Announcement

Collapse
No announcement yet.

3389 access rule

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • 3389 access rule

    The guy before me has this rule on the outside in interface
    access-list outside_access_in extended permit tcp any any eq 3389 log debugging

    I have no need to rdc to any of my servers from the outside without going through our VPN solution. Is there any other reason to have this rule, or can I unapply it and make my parent company happy so that RDC does not show up as available on our external servers during a PCI audit scan.

  • #2
    Re: 3389 access rule

    If you don't need RDP from the outside then remove it. Have a look for some static statements as well that reference either 3389 or are IP to IP as these servers would be the ones that were available to be connected to.
    cheers
    Andy

    Please read this before you post:


    Quis custodiet ipsos custodes?

    Comment


    • #3
      Re: 3389 access rule

      looks like lots of crazy rules applied to some of these interfaces
      working on a change control to get rid of that ASAP
      then fix some big holes on the DMZ since it allows everything from the DMZ access to anything internally. That will take some planning though.

      Thanks for the help.

      Comment


      • #4
        Re: 3389 access rule

        I would be tempted to backup the config and start writing a new one from fresh if that is the case!

        Can always test at the weekends if required for applications etc. Good luck !
        cheers
        Andy

        Please read this before you post:


        Quis custodiet ipsos custodes?

        Comment

        Working...
        X