SSH or RDP Network Firewall Print

  • 1

At VYKIX, we want to prioritize the security of your network. Securing Remote Desktop (RDP) and SSH ports is essential to protect your server against threats. Follow this comprehensive guide to enhance the security of your server.

Step 1: Configure Remote Desktop (RDP) Access

  1. RDP Port: By default, Remote Desktop Protocol (RDP) uses TCP port 3389. Ensure that your RDP is configured to use this standard port.
  2. Firewall Rules: Create a firewall rule to allow traffic on port 3389 and add a TCP Service (symmetric) filter as shown below. In addition, you can restrict access to trusted IP addresses (Source IP) and employ strong password policies.
  3. Network-Level Authentication: Enable Network-Level Authentication (NLA) for RDP. NLA enhances security by requiring users to authenticate before connecting.

Step 2: Secure SSH Access

  1. SSH Port: Secure Shell (SSH) typically uses TCP port 22. Confirm that your SSH server is configured to use this port.
  2. Firewall Rules: Establish firewall rules to permit traffic on port 22 and add a TCP Service (symmetric) filter as shown below. In addition, you can restrict access to trusted IP addresses (Source IP) and employ strong password policies.
  3. Key Authentication: Consider using SSH key-based authentication, which is more secure than password-based authentication. Generate SSH keys, upload your public key to the server, and protect your private key.

Step 3: Regular Updates

  1. Operating System Updates: Ensure that your server's operating system is current. Apply security patches and updates regularly to address vulnerabilities.
  2. Software Updates: Update RDP and SSH software (e.g., OpenSSH for SSH). Newer versions often contain security improvements.

Step 4: Monitoring and Intrusion Detection

  1. Logging: Enable detailed logging for RDP and SSH. Review logs regularly to detect and respond to any unusual activity.
  2. Intrusion Detection: Implement intrusion detection systems to monitor for any suspicious access attempts and automatically block potential threats.

Step 5: Strong Authentication

  1. RDP: Use strong, complex passwords for RDP authentication. Implement policies that enforce password complexity and regular password changes.
  2. SSH: Implement key-based authentication for SSH access. This method is more secure than password authentication.

By following these steps, you can significantly enhance the security of your Remote Desktop (RDP) and SSH ports.

This guide now focuses exclusively on securing Remote Desktop and SSH ports (TCP 3389 and 22), providing users with a clear and detailed path to enhance the security of these critical services.


Was this answer helpful?

« Back