This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

How to configure SSL VPN for RDP to multiple internal workstations with different listening ports

I need help/advice on best practices for multiple remote users who need to access their LAN  workstations that currently all have different RDP listening ports.

What is the best way to setup and use the SSL VPN for RDP connections?  We setup the SSL VPN to a specific port (not 443) suggested by a Sophos tech.  Then the remote client loaded the VPN software, opened an RDP connection, but how should that connection be configured to go through the VPN?  If we configure as xxx.xxx.xxx.xxx:Workstation Listening Port won't that just be a non-secure RDP connection?  I am a novice at this, so please bear with me.  We are a 6 person company that cannot afford an IT person, so I am the owner and IT person.

It seems that there must be a way to set up a NAT whereby when a particular user makes an RDP connection through the VPN it will be directed to the correct workstation IP.  Then we would not have to configure each workstation with a different listening port.  Does any of this make sense?

Any help and suggestions for best practices would be gratefully appreciated!



This thread was automatically locked due to age.
  • When you connect to the VPN you have access to the inside network from external, and all the internal IP addresses of the RDP servers.

    So if you connect to the internal IP of the RDP server is should go via the VPN.

    Easy way to test this is RDP to the Internal IP with the VPN off, it will fail. Connect VPN and then RDP to the internal IP and it will work.

    Then remove any open ports forwarding your external IP -> Internal IP.

    When the VPN is connected you should use the individual IPs of the RDP servers, not your WAN address.

    Regards,
    Bohdan