Remote access to network. Methods?

Soldato
Joined
5 Jul 2003
Posts
16,206
Location
Atlanta, USA
Hi.
I have up until tonight, been using logmein free to get to my work desktop, then RDP into whichever computer/server i need to access.
Hamachi pro appears to let me just go strait to RDP. But it costs.

What other methods of achieving this are there?
 
As above really.

If you've got a cisco VPN capable firewall (do they make any that don't include vpn these days?)

Or if you have Citrix at work you could use that.

If you were feeling really fruity you could just create a new rule in your firewall to route external rdp traffic to your work desktop.
*Disclaimer - This is not a good idea and shouldn't be done
 
As above really.

If you've got a cisco VPN capable firewall (do they make any that don't include vpn these days?)

Or if you have Citrix at work you could use that.

If you were feeling really fruity you could just create a new rule in your firewall to route external rdp traffic to your work desktop.
*Disclaimer - This is not a good idea and shouldn't be done

Actually I have the Cisco VPN client on my laptop but I've added a firewall rule for my home range to my desktop on RDP only, not brilliant policy but it's our ADSL so it's completely on net and the IP address can't be spoofed. It's just easier...
 
Actually I have the Cisco VPN client on my laptop but I've added a firewall rule for my home range to my desktop on RDP only, not brilliant policy but it's our ADSL so it's completely on net and the IP address can't be spoofed. It's just easier...

If it's on your own vlan it's probably not an issue. If you're doing it from a normal home connection then I'd be concerned with security.

When I started my current role I audited the Cisco ASA and found that all external RDP traffic was being forwarded to the PDC. :eek: It was just pure dumb luck that someone hadn't worked out a login and brought the company to it's knees.

The company that set it up was coming in each month to do a system health check. I looked through the system logs and found that 2 of the servers had been operating with faulty RAM modules for over 6 months and they hadn't picked that up either. Needless to say they weren't kept around.
 
If it's on your own vlan it's probably not an issue. If you're doing it from a normal home connection then I'd be concerned with security.

When I started my current role I audited the Cisco ASA and found that all external RDP traffic was being forwarded to the PDC. :eek: It was just pure dumb luck that someone hadn't worked out a login and brought the company to it's knees.

The company that set it up was coming in each month to do a system health check. I looked through the system logs and found that 2 of the servers had been operating with faulty RAM modules for over 6 months and they hadn't picked that up either. Needless to say they weren't kept around.

We're an ISP, it's our own xDSL platform, so it's almost 100% secure. There's a slight chance of leakage in the BT network, but no chance of spoofing and even if the traffic was intercepted RDP is fairly well encrypted anyway. Allowing traffic through on the RDP port from IP addresses you know can't be spoofed is fairly secure to be honest.
 
At home:
Linux firewall with IPSEC or PPTP roadwarrior clients.

At work SSH and then SSH tunnel rdp which is the most elegant, or Cisco VPN *ugh* if I have to :) Work uses double password SSID keys. Which rock, bit expensive for home tho :)
 
Back
Top Bottom