08-17-2018 10:23 AM - edited 03-03-2019 08:52 AM
Hi Team,
If you are using nat for RDP how it will be safe in cisco devices ?
Anyone whose know the ip can able to access the devices.
Please anyone explain to me.
08-18-2018 08:19 AM
Hi
I am not sure if this is a nat issue. This is about securing RDP.
Anyone who knows the IP can reach the host but still needs to login.
Use strong passwords. Don’t allow defaul admin account access, create user to allow RDP.
Change the RDP port from default 3389 to something else.
Best practice is to have a Remote Desktop Gateway.
On Cisco, you can you use access-list to limit access from specific IP addresses or range.
HTH
08-19-2018 12:35 PM - edited 08-19-2018 12:36 PM
Hello
FYI - Nat isn't a security feature, even it may seem to be so as it hides the original source address but in reality its only a feature introduced to negate the exhaustion of ipv4 addressing.
It can as you may know allow a range of private non routable address to be mapped either a single or multiple routable addresses so the idea it would and has slowed down the depletion and conserved the ipv4 public address space.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide