Administrative privileges are required on the system being configured.
- From the Start Menu select Control Panel -> System:
- In the System properties dialog, Select the Advanced system settings option:
- Select the ‘Remote’ tab and then Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure).
*Only choose ‘Allow connections from computers running any version of Remote Desktop (less secure) if using a Remote Desktop client without NLA enabled, for example Windows XP SP2. Windows XP patched with SP3 can be configured to use NLA (see http://technet.microsoft.com/en-us/library/cc732713.aspx )
- If any users require Remote Desktop access and are not Administrators on the computer, click the ‘Select Users’ button to add their NID’s:
- Click ‘OK’ twice to return to the Control Panel and choose ‘Windows Firewall’
- Select ‘Advanced settings’ in the left window pane.
- Under Windows Firewall with Advanced Security; highlight the item ‘Inbound Rules’.
- Locate the rules named ‘Remote Desktop Options (TCP-in)’. Double click on the first rule.
- Select the ‘Advanced’ tab and check all 3 profile options.
- Select the ‘Scope’ tab, in the ‘Remote IP address section’, select ‘These IP addresses:’ and Click on the ‘Add’ button.
- Select ‘This IP address or subnet:’ and enter 126.96.36.199/22 to grant access for all SSL VPN IP addresses.
The entire range must be added.
- Click on OK and Select ‘These IP address’ Enter your local IP address:
- Click ‘OK’ and ‘OK’ to finish.
Now that you have restricted access to your office system, you are ready to use a remote desktop connection from off campus.
When you need access WSU campus resources you can do a onetime setup of the Cisco AnyConnect SSL VPN client and connect securely to your office system using remote desktop.