Opening Port 3389

firewall

    Next

  • 1. Help Setting Pix 506 up
    I have a dlink 300g dsl modem. My main isp address is 82.69.2.x sub 255.255.255.0 I link from the modem into interface0 (outside) on pix. Am I right in thinking that I need to set the outside interface ip to the same ip as my isp? The inside interface is set to 192.169.0.254 255.255.255.0 This should be my gateway on my clients? I have done :- global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 0 0 I cant get dsl throught the pix though. Please help Thanks
  • 2. Firewall for a PC cluster
    My company just installed a 16-node PC cluster (Extremenode HPB20S) for video streaming applications. The cluster generates approximately 25 - 35Mbps of UDP traffic to the Internet (5000+ sessions). Can anyone recommend a firewall solution that will support the traffic requirements? My budget is limited to $1500 for the firewall (no VPN needed). Thanks in advance!Eric
  • 3. Help with SHOREWALL
    My new installation of shorewall on a test machine is blocking everything (as far as I can tell). To test it, I made the following changes; - remarked out all rules in RULES file - put only one entry in the POLICY file - "all all ACCEPT info" - remarked out all actions in /usr/share/shorewall/actions.std I assume the above changes would make the system wide open, but it still doesn't work - I can't ping anything. My log (/var/log/messages) says; ...Shorewall:all2all:REJECT:IN= OUT=eth1 SRC=10.0.0.1 DST=10.0.0.99... where 10.0.0.1 is the firewall machine and 10.0.0.99 is another host. Eth1 is working (can ping other hosts ok when shorewall is stopped). Have I misunderstood how shorewall works? I went through the quickstart guide, documentation, FAQs, etc. and couldn't find the answer. Thanks in advance.
  • 4. DLink DI-604
    Is there a way to block outgoing traffic? For example, with windows xp sp2 firewall, whenever a program such as Pocket PC Activsync or TIVO server attempt to send outgoing traffic, a dialog pops up and asks whether or not to allow it. I'm also thinking about software (such as AutoCAD) which attempts to automatically connect to the internet. I understand that I can turn the feature off in the software itself, but I don't want of that type of outgoing traffic to be allowed. I'm having problems running XP's firewall with my DLink router and want to turn Windows Firewall off and rely on my "hardware" firewall. However, it appears that there is a default rule that is set up to allow all LAN sourced traffic pass. I created a rule that was essentially the opposite (deny rather than allow) but then I can't do anything (browse the internet, VPN into work, etc). My firewall rules are set as shown below Firewall Rules List Action Name Source Destination Protocol Allow (stealth113) WAN,* LAN,192.168.0.251 TCP,113 Allow WinMXTCP WAN,* LAN,local computer TCP,8888 Allow WinMXUDP WAN,* LAN,local computer UDP,9999 Deny Default *,* LAN,* *,* Allow Default LAN,* *,* *,* Any ideas?

Opening Port 3389

Postby Keith » Sun, 08 Feb 2004 05:12:56 GMT

The firewall at my work is a Cisco PIX 515E with DMZ.

On the DMZ I am going to sit a 2k server with IIS as a web server.  Inside
my LAN I have my normal 2k domain servers and also a 2k server acting as
Terminal Services server.

If I open port 3389 on the PIX in theory my users should be able to fully
use Terminal Services inside my LAN from the Internet.

Does anyone see any security risks with opening port 3389 and only 3389 on
the PIX?

Thanks

Keith



Re: Opening Port 3389

Postby Craig Peterson » Sun, 08 Feb 2004 06:18:30 GMT

Be careful how you open it.

You may want to have another network card on your 2k server configured 
to allow routing to your internal network.  You could then run that 
network connection through a firewall making sure that only authorized 
users were connecting to the correct services bi-directionally.

If you are unable to put another NIC and firewall in place, and you have 
to expose that service on that machine, you should make sure that the 
service is only available to people on your internal network.  You may 
even want to enforce rules only allowing certain machines to connect.

Remember the submarine approach.  If one compartment is compromised, you 
don't want to bring the whole sub down.  Make sure you have multiple 
levels of security,

Craig.




-- 
Visit gap.mainstream.net for a FREE SECURITY GAP ANALYSIS.


Re: Opening Port 3389

Postby Craig Peterson » Sun, 08 Feb 2004 06:18:54 GMT

Be careful how you open it.

You may want to have another network card on your 2k server configured 
to allow routing to your internal network.  You could then run that 
network connection through a firewall making sure that only authorized 
users were connecting to the correct services bi-directionally.

If you are unable to put another NIC and firewall in place, and you have 
to expose that service on that machine, you should make sure that the 
service is only available to people on your internal network.  You may 
even want to enforce rules only allowing certain machines to connect.

Remember the submarine approach.  If one compartment is compromised, you 
don't want to bring the whole sub down.  Make sure you have multiple 
levels of security,

Craig.




-- 
Visit gap.mainstream.net for a FREE SECURITY GAP ANALYSIS.


Re: Opening Port 3389

Postby Keith » Sun, 08 Feb 2004 06:38:16 GMT

I can put a second NIC in the server very quickly but another firewall would
be a hard stretch - my company is unlikely to spend more money after the
amount I just spent overhauling the infrastructure.

Would a software firewall be suitable?  And if so, where would be the best
point to install it and what rules should I use?

The site this TS server is on has two servers on it - the 2k DC
(192.168.0.1) and a 2k TS Server that is also a backup DC (192.168.0.2).

Just to throw something else is.  Is it possible to tell the PIX to allow
port 3389 traffic onto the LAN but only to 192.168.0.2 (the TS Server)?  I
assume it is but would this help security?  The only thing on the LAN
currently allowed to talk to the Internet through the PIX is the DC
(192.168.0.1).  This would (as far as I can see) allow the DC to continue as
is and also allow the 3389 traffic onto the LAN but only to the TS server
(192.168.0.2).  But I am not an expert by any means and would like some help
and suggestions please.

Thanks






Inside
fully
on



Re: Opening Port 3389

Postby Lars M. Hansen » Sun, 08 Feb 2004 07:19:48 GMT

On Fri, 6 Feb 2004 20:12:56 -0000, "Keith" <@.> spoketh


Way too much irrelevant information. Since your DMZ servers and LAN
domain servers doesn't play into this, leave it out. If all you want is
terminal server access for your crew on the outside of the firewall, use
VPN. Then only authorized users will have access to your terminal
server...



Lars M. Hansen
www.hansenonline.net
Remove "bad" from my e-mail address to contact me.

Re: Opening Port 3389

Postby Keith » Sun, 08 Feb 2004 07:34:31 GMT

We have VPN already but staff are mostly too incompetent to use it.

A much simpler solution is if they can access Terminal Services over the
internet.  They get a full-screen desktop and it all looks just like it does
when they are in the office - much neater for those who are useless.

TS over the net is a must for my users - I don't see another way around it.





Inside
on



Re: Opening Port 3389

Postby Wolfgang Kueter » Sun, 08 Feb 2004 08:35:46 GMT




Force them to learn.
 

And a much more insecure solution. If you can risk offering RDP Service
without any other security mechanism than passwords to everybody, well live
with the risk and hope that you have no clients/customers who just a little
are more concerned about security than you, they might do business with
someone alse in the future. 


Educated users.

Wolfgang
-- 
A foreign body and a foreign mind
never welcome in the land of the blind.
from 'Not one of us', (c) 1980 Peter Gabriel

Re: Opening Port 3389

Postby Lars M. Hansen » Sun, 08 Feb 2004 08:52:27 GMT

On Fri, 6 Feb 2004 22:34:31 -0000, "Keith" <@.> spoketh


There's only two ways of doing it: 

1) The secure way: VPN, or
2) The insecure way: port forwarding. 

You might be able to restrict the access somewhat if you know the IP
addresses of those useless people who need to access the TS. However,
since they'll most likely have dynamic IP address, I foresee a
management nightmare. 

Last time I dealt with VPN client software, I simply had to start up the
VPN client software and type in my username and password. Sounds like
something even an MBA should be able to do...


Lars M. Hansen
www.hansenonline.net
Remove "bad" from my e-mail address to contact me.

Re: Opening Port 3389

Postby Keith » Sun, 08 Feb 2004 09:04:58 GMT

I have two problems with using VPN Client software:

1 - most of my users are complete novices who struggle when in the office -
educating them to use something more complicated than a web browser is
difficult.

2 - some of them will access from machines where it would be near impossible
to install VPN Client software - I cannot access the terminals myself and
the users would not be competent enough to do so






does
it.



Re: Opening Port 3389

Postby Wolfgang Kueter » Sun, 08 Feb 2004 20:13:02 GMT




Adminstrative problems must not gain rule over security. 
 

Uneducated users are a severe security risk. Educate them.

Wolfgang
-- 
A foreign body and a foreign mind
never welcome in the land of the blind.
from 'Not one of us', (c) 1980 Peter Gabriel

Re: Opening Port 3389

Postby Jim Nugent » Tue, 10 Feb 2004 11:30:45 GMT







Remember that you can go into Active directory users and computers and
disable TS for all but the accounts that need it. That helps some. Also
depending just how dumb these people are you could set up very strong
passwords that they can't change.

I tried this once at a client site so my boss could get access but he forgot
the strong password and got locked out. Extremely Dilbert.
-- 
Jim (for E-mail replace invalid with net)
"Remember, an amateur built the Ark; professionals built the Titanic."




Re: Opening Port 3389

Postby Lars M. Hansen » Tue, 10 Feb 2004 21:12:04 GMT

On Mon, 09 Feb 2004 02:30:45 GMT, Jim Nugent spoketh


If the users are too retarded to learn how to use a VPN client (and
install it with written proven instructions), then there is no chance
that they'll be able to have passwords stronger than "auntjemima" or
"beer".

Lars M. Hansen
www.hansenonline.net
Remove "bad" from my e-mail address to contact me.

Re: Opening Port 3389

Postby Keith » Tue, 10 Feb 2004 21:37:01 GMT

Well I made a management decision -{*filter*}'em!

They can have VPN and if they don't like it or can't figure it out, then
that's their problem.

I'm not prepared to open up the slight risk that exists if I put the TS on
the public internet.

One thing that still concerns me even with VPN is that unless I change the
passwords for VPN every time a user leaves the company then I will have
people out there with a back door into my LAN - they won't have access on
the LAN but will have a back door.  I need to think about this now because
there has to be a way to avoid having to do this if someone leaves.  Short
of going to their home and uninstalling the client I'm not sure what that is
yet though.










Re: Opening Port 3389

Postby David Barnes » Mon, 16 Feb 2004 13:25:15 GMT

> One thing that still concerns me even with VPN is that unless I change the
is

?? Huh
setup a seperate VPN login for each user, or use RADIUS. even NT4 included
this...Your VPN server/firewall should be able to use RADIUS auth and will
only allow users in that have 'dialin' set.. The bonus is the dorks out
there only have to remember one password.

Better still use some of the vpn software that's automatic, like CISCO VPN
client or Netscreen client.
Once installed the user won't need to know it's there, that just fire up TS
client, and hit connect. The act of trying to send IP packets to the
internal TS server fires up the VPN. You may need to up the TS client
connect timeout though....


Another point is do these users have firewall, virus and system lockdown
equivelant or better that the company systems, because as soon as they fire
up the VPN they will provide a nice 'gateway' into your network for a hacker
and virus to spread..


Remember a network is only as good as it's weakest link.!!!!


David




Return to firewall

 

Who is online

Users browsing this forum: No registered users and 71 guest