaveA-DoIT
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 17:44 UTC

nevillet wrote:

I had to disconnect my physical firewall from the network in order to setup the VPN connection, then I did a port forward on my router firewall of 1723;

now that the VPNis working I will try to add the t30 WatchGuardfirewall to my network. I had to do this just to reduce my error margin since its the first time I am setting up something of this nature;

so far it's working but I don'thave accessto shared drives and printers when i connect to the VPN

Why on earth don't you just use the built-in VPN capabilities of the Watchguard for VPN [SSL or IPSec]?!

For clarity sake, what, exactly is the Watchguard's role on your network? Is it your primary router and firewall or is there another device in the mix?

5
· · ·
Thai Pepper
OP
DaveA-DoIT
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 17:48 UTC

Reggie Hux wrote:

Be careful with the VPN... If you connect to SSL VPN from a home PC on Windows, you have effectively introduced that PC into your corporate network. That can have a lot of unintended consequences. Maybe not today, but someday. Especially if you start handing out VPN access to others...

So if this is a production, working, business network, please be extremely thorough and careful...

Reggie has a great point here.

For the love, do NOT use your personal computers to manage your work systems. Keep work and personal devices completely separate.

Yes lugging 2 or 3 [or 4] laptops around isn't ideal, but you don't want to be "THAT GUY" who brought down the company network/systems because your personal device allowed malware/etc onto the company network.

1
· · ·
Thai Pepper
OP
David Auth
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 17:49 UTC

security by obscurity is still a threat risk.

My inner pedant had to fix that for you.

Edit: though apparently strike-through doesn't render properly? Anyway, just imagine the word threat struck through there.
1
· · ·
Thai Pepper
OP
Jim Schuuz
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 18:14 UTC

Anytime you connect your network to an outside network you have a potential security problem. Adding layers to your connection protocol [such as initiating a VPN prior to establishing an RDP session] might be slightly more secure, but they introduce more variables intothe equation - such as additional security problems, support issues and increased complexity.

Personally, I allow RDP on the default port from whitelisted addresses only and have never had a breach. It's not infallible, but it's no less secure than establishinga VPN from an unmanaged device.

Incidentally, I ran a trace against my firewall logs a few minutes ago and haven't had a hit against port 3389 in over 2 days. Yes, there are still bots running that check consecutive ports on consecutive IPs in blocks, but the numbers clearly drop once your /26 range drops off of the "hot lists" circulating on the dark web.


0
· · ·
Thai Pepper
OP
Jim Schuuz
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 18:19 UTC

TAHIN wrote:

There is absolutely no need to port forward RDP when you have something likeDirect Accessat your disposal. It is pretty slick on Server 2012 R2. Normally an enterprise goes the VPN route, but depending on your company and equipment maybe your situation is different. I'd just like to mention this other option.

DirectAccess vs VPN comparison:

//directaccess.richardhicks.com/2016/02/08/directaccess-vs-vpn/

Another://channel9.msdn.com/Shows/OEMTV/OEM1715

Requirements:

//technet.microsoft.com/en-us/library/dn464273[v=ws.11].aspx

Lab it up and try it out. This is how we connect to our lab domain on a different ISP.

This only works with Enterprise or greater OS versions.
0
· · ·
Chipotle
OP
jjjandj
This person is a verified professional.
Verify your account to enable IT peers to see that you are a professional.
Dec 27, 2016 at 18:19 UTC

A few Different Ways to do this

1] Open up RDP on your Firewall via Port Forwarding. I would not recommend this as it is a securityrisk.

2] RD Gateway Server, Requires setup and SSL Certs, You still need to Port Forward Port 443.

3] VPN Connection, Could be VIA your Firewall Provider or a 3rd Party Tool likeLogMeIn Hamachi [I have used this before but has been a long time, I think it is free for up to 5 computers]

4] 3rd party tools, Something Like Teamviewer

5] Microsoft Direct Connect, this is basically a SSL VPN, I think you need enterprise version of Windows Client to use this

2
  • prev
  • 1
  • 2
  • next

This topic has been locked by an administrator and is no longer open for commenting.

To continue this discussion, please ask a new question.

Video liên quan

Chủ Đề