Hi,
I guess this will not work: Say, your local RDP server has LAN IP address IP1. You want to allow your local RDP server (Src IP=IP1, proto=TCP, src port=3389) to send RDP reply data to any RDP client somewhere in the Internet (Dest IP=any, proto=TCP, dest port=any), and block anything else.
Since ACCESS CONTROL only allows rules for PROHIBITING instead of ALLOWING outgoing traffic, this would translate to the following four PROHIBITING rules:
- Src IP=IP1, Src Port Start=0, Src Port End=65535, Proto=UDP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=65535
- Src IP=IP1, Proto=ICMP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255
- Src IP=IP1, Src Port Start=0, Src Port End=3388, Proto=TCP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=65535
- Src IP=IP1, Src Port Start=3390, Src Port End=65535, Proto=TCP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=65535
While in these rules you can specify "Src IP=IP1" in STEP 3 (SELECT MACHINE) and the protocol and destination information in STEP 5 (PORT FILTER), unfortunately you cannot specify Source Port ranges of the form "Src Port Start - Src Port End". Hence it is not possible to formulate rules 3 and 4 above, only rules 1 and 2 are possible, because not being able to specify a source port range is irrelevant for ICMP (rule 2) and implicitly means "any" source port (Src Port Start=0, Src Port End=65535) which is the case for UDP (rule 1).
Hence to make it work for your scenario, you could only specify rules 1 and 2 (which disallows any UDP and ICMP traffic) but would have to allow any TCP traffic with the Internet (by not specifying any TCP rule with ACCESS CONTROL).
There is one thing left to improve the situation:
Given, RDP clients only use ports > 1023 (they should), you could add a third ACCESS CONTROL rule of the following form:
Src IP=IP1, Proto=TCP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=1023
This would prevent your RDP server to reach any well known TCP ports < 1024 (like 80 or 443 for web servers) but still allow it to talk to RDP clients. Hence this rule is a good surrogate for rules 3 and 4 above, which can not be formulated due to the limitations of your router.
To summarize, I would recommend the following three ACCESS CONTROLS:
- Src IP=IP1, Proto=UDP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=65535
- Src IP=IP1, Proto=ICMP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255
- Src IP=IP1, Proto=TCP, Dest IP Start=0.0.0.0, Dest IP End=255.255.255.255, Dest Port Start=0, Dest Port End=1023
This blocks almost any outgoing traffic from your RDP server to the Internet except to TCP ports >1023, which is the range, your RDP clients should use.
PT