User Tools

Site Tools


virtualization:ras:ras

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
virtualization:ras:ras [2020/06/04 10:44]
gcooper
virtualization:ras:ras [2023/09/06 09:38] (current)
gcooper
Line 1: Line 1:
 ====== Parallels RAS – Remote Application Server ====== ====== Parallels RAS – Remote Application Server ======
- 
-See also **[[virtualization:ras:ras_thin_client_server|RAS ThinClient Server]]** 
  
 **Client Downloads**: https://www.parallels.com/products/ras/download/client/ **Client Downloads**: https://www.parallels.com/products/ras/download/client/
Line 161: Line 159:
 ===== Policies ===== ===== Policies =====
  
-After the Parallels RAS client has been configured and used to log in once the policies set here will take effect.+After the Parallels RAS client has been configured and used to log in oncethe policies set here will take effect.
  
   * RAS Console -> Policies -> Plus sign for New   * RAS Console -> Policies -> Plus sign for New
Line 174: Line 172:
 Older Parallels RAS installations included a default Gateway Tunneling Policy that would tunnel regular RDP (mstsc.exe) client connections into servers on TCP port 80. Older Parallels RAS installations included a default Gateway Tunneling Policy that would tunnel regular RDP (mstsc.exe) client connections into servers on TCP port 80.
  
-Frequently, botnets or other brute force attackers will abuse port 80 for RDP connections leading to annoying warning pop-ups and RAS ''controller.log'' entries.+Frequently, botnets or other brute force attackers will abuse port 80 for RDP connections leading to annoying warning pop-ups and RAS ''controller.log'' entries.  {{ :virtualization:ras:ras_brute_force_pop-up.jpg?direct&250|RAS Brute Force Pop-Up}}
  
 ==== Steps to Disable ==== ==== Steps to Disable ====
virtualization/ras/ras.1591289048.txt.gz · Last modified: 2020/06/04 10:44 by gcooper