F5F Stay Refreshed Power Users Networks Basic inquiries

Basic inquiries

Basic inquiries

Y
yojin091024
Member
137
07-31-2023, 06:41 AM
#1
I'm exploring networking topics more deeply. Recently I've been learning about DDNS and port forwarding. I have some clarifying points about these concepts. First, I grasp how port forwarding works, but I'm puzzled when I have a dedicated public IP address. It seems fine to use Windows Remote Desktop by entering my IP, as long as I redirect port 3381 to the target machine. That's been successful so far. Now I want to connect remotely to two different computers using the same incoming port. For example, I tried forwarding port 4000 on an external connection to port 3389 on the remote desktop app, but it didn't work. Regarding DDNS, after setting it up and allowing it on your router, how should I configure the correct incoming port? I'm not sure about the specifics, especially since I haven't adjusted anything beyond basic setup. I'm also curious about the expected incoming port for a DDNS connection. Those are my initial concerns. Feel free to ask more questions! Thank you!
Y
yojin091024
07-31-2023, 06:41 AM #1

I'm exploring networking topics more deeply. Recently I've been learning about DDNS and port forwarding. I have some clarifying points about these concepts. First, I grasp how port forwarding works, but I'm puzzled when I have a dedicated public IP address. It seems fine to use Windows Remote Desktop by entering my IP, as long as I redirect port 3381 to the target machine. That's been successful so far. Now I want to connect remotely to two different computers using the same incoming port. For example, I tried forwarding port 4000 on an external connection to port 3389 on the remote desktop app, but it didn't work. Regarding DDNS, after setting it up and allowing it on your router, how should I configure the correct incoming port? I'm not sure about the specifics, especially since I haven't adjusted anything beyond basic setup. I'm also curious about the expected incoming port for a DDNS connection. Those are my initial concerns. Feel free to ask more questions! Thank you!

X
xoSaSaxo
Junior Member
33
07-31-2023, 02:24 PM
#2
You can switch the port remote desktop employs, which allows for several options. However, avoid overwhelming many systems with remote desktop; that's why we use VPNs. DDNS doesn't interfere with port forwarding—it simply maintains your domain name linked to your IP address.
X
xoSaSaxo
07-31-2023, 02:24 PM #2

You can switch the port remote desktop employs, which allows for several options. However, avoid overwhelming many systems with remote desktop; that's why we use VPNs. DDNS doesn't interfere with port forwarding—it simply maintains your domain name linked to your IP address.

1
123hustler123
Junior Member
13
08-01-2023, 05:34 AM
#3
It seems the setup isn't resolving as expected. Double-check for any typos in the configuration settings. Refer to the Microsoft support guide for guidance: https://support.microsoft.com/en-us/help...te-desktop. A VPN would offer better security and handle port forwarding more effectively. For DDNS, it doesn't change the port but lets you use a name instead of an IP address—so for your remote desktop connection, you could connect via: my-ddns-name.ddns.com:3389 instead of the default IP.
1
123hustler123
08-01-2023, 05:34 AM #3

It seems the setup isn't resolving as expected. Double-check for any typos in the configuration settings. Refer to the Microsoft support guide for guidance: https://support.microsoft.com/en-us/help...te-desktop. A VPN would offer better security and handle port forwarding more effectively. For DDNS, it doesn't change the port but lets you use a name instead of an IP address—so for your remote desktop connection, you could connect via: my-ddns-name.ddns.com:3389 instead of the default IP.

L
Lxxn2002
Member
240
08-12-2023, 07:40 AM
#4
The external port must vary for each host you wish to link to. The internal port remains consistent. Your router treats the external and internal ports as distinct identifiers to decide which connections to establish. Giving port 4000 to a computer at IP 192.168.0.10 will send incoming external traffic to that device. If you have multiple hosts like .10 and .11 with port numbers 4000, the router will either discard the packet due to duplicate addresses or route it to both, leading to connection loss from conflict. Each remote host requires its own unique external port. While internal ports can be shared if needed, assigning distinct ones ensures stability. The remote desktop software you use only changes your public IP address; the actual port assigned dictates the machine it connects to once inside your network. DNS translates domain names to IP addresses, acting like a mask. DDNS is another DNS-related feature but doesn’t apply here.
L
Lxxn2002
08-12-2023, 07:40 AM #4

The external port must vary for each host you wish to link to. The internal port remains consistent. Your router treats the external and internal ports as distinct identifiers to decide which connections to establish. Giving port 4000 to a computer at IP 192.168.0.10 will send incoming external traffic to that device. If you have multiple hosts like .10 and .11 with port numbers 4000, the router will either discard the packet due to duplicate addresses or route it to both, leading to connection loss from conflict. Each remote host requires its own unique external port. While internal ports can be shared if needed, assigning distinct ones ensures stability. The remote desktop software you use only changes your public IP address; the actual port assigned dictates the machine it connects to once inside your network. DNS translates domain names to IP addresses, acting like a mask. DDNS is another DNS-related feature but doesn’t apply here.

I
IzADerpCookie
Member
228
08-12-2023, 12:58 PM
#5
Thank you for your feedback. I see you're trying to set up a private VPN so only you can connect from the client side. Are there any free tools available for this purpose, or would you consider configuring a DMZ for the second device you're connecting to? Once that's done, using the system's IPv4 address should allow you to access it securely. I hope this clarifies things!
I
IzADerpCookie
08-12-2023, 12:58 PM #5

Thank you for your feedback. I see you're trying to set up a private VPN so only you can connect from the client side. Are there any free tools available for this purpose, or would you consider configuring a DMZ for the second device you're connecting to? Once that's done, using the system's IPv4 address should allow you to access it securely. I hope this clarifies things!

B
BookMix
Member
207
08-12-2023, 01:43 PM
#6
Imagine dividing your network into two sections, one for external access and another for internal use. Keep the part that receives internet traffic in the outer zone and the rest inside the main network. This setup adds a safety layer so even if someone breaches the outer part, they can't reach your critical data. *These zones* can be multiple subnets. You don’t have to split your whole network this way for a VPN—just connect to it from your local device using its IP address. No complex port forwarding needed, except one for the VPN server. I use OpenVPN on an Ubuntu server, but you can also install it on Windows. Just remember, Linux users often see the client in their network settings.
B
BookMix
08-12-2023, 01:43 PM #6

Imagine dividing your network into two sections, one for external access and another for internal use. Keep the part that receives internet traffic in the outer zone and the rest inside the main network. This setup adds a safety layer so even if someone breaches the outer part, they can't reach your critical data. *These zones* can be multiple subnets. You don’t have to split your whole network this way for a VPN—just connect to it from your local device using its IP address. No complex port forwarding needed, except one for the VPN server. I use OpenVPN on an Ubuntu server, but you can also install it on Windows. Just remember, Linux users often see the client in their network settings.

F
FatAvocado21
Junior Member
6
08-19-2023, 06:53 AM
#7
Thanks for sharing the details. I managed to resolve the remote desktop issue by changing the port forwarding method. Initially, I had set up port forwarding for a range instead of a specific port, which caused problems. I switched to using a single port—3400 for one device and 3500 for another—and connected via hostname.dnsservice.com:port. The ddns setup worked perfectly. I’m planning to try the VPN connection next since it sounds interesting. It’s been helpful to see how everything connects now. Thanks again for the guidance!
F
FatAvocado21
08-19-2023, 06:53 AM #7

Thanks for sharing the details. I managed to resolve the remote desktop issue by changing the port forwarding method. Initially, I had set up port forwarding for a range instead of a specific port, which caused problems. I switched to using a single port—3400 for one device and 3500 for another—and connected via hostname.dnsservice.com:port. The ddns setup worked perfectly. I’m planning to try the VPN connection next since it sounds interesting. It’s been helpful to see how everything connects now. Thanks again for the guidance!

M
MAZ531
Member
164
08-19-2023, 01:48 PM
#8
No worries, enjoy using the VPN. P.S. You likely already have one set up, but when you enable RDP ports, ensure those devices use robust passwords for everyone.
M
MAZ531
08-19-2023, 01:48 PM #8

No worries, enjoy using the VPN. P.S. You likely already have one set up, but when you enable RDP ports, ensure those devices use robust passwords for everyone.

T
TheAdamYT
Member
158
08-23-2023, 05:26 PM
#9
It's clear you're being casual about security. Just remember, simple passwords like numbers or words aren't safe.
T
TheAdamYT
08-23-2023, 05:26 PM #9

It's clear you're being casual about security. Just remember, simple passwords like numbers or words aren't safe.

S
Shibouh
Senior Member
369
08-24-2023, 04:35 PM
#10
Activate NLA to reduce strain when users repeatedly interrupt your RDP connection. Verify both client and host systems run Windows 8 or newer for secure streaming using current protocols. RDP operates with the strongest security options available, though by default it may accept weaker configurations. The platform is often targeted by attacks, so keep software updated to address vulnerabilities. Deploy OpenVPN at the firewall or router level to control traffic flow between segments like RDP and SMB. Only verified devices should connect successfully (especially when certificates are used alongside credentials), allowing a bit more flexibility for trusted sources. Similarly, RDP is generally viewed with skepticism due to its past security issues.
S
Shibouh
08-24-2023, 04:35 PM #10

Activate NLA to reduce strain when users repeatedly interrupt your RDP connection. Verify both client and host systems run Windows 8 or newer for secure streaming using current protocols. RDP operates with the strongest security options available, though by default it may accept weaker configurations. The platform is often targeted by attacks, so keep software updated to address vulnerabilities. Deploy OpenVPN at the firewall or router level to control traffic flow between segments like RDP and SMB. Only verified devices should connect successfully (especially when certificates are used alongside credentials), allowing a bit more flexibility for trusted sources. Similarly, RDP is generally viewed with skepticism due to its past security issues.