{"id":4308,"date":"2020-10-19T10:38:41","date_gmt":"2020-10-19T08:38:41","guid":{"rendered":"https:\/\/nsix.pl\/kb\/?p=4308"},"modified":"2020-10-19T10:38:42","modified_gmt":"2020-10-19T08:38:42","slug":"blokowanie-protokolu-rdp-z-sieci-publicznej-z-wylaczeniem-sieci-prywatnej","status":"publish","type":"post","link":"https:\/\/nsix.pl\/kb\/blokowanie-protokolu-rdp-z-sieci-publicznej-z-wylaczeniem-sieci-prywatnej\/","title":{"rendered":"Blokowanie protoko\u0142u RDP z sieci publicznej z wy\u0142\u0105czeniem sieci prywatnej."},"content":{"rendered":"\n<p>Bezpieczna sie\u0107 jest podstaw\u0105 ka\u017cdej firmy posiadaj\u0105cej swoje w\u0142asne serwery, aby je zagwarantowa\u0107 mo\u017cemy skonfigurowa\u0107 serwery aby nie przyjmowa\u0142y ruchu sieciowego z zewn\u0105trz. Poka\u017cemy jak to zrobi\u0107 na przyk\u0142adzie us\u0142ugi Pulpitu Zdalnego.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Najpierw otwieramy ustawienia zapory z zabezpieczeniami zaawansowanymi<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"604\" height=\"494\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/image.png\" alt=\"\" class=\"wp-image-4309\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/image.png 604w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/image-300x245.png 300w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/image-60x49.png 60w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/image-150x123.png 150w\" sizes=\"(max-width: 604px) 100vw, 604px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\"><li>Nast\u0119pnie wybieramy opcj\u0119 \u201eRegu\u0142y przychodz\u0105ce\u201d, bo to ruch z zewn\u0105trz ma by\u0107 blokowany<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"717\" height=\"502\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-2.png\" alt=\"\" class=\"wp-image-4315\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-2.png 717w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-2-300x210.png 300w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-2-60x42.png 60w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-2-150x105.png 150w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><li>Teraz znajdujemy regu\u0142y dotycz\u0105ce pulpitu zdalnego, a konkretnie dwie:<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\"><li>Pulpit zdalny \u2014 tryb u\u017cytkownika (ruch przychodz\u0105cy TCP)<\/li><li>Pulpit zdalny \u2014 tryb u\u017cytkownika (ruch przychodz\u0105cy UDP)<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li>Klikamy prawym przyciskiem myszy na jedn\u0105 z nich i wybieramy opcj\u0119 \u201eW\u0142a\u015bciwo\u015bci\u201d<\/li><li>Przechodzimy do zak\u0142adki \u201eZakres\u201d i zmieniamy wyb\u00f3r na \u201eTe adresy IP\u201d pod Zdalnym adresem IP<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3.png\" alt=\"\" class=\"wp-image-4317\" width=\"406\" height=\"545\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3.png 541w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-224x300.png 224w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-45x60.png 45w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-112x150.png 112w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\"><li>Klikamy w opcj\u0119 dodaj i tam wybieramy interesuj\u0105c\u0105 nas opcj\u0119. Mo\u017cemy doda\u0107 tam nasz\u0105 firmow\u0105 podsie\u0107 aby tylko z niej by\u0142 mo\u017cliwy ruch przychodz\u0105cy, a mo\u017cemy te\u017c poda\u0107 inne adresy kt\u00f3re nas interesuj\u0105.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"425\" height=\"469\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-4.png\" alt=\"\" class=\"wp-image-4318\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-4.png 425w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-4-272x300.png 272w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-4-54x60.png 54w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-4-136x150.png 136w\" sizes=\"(max-width: 425px) 100vw, 425px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\"><li>Po wpisaniu, zatwierdzamy przyciskiem OK<\/li><li>Przechodzimy do zak\u0142adki Og\u00f3lne i w\u0142\u0105czamy regu\u0142\u0119 aby zacz\u0119\u0142a ona filtrowa\u0107 ruch.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-5.png\" alt=\"\" class=\"wp-image-4319\" width=\"406\" height=\"545\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-5.png 541w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-5-224x300.png 224w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-5-45x60.png 45w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-5-112x150.png 112w\" sizes=\"(max-width: 406px) 100vw, 406px\" \/><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\"><li>Procedur\u0119 t\u0119 powtarzamy dla drugiej regu\u0142y<\/li><li>Po zako\u0144czonej konfiguracji, dla pewno\u015bci prze\u0142adowujemy nasz\u0105 zapor\u0119 aby zastosowa\u0107 zmiany. Aby to zrobi\u0107 uruchamiamy z uprawnieniami administratora Wiersz polecenia i wpisujemy komend\u0119: netsh advfirewall reset<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"256\" src=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-1.png\" alt=\"\" class=\"wp-image-4321\" srcset=\"https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-1.png 512w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-1-300x150.png 300w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-1-60x30.png 60w, https:\/\/nsix.pl\/kb\/wp-content\/uploads\/2020\/10\/sth-3-1-150x75.png 150w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<p>Od teraz nasz serwer przyjmuje tylko i wy\u0142\u0105cznie sesje Pulpitu zdalnego od komputer\u00f3w z adresem sieciowym kt\u00f3ry zdefiniowali\u015bmy w regu\u0142ach.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bezpieczna sie\u0107 jest podstaw\u0105 ka\u017cdej firmy posiadaj\u0105cej swoje w\u0142asne serwery, aby je zagwarantowa\u0107 mo\u017cemy skonfigurowa\u0107 serwery aby nie przyjmowa\u0142y ruchu sieciowego z zewn\u0105trz. Poka\u017cemy jak to zrobi\u0107 na przyk\u0142adzie us\u0142ugi Pulpitu Zdalnego. Najpierw otwieramy ustawienia zapory z zabezpieczeniami zaawansowanymi Nast\u0119pnie wybieramy opcj\u0119 \u201eRegu\u0142y przychodz\u0105ce\u201d, bo to ruch z zewn\u0105trz ma by\u0107 blokowany Teraz znajdujemy regu\u0142y [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,180],"tags":[290,289,43,143,40,41,288],"class_list":["post-4308","post","type-post","status-publish","format-standard","hentry","category-remote-desktop-services","category-windows-server","tag-blokada-rdp","tag-konfiguracja-firewall","tag-rdp","tag-vps","tag-windows","tag-zabezpieczenia","tag-zabezpieczenie-rdp"],"_links":{"self":[{"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/posts\/4308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/comments?post=4308"}],"version-history":[{"count":4,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/posts\/4308\/revisions"}],"predecessor-version":[{"id":4325,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/posts\/4308\/revisions\/4325"}],"wp:attachment":[{"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/media?parent=4308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/categories?post=4308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsix.pl\/kb\/wp-json\/wp\/v2\/tags?post=4308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}