IP based Access Restriction for Terminal Services

15 pts.
Tags:
IP Subnetting
System administration
Terminal Services
Terminal Services Security
Windows Server 2003
Windows Server 2003 Enterprise Edition
WINTEL
Wintel Server
I am looking for an solution where we can restrict the Terminal services access using IP address in LAN envirinment at OS level. All the servers are in same IP subnet & connected through same network switch. Is anyone tried doing such things. Please suggest if any soultion if available.

Software/Hardware used:
Windows 2003 Enterprise & Standard Editons

Answer Wiki

Thanks. We'll let you know when a new response is added.

As per my knowledge its not possible to block the users using an IP address, you can make use of your Siwtches or firewall to create an access list to block the teminal service port 3389.
Mean while I am also trying find out the possibilities, if I came accross I will let you know.

Cheers

Yasir

Discuss This Question: 3  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Sajiddsayyed
    Dear Yasir Thanks for your inputs, but as i said this is in same LAN, so there is no firewall coming in between. Also the swicth which we have is normal switch where we can not set any access list. If you can find any solution which we can implement at OS level please share. Also i have tried the enabling firewall but it stops access from all source. We just need to stop access to from some of the machines.
    15 pointsBadges:
    report
  • Spadasoe
    I sugest you do this through group policy, limiting remote desktop access to a defined group or blocking access to a defined group.
    5,130 pointsBadges:
    report
  • jinteik
    One of the best ways is also to allow remote desktop to administrators only. the rest who are users will not be able to connect. Unless you really dont' want them to be even see the remote desktop screen of the servers then I second on the policy settings.
    17,330 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following