This is a followup from an earlier post about Wireguard VPNs, but it got me wanting to understand better why some things are considered best practice and others aren't.
The recommended approach for RDP is to use a VPN, and then RDP over that. Makes perfect sense. Wireguard is great for almost everything I need, but I have one scenario where it's a little problematic.
So I'm curious as to what the security implications of the following possible setup might be?
- Perimeter firewall appliance forwards a non-standard port to 3389 on internal RDP host.
- Perimeter firewall appliance drops all external connection attempts to the exposed port, except for known trusted public IPs.
- RDP host requires NLA.
- RDP host has account lock-out policy.
The consensus on Google and @michaelmurfy agree that it's not a preferred method, but I'm yet to find a full explanation of exactly why not.
I'm not looking for suggestions for alternatives (I know what they are), just a better understanding of the above.
Thanks
EDIT: 4000th post!