How to configure IPsec to limit RDP

ipsecrdp

I've seen plenty of people suggesting that you can limit RDP access to a range of IP addresses by using IPsec instead of using the built in Windows Firewall. This is exactly what I need to be able to do, but I have not been able to find any examples of how to actually set it up…and I'd rather not mess it up and boot myself off the server and not be able to reconnect.

Can anybody explain how to use IPsec to limit RDP access to a range of IPs?

Best Answer

IPSEC is not the tool for this. You need to use a firewall of some kind: Either the built-in Windows firewall or one positioned elsewhere on your network.

You may want to consider using IPSEC to encrypt & authenticate the RDP traffic in addition to a firewall to restrict access to the RDP port, but these are separate considerations from a security standpoint.


Note that you can effectively use IPSEC to block access to RDP (simply require IPSEC encryption/authentication on all RDP traffic, and anyone trying to talk without encryption/authentication won't get through), but this is a side effect and isn't the most correct approach to restricting access. It also means more work for your server (it's going to try to negotiate IPSEC for each connection attempt, rather than simply refusing the attempt if you use a standard firewall to restrict access to the port).

Related Topic