This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
virtualization:ras:ras [2020/06/04 10:44] gcooper |
virtualization:ras:ras [2023/09/06 09:38] (current) gcooper |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Parallels RAS – Remote Application Server ====== | ====== Parallels RAS – Remote Application Server ====== | ||
- | |||
- | See also **[[virtualization: | ||
**Client Downloads**: | **Client Downloads**: | ||
Line 161: | Line 159: | ||
===== Policies ===== | ===== Policies ===== | ||
- | After the Parallels RAS client has been configured and used to log in once the policies set here will take effect. | + | After the Parallels RAS client has been configured and used to log in once, the policies set here will take effect. |
* RAS Console -> Policies -> Plus sign for New | * RAS Console -> Policies -> Plus sign for New | ||
Line 174: | Line 172: | ||
Older Parallels RAS installations included a default Gateway Tunneling Policy that would tunnel regular RDP (mstsc.exe) client connections into servers on TCP port 80. | Older Parallels RAS installations included a default Gateway Tunneling Policy that would tunnel regular RDP (mstsc.exe) client connections into servers on TCP port 80. | ||
- | Frequently, botnets or other brute force attackers will abuse port 80 for RDP connections leading to annoying warning pop-ups and RAS '' | + | Frequently, botnets or other brute force attackers will abuse port 80 for RDP connections leading to annoying warning pop-ups and RAS '' |
==== Steps to Disable ==== | ==== Steps to Disable ==== |