V
V
Vladimir Kivva2019-06-26 13:27:00
Computer networks
Vladimir Kivva, 2019-06-26 13:27:00

Does not let in half of the cases via RDP to the 2008R2 terminal, how to identify the problem?

Terminal 2008R2 on a virtual machine inside ESXi 6.5 on a dedicated server in Hetzner. PfSense serves as a virtual machine router, it has a white IP and port forwarding to the virtual machine. Except for ESXi, the latest updates are everywhere.

Suddenly, the uptime robot began to write messages about the unavailability of the server by port. Then users ceased to start up on RDP. It happens suddenly, without explanation. Just a feeling that the terminal is not available. Time from 6-7 lets, if you quickly make attempts to connect. Subjectively, with RDCman, the chance to connect is much higher than with mstsc. On Remmina, users have not heard anyone complain at all.

  • I tried reinstalling pfsense.
  • Windows logs read. In "Safety" there is not even a hint. And I don't see any events that match in number with server unavailability.
  • I launched NetworkMonitor with a filter on port 3389, but I still don’t know what to do with it - it collects information.
  • They definitely didn’t do anything with the hypervisor and no one could get there, it was closed by the firewall of the data center and not such a serious object.
  • Network interfaces were intel everywhere, changed to vmx3 - nothing worked.
  • I stopped the services of the RDP Guard program, which bans brute force fans - nothing has changed.

I plan to enable ICMP on PfSense, collect winmtr information, then forward ICMP to the VM and winmtr again.
Network Monitor
nlyi-hwkxoa__vfmvchte1avbs0.png
Uptime Robot
5d133d4a92395647931605.png
The hyper network itself

5d134625574fb682319704.png
5d1346da09757878165874.png


udp1. I made forwarding 3390 on the router to the same place in 3389 on the machine - packets do not disappear there. It turns out that someone clogs 3389 with garbage?

Answer the question

In order to leave comments, you need to log in

2 answer(s)
A
akelsey, 2019-06-26
@akelsey

udp1. I made forwarding 3390 on the router to the same place in 3389 on the machine - packets do not disappear there. It turns out that someone clogs 3389 with garbage?

The guess is very true. After the discovered vulnerability, where you can elevate privileges through the RDP without patches, the RDP starts to behave in this way - 50 to 50 connections - dumps and so on.
It is necessary either to send addresses of attack sources to the sump (according to the iptables rule or something else), if the number of connection attempts from one address exceeds the sane - per unit of time - in ban days by 7.

I
Ingvar, 2019-06-26
@take

1. primitive Firewall after updating venda can go)
2. the second cant with the routing table on the router. Were there experiments? It could be preserved until you clean it.
3. I read that the bourgeoisie had similar problems: all of a sudden for no reason. It is necessary to prescribe something in system politicians. Google it: w.. 2008 rdp no connection system policy

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question