ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Disabling External Ping, VPN drops.

    IT Discussion
    7
    33
    6.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Seth CooperS
      Seth Cooper
      last edited by

      Guys,

      I am trying to sure up my networks by disabling external pinging on my routers. With the end goal of security, and stopping the constant stream of login attempts against my routers. It worked, but then issues started happening..

      Since I have put these changes in place we have had periods of 2-3 minutes where the VPN drops out very randomly. Reading more onto the issue I see that it's a problem with PathMTU not being negotiated and the IKE VPN dropping. Most of this information appears to be 4-5 years old, suggesting to lower the MTU to 1400 to resolve.

      Am I wasting my time, what is best practice to stop the login attempts against my routers? Considering disabling remote management altogether.

      1 Reply Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller
        last edited by

        Login attempts are inevitable. Pings aren't needed to find that opening. If there is a way to log in, attempted will be made.

        If you have RDP exposed you are a much bigger target but no matter what you expose this will happen. Attempts are just attempts.

        Something's like LogMeIn will help by stopping there being open ports. But then people just attack the LMI site.

        JaredBuschJ 1 Reply Last reply Reply Quote 0
        • JaredBuschJ
          JaredBusch @scottalanmiller
          last edited by

          @scottalanmiller said:

          Login attempts are inevitable. Pings aren't needed to find that opening. If there is a way to log in, attempted will be made.

          If you have RDP exposed you are a much bigger target but no matter what you expose this will happen. Attempts are just attempts.

          Something's like LogMeIn will help by stopping there being open ports. But then people just attack the LMI site.

          This is why the Controller at one client just got Pertino installed on her laptop and desktop. Suddenly RDP is secure as ever again 😛

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • NaraN
            Nara
            last edited by

            If your VPN requires ping, open up ping between the two sites. Be careful changing the MTU. Nearly every single Ethernet-connected device runs an MTU of 1500, and does so right out of the box.

            Remote management shouldn't be external-facing, and if it is necessary, restrict the IP ranges that can connect to it.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @JaredBusch
              last edited by

              @JaredBusch said:

              @scottalanmiller said:

              Login attempts are inevitable. Pings aren't needed to find that opening. If there is a way to log in, attempted will be made.

              If you have RDP exposed you are a much bigger target but no matter what you expose this will happen. Attempts are just attempts.

              Something's like LogMeIn will help by stopping there being open ports. But then people just attack the LMI site.

              This is why the Controller at one client just got Pertino installed on her laptop and desktop. Suddenly RDP is secure as ever again 😛

              We do that too. Pertino and LogMeIn everywhere. No open ports exposed for remote access.

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @scottalanmiller
                last edited by

                @scottalanmiller said:

                @JaredBusch said:

                @scottalanmiller said:

                Login attempts are inevitable. Pings aren't needed to find that opening. If there is a way to log in, attempted will be made.

                If you have RDP exposed you are a much bigger target but no matter what you expose this will happen. Attempts are just attempts.

                Something's like LogMeIn will help by stopping there being open ports. But then people just attack the LMI site.

                This is why the Controller at one client just got Pertino installed on her laptop and desktop. Suddenly RDP is secure as ever again 😛

                We do that too. Pertino and LogMeIn everywhere. No open ports exposed for remote access.

                I wish I could do this for a few clients, but printing from an AS 400 locally won't work over that setup.

                PSX_DefectorP 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller
                  last edited by

                  Hopefully you mean IBM System "i". AS/400 was killed off in the 1990s.

                  System "i" doesn't have a Pertino agent nor a LogMeIn agent. Being one of those rare systems today that is not UNIX nor Windows, it is really left out there on its own requiring its own special support for absolutely everything.

                  What application is running on "i"?

                  PSX_DefectorP JaredBuschJ 2 Replies Last reply Reply Quote 0
                  • Seth CooperS
                    Seth Cooper
                    last edited by

                    Hey guys, thanks for the great info! My RDP is locked down and we use remote software instead.

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender
                      last edited by

                      Yeah yeah... it's a, nope It's an AS400! The unit is from 1998 I think, but it could be older.

                      They run backups on it (though I know next to nothing about them so I have no clue how to test or if they are testing those backups themselves). I've suggested that they look into purchasing a newer unit since their whole billing system runs on it. While the person I work with there agreed, management continues to say no. So my contact reached out to their vendor who has supported the system in the past and they still have some old units their backups could be restored on in case theirs fails, so they have a plan. At least there is that.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • PSX_DefectorP
                        PSX_Defector @scottalanmiller
                        last edited by

                        @scottalanmiller said:

                        Hopefully you mean IBM System "i". AS/400 was killed off in the 1990s.

                        We still call it an AS/400. That's what happens when you ingrain a name.

                        System i, AS/400, it's all good when you call Rochester.

                        1 Reply Last reply Reply Quote 0
                        • PSX_DefectorP
                          PSX_Defector @Dashrender
                          last edited by

                          @Dashrender said:

                          I wish I could do this for a few clients, but printing from an AS 400 locally won't work over that setup.

                          Wait, what?

                          Create spoolers to the local printer, point applications to the spoolers. Then it's just a matter of busting into the network, which can be accomplished via an stunnel.

                          DashrenderD 1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @scottalanmiller
                            last edited by

                            @scottalanmiller said:

                            Hopefully you mean IBM System "i". AS/400 was killed off in the 1990s.

                            System "i" doesn't have a Pertino agent nor a LogMeIn agent. Being one of those rare systems today that is not UNIX nor Windows, it is really left out there on its own requiring its own special support for absolutely everything.

                            What application is running on "i"?

                            We just replaced a System/36 accounting system at a client. It was still running thinnet to dumb terminals. Said dumb terminals are still in place so verification can be made with the imported data. But, they are using our new accounting package now at least.

                            Of note, we sold them the System/36 based accounting package back in the 80's.
                            image.gif

                            1 Reply Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller
                              last edited by

                              Ha ha. System/36

                              Wow.

                              DashrenderD 1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                Ha ha. System/36

                                Wow.

                                yep.. woww'ers...

                                1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @PSX_Defector
                                  last edited by

                                  @PSX_Defector said:

                                  @Dashrender said:

                                  I wish I could do this for a few clients, but printing from an AS 400 locally won't work over that setup.

                                  Wait, what?

                                  Create spoolers to the local printer, point applications to the spoolers. Then it's just a matter of busting into the network, which can be accomplished via an stunnel.

                                  What's a stunnel? If I have a home printer on my home network (let's assume it's an IP printer) how do I give access to my office based AS400 over the Pertino network?

                                  To make this work today, I use VPN to connect to the office network, Client Access allows me to 'create an AS400 printer' from one of my local printer so it looks like an AS400 queue. I then send my print jobs to that queue, which forwards through my VPN connection to my PC and onto my printer.

                                  PSX_DefectorP 1 Reply Last reply Reply Quote 0
                                  • PSX_DefectorP
                                    PSX_Defector @Dashrender
                                    last edited by

                                    That would be remote printers, printing locally has a completely different connotation. 🙂

                                    I never let people create spoolers from the client. Usually because people are duplicating things over and over and over again with their printers and it gets to be a big mess. Cleaning up queues is my least favorite operator duty.

                                    If you absolutely must setup something like that, better to use a PDF writer. Cleaner, less driver kludges, and you can spin up the spoolers to make it into one single queue instead of the goons spinning up 5 or more printers because they have tons of them at home.

                                    Haven't checked yet, but you should be able to encapsulate the traffic over Pertino for that. Then it's just a matter of having something that will play man in the middle. Of course, popping open a telnet proxy would be easier still.

                                    DashrenderD 1 Reply Last reply Reply Quote 1
                                    • scottalanmillerS
                                      scottalanmiller
                                      last edited by

                                      stunnel is a form of VPN: https://www.stunnel.org/index.html

                                      1 Reply Last reply Reply Quote 0
                                      • DashrenderD
                                        Dashrender @PSX_Defector
                                        last edited by

                                        @PSX_Defector said:

                                        That would be remote printers, printing locally has a completely different connotation. 🙂

                                        I never let people create spoolers from the client. Usually because people are duplicating things over and over and over again with their printers and it gets to be a big mess. Cleaning up queues is my least favorite operator duty.

                                        If you absolutely must setup something like that, better to use a PDF writer. Cleaner, less driver kludges, and you can spin up the spoolers to make it into one single queue instead of the goons spinning up 5 or more printers because they have tons of them at home.

                                        Haven't checked yet, but you should be able to encapsulate the traffic over Pertino for that. Then it's just a matter of having something that will play man in the middle. Of course, popping open a telnet proxy would be easier still.

                                        A telnet proxy? since the home user's IP can change, kinda hard to lock it down, unless there is something I'm missing.

                                        This is a tiny company 8 employees, and not a technical pone in the company so they can't create anything that a consultant doesn't for them.. no worries about them creating a bunch of printers. I moved them off the home dial into the 400 about 10 years ago to a VPN connection. it was/is a lot faster.

                                        How would you encapsulate the traffic from the 400 to the home user's computer?

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @Dashrender
                                          last edited by

                                          @Dashrender said:

                                          How would you encapsulate the traffic from the 400 to the home user's computer?

                                          VPNs encapsulate everything on the network.

                                          DashrenderD 1 Reply Last reply Reply Quote 0
                                          • DashrenderD
                                            Dashrender @scottalanmiller
                                            last edited by

                                            @scottalanmiller said:

                                            @Dashrender said:

                                            How would you encapsulate the traffic from the 400 to the home user's computer?

                                            VPNs encapsulate everything on the network.

                                            Yeah.. I know that! other than using an onsite device, say a ASA/sonicwall, etc to terminate the tunnel - how are you getting the traffic into the tunnel in the first place?

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post