ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Access Restrictions for VPN Access to LANs

    IT Discussion
    7
    11
    262
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JaredBuschJ
      JaredBusch
      last edited by

      A VPN that is restricted to RDP is a simple and effective solution.

      Nothing that we know of can "worm" through RDP.

      J 1 Reply Last reply Reply Quote 2
      • jt1001001J
        jt1001001
        last edited by

        Second @JaredBusch idea; this is what I am working on right now for a few employees who do not have company provided laptops.

        1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender
          last edited by

          What about something like MeshCentral/ConnectWise/LogMeIn instead. This removes their device from your network entirely.

          J JaredBuschJ 2 Replies Last reply Reply Quote 2
          • J
            JasGot @Dashrender
            last edited by

            @Dashrender said in Access Restrictions for VPN Access to LANs:

            What about something like MeshCentral/ConnectWise/LogMeIn instead. This removes their device from your network entirely.

            Would it be best to disable drag and drop to those users?

            1 Reply Last reply Reply Quote 0
            • J
              JasGot @JaredBusch
              last edited by

              @JaredBusch said in Access Restrictions for VPN Access to LANs:

              Nothing that we know of can "worm" through RDP.

              This is really good to know!

              1 Reply Last reply Reply Quote 0
              • JaredBuschJ
                JaredBusch @Dashrender
                last edited by

                @Dashrender said in Access Restrictions for VPN Access to LANs:

                What about something like MeshCentral/ConnectWise/LogMeIn instead. This removes their device from your network entirely.

                Over complicated when he already has VPN capabilities.

                Also none of those solutions are good for remote work. They are great for remote support, but for a "normal workday", hell no.

                1 Reply Last reply Reply Quote 2
                • dafyreD
                  dafyre
                  last edited by

                  This would probably be too much work to set up in a hurry, but ZT on End Users's personal device, and End Users's Company Machine.

                  But as @JaredBusch said, if you already have a VPN infrastructure, it'd be easiest to use that.

                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @dafyre
                    last edited by

                    @dafyre said in Access Restrictions for VPN Access to LANs:

                    This would probably be too much work to set up in a hurry, but ZT on End Users's personal device, and End Users's Company Machine.

                    But as @JaredBusch said, if you already have a VPN infrastructure, it'd be easiest to use that.

                    ZT is a good solution but I would need to look at ways to restrict it to port 3389 afterward.

                    black3dynamiteB 1 Reply Last reply Reply Quote 1
                    • black3dynamiteB
                      black3dynamite @JaredBusch
                      last edited by black3dynamite

                      @JaredBusch said in Access Restrictions for VPN Access to LANs:

                      @dafyre said in Access Restrictions for VPN Access to LANs:

                      This would probably be too much work to set up in a hurry, but ZT on End Users's personal device, and End Users's Company Machine.

                      But as @JaredBusch said, if you already have a VPN infrastructure, it'd be easiest to use that.

                      ZT is a good solution but I would need to look at ways to restrict it to port 3389 afterward.

                      Are you familiar with ZeroTier Flow Rules? I wonder if that's a way to restrict to port 3389?

                      1 Reply Last reply Reply Quote 1
                      • 1
                        1337
                        last edited by 1337

                        If you can limit a client to just one IP and just tcp 3389 in your firewall that should be enough.

                        Disable shared drives or the user is able to infect the work pc with files from his home pc.

                        Typically when we connect with VPN to enterprise networks to do work on certain servers or what not, we get a static ip and then they have firewall rules to determine what IPs / ports we can reach. So yes, the computer we use is on their LAN but only through a very small and restricted opening that just allows RDP to just the one server we need to access. Everything else is blocked.

                        1 Reply Last reply Reply Quote 2
                        • 1 / 1
                        • First post
                          Last post