How to set up remote access to a server by specifying an IP address in Windows

How to set up remote access to a server by specifying an IP address in Windows

We have many servers that are often interfered with by external networks. Intruders illegally enter our servers by scanning port 3389 to crack passwords. At this time, we can configure the server IP security policy to restrict some IP access, which greatly improves the security of the server.

Experimental environment:

Server: server 2008R2 IP (192.168.0.103)

Client: win 7 IP (192.168.0.105)

The specific configuration is as follows:

1. First open the IP security policy: Control Panel – Administrative Tools – Local Security Policy – ​​IP Security Policy on the local computer. Right-click in the blank area on the right and select Create IP Security Policy.

Click Next to finish.

Then click OK-OK and select the Filter Actions tab.

Then add an IP rule that prohibits remote connections through 3389.

At this point the configuration is complete and will take effect without restarting the machine. Let's test the configuration on the client to see if it works.

Unable to remotely connect to the server, we set the server IP security policy to unassigned, and then test whether the client can remotely connect to the server.

The above is the full content of this article. I hope it will be helpful for everyone’s study. I also hope that everyone will support 123WORDPRESS.COM.

You may also be interested in:
  • Under Windows, only fixed IP remote access is allowed through IP security policy settings
  • How to set up remote desktop access by specifying an IP address on a Windows server
  • Windows 32-bit eclipse remote hadoop development environment construction
  • Windows server records 3389 remote desktop IP policy

<<:  An example of dynamically implementing different styles of data in a column of el-table of element ui

>>:  MySQL count detailed explanation and function example code

Recommend

Summary of common sql statements in Mysql

1. mysql export file: SELECT `pe2e_user_to_compan...

In-depth explanation of InnoDB locks in MySQL technology

Table of contents Preface 1. What is a lock? 2. L...

A brief discussion on the pitfalls of react useEffect closure

Problem code Look at a closure problem code cause...

JavaScript implements cool mouse tailing effects

After watching this, I guarantee that you have ha...

Linux/Mac MySQL forgotten password command line method to change the password

All prerequisites require root permissions 1. End...

VMware Workstation Pro 16 License Key with Usage Tutorial

VMware Workstation is a powerful desktop virtual ...

Apache Bench stress testing tool implementation principle and usage analysis

1: Throughput (Requests per second) A quantitativ...

Detailed discussion of the differences between loops in JavaScript

Table of contents Preface Enumerable properties I...

How to find and delete duplicate rows in MySQL

Table of contents 1. How to find duplicate rows 2...

Simple implementation of Mysql add, delete, modify and query statements

Simple implementation of Mysql add, delete, modif...

How to use axios to make network requests in React Native

In front-end development, there are many ways to ...

JS realizes the front-end paging effect

This article example shares the specific code of ...

How to use bind to set up DNS server

DNS (Domain Name Server) is a server that convert...

What you need to know about msyql transaction isolation

What is a transaction? A transaction is a logical...

MySQL trigger usage scenarios and method examples

trigger: Trigger usage scenarios and correspondin...