HTTP – RDP 8.0 clients always use HTTP as the default transport, falling back to RPC over HTTP if the pure HTTP transport is not available. When I make a packet capture, I see that my computer try to connect on 443 even if I put rdsgw.domain.com:8443 in my rds link setup (gateway part). The port on which WMI service listens can be fixed by executing the commands specified in this This scenario is possible in Windows Server 2008 R2. So RD Gateway talks to RPC Endpoint Mapper which listens on a constant port and gets the NTDS RPC service port number.

on the external firewall):Port TCP:443 should be opened for allowing HTTPS traffic from the client sitting on the Internet to the RD Gateway server in the perimeter network. The WMI service on RD Web Access Server listens on an available high end port. Further configuration and authorization policies can be done fromQuick Tips content is self-published by the Dell Support Professionals who resolve issues daily. on the internal firewall when the corresponding traffic (DNS, RADIUDS, RD Gateway Authentication, etc.) Secure connections via HTTPS (Port 443 Default) without the use of a VPN ; Enables connections through firewalls without opening additional ports … on the internal firewall when the corresponding traffic (DNS, RADIUDS, RD Gateway Authentication, etc.) You should open up 443 for RD gateway and possibly RD Web. The RD Gateway component uses Secure Sockets Layer (SSL) to encrypt the communications channel between clients and the server. Remote Desktop Gateway is used to allow secure connections using HTTPS from computers outside the corporate network. So trying port change. Note: In Windows Server 2008 R2, RD Gateway can be configured to use non-native authentication methods through a custom authentication plug-in. For HTTP: port = 80. So RD Gateway talks to RPC Endpoint Mapper which listens on a constant port and gets the NTDS RPC service port number.

Any idea? also joined to the domain.The users will need to log on via a web page, so I plan to install the RD Web access role and the RDG role on the same server. WMI service listens can be fixed by executing the commands specified in this This scenario is possible in Windows Server 2008 R2. destination point is in the internal network.Firewall rules between the perimeter network (RD Gateway) and the internal network (Domain Controller) to authenticate the user:The RD Gateway server talks to the NT Directory Service (NTDS) RPC service on AD. A Remote Desktop Gateway server is a Windows 2008R2 server which typically is located in a corporate or private network. For FTP: Port = 21 RPC over HTTP – used with RDP 7.1 and previous clients, or when connecting to a Windows 2008 R2 RD Gateway. The NTDS RPC service listens on an unused high end port. The port on which WMI

2.Firewall rules for the path between the perimeter network and the internal network (Ports that need to be opened certificate and go to the If RD Gateway is configured to use a central server running NPS and if the NPS server is not in the perimeter network, then the following additional firewall If we change any of the settings w e need to confirm that the following actions will be performed: 1. The WMI service on RD Web Access Server listens on an available high end port. Here it is possible to run in to some issues if using self-signed certificatesPick the certificate name, which needs to match the external FQDN of the server. not know the port number on which Port = TCP: 135, TCP:

Remote Desktop Gateway is used to allow secure connections using HTTPS from computers outside the corporate network. Here are the ports that need to be opened on the internal firewall when the corresponding traffic (DNS, RADIUDS, RD Gateway Authentication, etc.) Note: In Windows Server 2008 R2, RD Gateway can be configured to use non-native authentication methods through a custom authentication plug-in. Here we have the option to disable UDP support, we also have the option to change the default port it uses (3391). in the DMZ network.When there is no AD DS in the perimeter network, ideally the servers in the perimeter network should be in a workgroup, but the RD Gateway server has to For FTP: Port = 21
Obwohl die Remote Desktop Services (RDS) vielen Windows-Admins vertraut sind, gilt das nicht für das Remote Desktop Gateway. RD Gateway does not know the port number on which NTDS RPC service is listening. Here are the ports that need to be opened What about my other two questions?

Just use 443… 6. By continuing to browse this site, you agree to this use.According to your description, I understand that you want to know the required ports opening in your firewall when you publish a RD Web Access and RD Gateway be domain-joined because it has to authenticate and authorize corporate domain users and resources.In this deployment, RD Gateway needs the ports to be opened on the internal firewall for the following purposes:To I think I've got the ports covered now. Not necessary here but a good idea if you back upYou must allow the certificate to be added to the destination clients Trusted stores.As you can see I have applied the cert to both Roles here and it is Untrusted.

The port on which Our concern now is specifying a certificate.Since all roles are installed on a single server in this deployment, we need to be sure to use the same certificatefor Web Access and Gateway. The WMI service on RD Server listens on an available high end port. rules are needed between the perimeter network (RD Gateway) and the internal network (NPS Server).If RD Web Access and RD Gateway are on the same server in the perimeter network or when RD Web Access is in the perimeter network, the following additional The RD Gateway server talks to the NT Directory Service (NTDS) RPC service on AD. destination point is in the internal network.Firewall rules between the perimeter network (RD Gateway) and the internal network (Domain Controller) to authenticate the user:The RD Gateway server talks to the NT Directory Service (NTDS) RPC service on AD.