Have a dilemma -
I have clients accessing there network server off site via RDP (example port 3391 forwarding over to 3389). Due to the potential risks using RDP I was thinking about using IPsec forticlient VPN then running RDP through the tunnel. Problem of course is a VPN has its own security risks potentially linking an undetected virus ridden PC to the companies lan.
This is my dilemma...
Any thoughts and strong arguments on both would be appreciated
I'm assuming you would terminate the IPSecs at a FortiGate. Then you have an option to set AV and other UTM services on the tunnel policies.
Exactly,
only problem is I don't have control of the users home PC that would be connecting using the fortclient sw, this invites issues even if the proper policies are setup for the tunnel, you agree or am I in error?
I don't see much difference between two if you're concerning about the untrusted client devices injecting malicious stuff/attemps into inside of the protected network. You can use UTM for RDP VIP policy on the FortiGate as well. IPSec is to encrypt data over the internet not to be intercepted/eavesdropped by 3rd parties. For that part, of course, it's much better. FortiClient comes with Endpoint control, which I haven't used yet (I was hoping somebody else would comment about it), that would probably block from connecting for those contaminated client devices.
@Mike, why not use the SSL VPN Portal and enable "RDP" on the Portal? This should launch a pre-configured RDP session in the browser to the remote host. The concern you have with "Extending the wire" to an un-trusted host is very real. Personally, this is the route I would go.
-TFWD
thank you ,
great suggestion, I will consider that
User | Count |
---|---|
2559 | |
1356 | |
795 | |
649 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.