- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Windows remote assistance is not working after migrating to Meraki MX
We have three sites migrated to Meraki MX in Mesh.
Everything working well apart from Windows remote assistance application.
Client from Meraki env is not able to access non Meraki client sites & Vice versa.
It was working before migrating to MX, they had only MPLS link only.
Now we have MPLS + Internet link at the site and not able to access the application
We did live packet capture as well and found the Client from the Meraki ENV is sending Reset Packet and tearing the down the communicaton after few tcp transmission.
BR
Satheesh
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Doc showing Remote Assistance uses port 3389
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb456978(v=technet.10)
Assuming this is correct, even with all the correct setup to allow 3389 and or forward ports, you may still run into issues with Intrustion Prevention. Check the security event log
https://documentation.meraki.com/MX/Monitoring_and_Reporting/Security_Center
If you see Microsoft Windows Terminal server RDP over non-standard port attempt
then Intrustion Prevention is causing the issue and you will need to adjust . I believe balanced ruleset is the option, but you may have to move mode to detection also. YMMV
These options may come with security risks and in that case the recommended action is to be connected to a VPN (Client or Site-to-Site) to use 3389 or use a different solution as 3389(RDP) is pretty vulnerable.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Doc showing Remote Assistance uses port 3389
https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-xp/bb456978(v=technet.10)
Assuming this is correct, even with all the correct setup to allow 3389 and or forward ports, you may still run into issues with Intrustion Prevention. Check the security event log
https://documentation.meraki.com/MX/Monitoring_and_Reporting/Security_Center
If you see Microsoft Windows Terminal server RDP over non-standard port attempt
then Intrustion Prevention is causing the issue and you will need to adjust . I believe balanced ruleset is the option, but you may have to move mode to detection also. YMMV
These options may come with security risks and in that case the recommended action is to be connected to a VPN (Client or Site-to-Site) to use 3389 or use a different solution as 3389(RDP) is pretty vulnerable.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for your reply.
We fixed the issue by whitelisting tis snort rule over rdp over non standard ports.
WRA uses dynamic ports 49000 to 49999. IDs kept onblocking the packets.
