One is to change your RDP port to stop naive attempts. This has to be done in the system registry, so you must be extremely careful . A false move here could stop your VDS in its tracks.
- Connect to your server over RDP or VNC. Click the "start" button, type "regedit" into the search box, and press enter.
- Navigate to this key:
Code: Select all
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber
- In the right-hand pane, double-click "PortNumber" and select "Decimal". In the "Value data" box, enter your desired port. It is usually best to use an obscure port that no other services will be using. For example, you could choose "39122".
- Click OK, then close the registry editor.
- Open your NFO control panel and click the "Firewall" tab.
- Create an "accept" rule following this format. This rule will be looked at first by the firewall system.
- In the provided box, enter the IP addresses that you wish to allow to connect to your VDS, bypassing any later blocking filters. You can find your own external IP here.
- Create a second filter to "block" other traffic, like this:
- For the type of packet to block, select "tcp". For the port, choose the current RDP port (3389, if you haven't changed it; otherwise, whatever you changed it to).
- Click "Submit filter changes".
- Create a new block rule following these specifications for FTP.
- Click "Submit filter changes".