This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
virtualization:ras:ras [2017/05/06 13:35] gcooper |
virtualization:ras:ras [2023/09/06 09:38] (current) gcooper |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Parallels RAS – Remote Application Server ====== | ====== Parallels RAS – Remote Application Server ====== | ||
- | See also **[[virtualization: | + | **Client Downloads**: https:// |
- | See also **[[virtualization: | + | **Server Downloads**: |
- | + | ||
- | **Client | + | |
- | + | ||
- | **Server Downloads**: | + | |
- | + | ||
- | **2XOS Downloads**: | + | |
**Parallels RAS Upgrade Procedure**: | **Parallels RAS Upgrade Procedure**: | ||
Line 46: | Line 40: | ||
**Quick Configuration Guide**: http:// | **Quick Configuration Guide**: http:// | ||
- | - If the 2X RAS will also be a terminal server, install these first: | + | - If the Parallels |
* **Role-based Installation** | * **Role-based Installation** | ||
* **Remote Desktop Services** (role) | * **Remote Desktop Services** (role) | ||
- | * **Session Host service** | + | * **Remote Desktop Licensing** (role service) |
- | * **Remote Desktop Licensing** service | + | * **Session Host service** (role service) |
* Perhaps on domain controller | * Perhaps on domain controller | ||
* **Desktop Experience** (feature) | * **Desktop Experience** (feature) | ||
* Under User Interfaces and Infrastructure | * Under User Interfaces and Infrastructure | ||
+ | * Already included in Server 2016 full install | ||
- Configure specified License Server and License Type in Group Policy | - Configure specified License Server and License Type in Group Policy | ||
- | * Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Licensing | + | * **Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Licensing** |
- Configure Domain Users to login to DC via RDS in Group Policy | - Configure Domain Users to login to DC via RDS in Group Policy | ||
- | * Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> Allow log on through Remote Desktop Services | + | * **Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment -> Allow log on through Remote Desktop Services |
- | + | ** | |
- | - Install Parallels RAS | + | - Install Parallels RAS - login with domain_admin@your_domain_name |
- Add a terminal server | - Add a terminal server | ||
* Use IP addresses unless the hostname is fully resolvable | * Use IP addresses unless the hostname is fully resolvable | ||
Line 67: | Line 62: | ||
===== Firewall ===== | ===== Firewall ===== | ||
- | http://www.2x.com/firewall-requirements-2x-remote-application-server/ | + | https://my.parallels.com/support/ras/ |
- | http:// | + | Newer installers will open necessary ports in the Windows |
- | :!: These are bare minimum | + | These are the **external** |
- | |TCP |80, 443, 3389 | + | |TCP |80, 443, 20009 | |
- | |UDP |67, 69, 3389, 4011, 20000, 20009 | | + | |UDP |80, 443, 20009 |
===== Remote Desktop Services ===== | ===== Remote Desktop Services ===== | ||
- | :!: You need a minimal but functional RDS server before it will work with 2X as a terminal server. | + | Newer RAS installers |
- | Add '' | + | You need a minimal but functional |
- | + | ||
- | **Right-click Computer -> Properties -> Remote Desktop -> Select Users** | + | |
===== Secure Client Gateway and HTML5 Gateway ===== | ===== Secure Client Gateway and HTML5 Gateway ===== | ||
Line 88: | Line 81: | ||
{{ : | {{ : | ||
- | http:// | + | Newer installers will install the Secure Client Gateway and RAS HTML5 Gateway and set upt a self-signed SSL certificate for you. |
- | + | ||
- | http://www.2x.com/ | + | |
- | **2X RAS Console -> Farm -> Gateways -> Properties -> SSL/TLS** | + | **Parallels |
* Enable | * Enable | ||
* Create a Self-Signed Certificate | * Create a Self-Signed Certificate | ||
- | **2X RAS Console -> Farm -> Gateways -> Properties -> HTML 5** | + | **Parallels |
* Enable | * Enable | ||
Line 103: | Line 94: | ||
===== Connection Modes ===== | ===== Connection Modes ===== | ||
- | |||
- | http:// | ||
==== Direct ==== | ==== Direct ==== | ||
- | 2X Client connects to a 2X Gateway over port 80 or port 443 (SSL) then negotiates a direct RDP connection to the Terminal Server. | + | RAS Client connects to a Secure Client |
* Best performance for multimedia | * Best performance for multimedia | ||
Line 114: | Line 103: | ||
==== Gateway ==== | ==== Gateway ==== | ||
- | The 2X Client connects to a 2X Gateway over port 80 or port 443 (SSL) which negotiates an RDP connection to the Terminal Server. | + | The RAS Client connects to a Secure Client |
* Easier to get through firewalls | * Easier to get through firewalls | ||
* Potentially more secure | * Potentially more secure | ||
* Not as good for multimedia | * Not as good for multimedia | ||
- | + | | |
- | ===== 2XOS PXE Boot ===== | + | |
- | + | ||
- | See also **[[virtualization: | + | |
- | + | ||
- | **2X RAS Console -> Client Manager -> Thin Client Groups -> Properties** | + | |
- | + | ||
- | * Boot Method -> Network Boot | + | |
- | * Regional -> Set Time Zone and Language | + | |
- | * Input Devices -> Keyboard and Layout | + | |
- | * Shadowing -> Enable VNC Service | + | |
- | * Shadowing -> Enable Interact with Desktop | + | |
- | * RDP Defaults -> 2X Connection Mode -> Direct | + | |
- | * RDP Defaults -> Bandwidth -> High Speed Broadband | + | |
===== RemoteFX ===== | ===== RemoteFX ===== | ||
Line 180: | Line 156: | ||
{{ : | {{ : | ||
+ | |||
+ | ===== Policies ===== | ||
+ | |||
+ | After the Parallels RAS client has been configured and used to log in once, the policies set here will take effect. | ||
+ | |||
+ | * RAS Console -> Policies -> Plus sign for New | ||
+ | * Change policy name if desired -> Plus sign to add users (domain users, etc.) | ||
+ | * Connection Properties -> Display (32 bit) -> Printing (typically None or RAS) -> Scanning (none) -> Experience (check all except Menu and Window, Desktop Comp and Show contents) | ||
+ | * Control Settings -> Password (check Do NOT save password) | ||
+ | |||
+ | ===== Brute Force Attacks ===== | ||
+ | |||
+ | https:// | ||
+ | |||
+ | Older Parallels RAS installations included a default Gateway Tunneling Policy that would tunnel regular RDP (mstsc.exe) client connections into servers on TCP port 80. | ||
+ | |||
+ | Frequently, botnets or other brute force attackers will abuse port 80 for RDP connections leading to annoying warning pop-ups and RAS '' | ||
+ | |||
+ | ==== Steps to Disable ==== | ||
+ | |||
+ | Performing these actions will restrict native MSTSC from accessing the Gateway on the RAS Gateway port (default 80). So if an end-user tries using MSTSC (ipaddress: | ||
+ | |||
+ | - Open to Remote Application Server console. | ||
+ | - Open the list of Gateways within your farm. | ||
+ | - Highlight the Gateway. | ||
+ | - Head to Tunneling Policies tab. | ||
+ | - Double click the policy (Usually Default policy is used. If you happen to use another policy make sure to double click the used one). | ||
+ | - Click " | ||
+ | - Apply new setting in RAS Console. | ||
+ | |||
+ | Note: Performing these actions will restrict native MSTSC from accessing the Gateway on the RAS Gateway port (default 80) So if the end-user will try using MSTSC ipaddress: |