<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic limit access to remote desktop to a range of outside IP's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114796#M393224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks ! Very kind of you. Looks to be working(at least I can still get in); I’ll try from another location tomorrow and hope it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Is this the best method to stop these attacks ? I thought of changing the port, but a port scan just takes minutes and then they’d be back at it. I do like to get in from other locations and now of course I cant. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Two other questions come to mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can you tell me how to delete the ssh user name of “pix” ? It seems silly to leave that there even with a complex password behind it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; And while I’m taking advantage of your kindness ; I assume if I wanted to create what looks like an open port or two that goes nowhere (I’m annoyed at these people)&amp;nbsp; I need a static (pointing to no real inside machine) and a corresponding access-list entry&amp;nbsp; ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Jan 2013 01:16:05 GMT</pubDate>
    <dc:creator>byterbites</dc:creator>
    <dc:date>2013-01-09T01:16:05Z</dc:date>
    <item>
      <title>limit access to remote desktop to a range of outside IP's</title>
      <link>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114794#M393219</link>
      <description>&lt;P&gt;After getting hacked I want to limit terminal server/ remote desktop to only my computer. (although I may need to let other net in later) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words I want only computers from my home ip range (lets say my ISP gives me at&amp;nbsp; home something in&amp;nbsp; 28.28.XX.0)&amp;nbsp; to be let in to the router at work and then to port 3389.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the work ASA 5505 softwareVersion&amp;nbsp; 7.2(4)&amp;nbsp;&amp;nbsp;&amp;nbsp; I now have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp interface 3389 192.168.1.2 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acces-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me with&amp;nbsp; the syntax ?&amp;nbsp; (I've spent hours&amp;nbsp; reading on line help and cant get it clear) &lt;/P&gt;&lt;P&gt;Many thanks !&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114794#M393219</guid>
      <dc:creator>byterbites</dc:creator>
      <dc:date>2019-03-12T00:44:42Z</dc:date>
    </item>
    <item>
      <title>limit access to remote desktop to a range of outside IP's</title>
      <link>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114795#M393220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to allow RDP (TCP/3389) connections only from certain source IP addresses (your home address) then you just configure another ACL rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp host 28.28.28.28 interface outside eq 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp 28.28.28.0 255.255.255.0 interface outside eq 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format really depends on if you have a static public IP address at home or always address from some pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was there anything else you needed to configure/change on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull and/or ask more questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 00:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114795#M393220</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T00:23:28Z</dc:date>
    </item>
    <item>
      <title>limit access to remote desktop to a range of outside IP's</title>
      <link>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114796#M393224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks ! Very kind of you. Looks to be working(at least I can still get in); I’ll try from another location tomorrow and hope it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Is this the best method to stop these attacks ? I thought of changing the port, but a port scan just takes minutes and then they’d be back at it. I do like to get in from other locations and now of course I cant. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Two other questions come to mind:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can you tell me how to delete the ssh user name of “pix” ? It seems silly to leave that there even with a complex password behind it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; And while I’m taking advantage of your kindness ; I assume if I wanted to create what looks like an open port or two that goes nowhere (I’m annoyed at these people)&amp;nbsp; I need a static (pointing to no real inside machine) and a corresponding access-list entry&amp;nbsp; ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 01:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114796#M393224</guid>
      <dc:creator>byterbites</dc:creator>
      <dc:date>2013-01-09T01:16:05Z</dc:date>
    </item>
    <item>
      <title>Re: limit access to remote desktop to a range of outside IP's</title>
      <link>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114797#M393228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The usual approach to securing the terminal computer is ofcourse a mix of configuring the ACL rules as tight and specific as possible. Also it naturally requires the the actual terminal computer is secured with latest updates and local firewall/etc software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One option would be that you dont allow any connections directly from the Internet BUT configure a VPN Client connection to your firewall. This way you will first need to initiate a secure VPN Client connection to the firewall and only then you will be able to connect to the terminal computer behind the firewall. This way you would need to allow any connections from the Internet through the firewall. Atleast for the RDP connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess with the PIX username you mean the default username of the PIX/ASA firewalls?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One option would be to configure local usernames/passwords and then enable the PIX to use the local AAA information for login. (Meaning the username/passwords you just created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if the configuration format has changed at all but to my knowledge it would be the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username admin password &lt;PASSWORD&gt; privilege 15&lt;/PASSWORD&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;aaa authentication ssh console LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the SSH needs to be allowed from the correct source networks (using random example network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 28.28.28.0 255.255.255.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh version 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh timeout 30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or something similiar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These should make it so that when you next connect to the PIX with SSH, then the only login information accepted would be the username/password you just configured. Both the username and passwords can be anything you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If something would go wrong (misstyped passwords while configuring that you cant then get right), be sure to keep the original SSH management connection open to delete the AAA configurations if you cant get in anymore with new SSH connections while testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the ports. I dont think there is any point in configuring anything like that. Rather keep the rules for the "outside" interface and tight as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't mind answering questions. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Please do rate any helpfull information. Though now got to go sleep. over 3AM here &lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/plain.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 01:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/limit-access-to-remote-desktop-to-a-range-of-outside-ip-s/m-p/2114797#M393228</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T01:32:45Z</dc:date>
    </item>
  </channel>
</rss>

