SlideShare a Scribd company logo
1 of 1
Download to read offline
How To – Allow access of VNC server hosted on the
                            Internet from a specific LAN IP address



Assumption:
  1. LAN IP address Range: 10.10.10.20 – 10.10.10.50
  2. Allow access of VNC server only from 10.10.10.20 and block access from rest of the
  LAN IP addresses.

   To allow access of VNC server from 10.10.10.20 and block access from rest of the LAN IP
   addresses, we have to drop the entire traffic from LAN to VNC server while allow VNC
   traffic only from the specific host.

   For this, create below given two firewall rules with the following parameters:

   Note: Firewall Rule 1 should always precede Firewall rule 2

   Rule 1. Create firewall rule to allow access from IP address 10.10.10.20


           Parameters                  Value
           Source                      Zone - LAN
                                       Host – 10.10.10.20
           Destination                 Zone - WAN
                                       Host – VNC Server’s IP Address
           Services/Service Group      VNC services (if custom port for server)
           Apply Schedule              All the Time
           Action                      Accept
           Apply Source NAT            MASQ



   Rule 2. Create firewall to drop the traffic from LAN to VNC server


           Parameters                  Value
                                       Zone - LAN
           Source
                                       Host - Any Host
                                       Zone – WAN
           Destination
                                       Host – VNC Server’s IP Address
           Services/Service Group      VNC Services (if custom port for server)
           Apply Schedule              All the Time
           Action                      Drop



   Document version – 1.0-25/08/2007

More Related Content

Viewers also liked

Circulaire Economie: de logistiek keten in beeld
Circulaire Economie: de logistiek keten in beeldCirculaire Economie: de logistiek keten in beeld
Circulaire Economie: de logistiek keten in beeldProjectburoDeLaat
 
Resumen, "Informe de comercio exterior tercer trimestre de 2013"
Resumen, "Informe de comercio exterior tercer trimestre de 2013"Resumen, "Informe de comercio exterior tercer trimestre de 2013"
Resumen, "Informe de comercio exterior tercer trimestre de 2013"Ángel Gómez Díaz
 
Profili - Ricerca e Selezione
Profili - Ricerca e SelezioneProfili - Ricerca e Selezione
Profili - Ricerca e SelezioneAndrea Merlo
 
O movimento pontalense de cidadania em parceria com a setur
O movimento pontalense de cidadania em parceria com a seturO movimento pontalense de cidadania em parceria com a setur
O movimento pontalense de cidadania em parceria com a seturGuy Valerio Barros dos Santos
 
Hito 2
Hito 2Hito 2
Hito 2linkdv
 
Res me 07-14
Res me 07-14Res me 07-14
Res me 07-14EPRE
 
Ejercicio 12 word articulo (1)
Ejercicio 12 word articulo (1)Ejercicio 12 word articulo (1)
Ejercicio 12 word articulo (1)danibrito10051998
 
συνέντευξη ελένης πίσπα
συνέντευξη ελένης πίσπασυνέντευξη ελένης πίσπα
συνέντευξη ελένης πίσπαstatsakiri
 
Avaliação do software educativo adri
Avaliação do software educativo adriAvaliação do software educativo adri
Avaliação do software educativo adriadrianadryka
 

Viewers also liked (10)

Circulaire Economie: de logistiek keten in beeld
Circulaire Economie: de logistiek keten in beeldCirculaire Economie: de logistiek keten in beeld
Circulaire Economie: de logistiek keten in beeld
 
Resumen, "Informe de comercio exterior tercer trimestre de 2013"
Resumen, "Informe de comercio exterior tercer trimestre de 2013"Resumen, "Informe de comercio exterior tercer trimestre de 2013"
Resumen, "Informe de comercio exterior tercer trimestre de 2013"
 
Olimpiadas2008
Olimpiadas2008Olimpiadas2008
Olimpiadas2008
 
Profili - Ricerca e Selezione
Profili - Ricerca e SelezioneProfili - Ricerca e Selezione
Profili - Ricerca e Selezione
 
O movimento pontalense de cidadania em parceria com a setur
O movimento pontalense de cidadania em parceria com a seturO movimento pontalense de cidadania em parceria com a setur
O movimento pontalense de cidadania em parceria com a setur
 
Hito 2
Hito 2Hito 2
Hito 2
 
Res me 07-14
Res me 07-14Res me 07-14
Res me 07-14
 
Ejercicio 12 word articulo (1)
Ejercicio 12 word articulo (1)Ejercicio 12 word articulo (1)
Ejercicio 12 word articulo (1)
 
συνέντευξη ελένης πίσπα
συνέντευξη ελένης πίσπασυνέντευξη ελένης πίσπα
συνέντευξη ελένης πίσπα
 
Avaliação do software educativo adri
Avaliação do software educativo adriAvaliação do software educativo adri
Avaliação do software educativo adri
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

How to -_allow_access_of_vnc_server_hosted_on_the_internet_from_a_specific_lan_ip_address

  • 1. How To – Allow access of VNC server hosted on the Internet from a specific LAN IP address Assumption: 1. LAN IP address Range: 10.10.10.20 – 10.10.10.50 2. Allow access of VNC server only from 10.10.10.20 and block access from rest of the LAN IP addresses. To allow access of VNC server from 10.10.10.20 and block access from rest of the LAN IP addresses, we have to drop the entire traffic from LAN to VNC server while allow VNC traffic only from the specific host. For this, create below given two firewall rules with the following parameters: Note: Firewall Rule 1 should always precede Firewall rule 2 Rule 1. Create firewall rule to allow access from IP address 10.10.10.20 Parameters Value Source Zone - LAN Host – 10.10.10.20 Destination Zone - WAN Host – VNC Server’s IP Address Services/Service Group VNC services (if custom port for server) Apply Schedule All the Time Action Accept Apply Source NAT MASQ Rule 2. Create firewall to drop the traffic from LAN to VNC server Parameters Value Zone - LAN Source Host - Any Host Zone – WAN Destination Host – VNC Server’s IP Address Services/Service Group VNC Services (if custom port for server) Apply Schedule All the Time Action Drop Document version – 1.0-25/08/2007