How to configure router 'port forwarding rule' to remotely access my RDSH server in the office from home, with RX-RDP, RX420(RDP) or RX300 thin client?

How to configure router 'port forwarding rule' to remotely access my RDSH server in the office from home, with RX-RDP, RX420(RDP) or RX300 thin client?


Customers who deploy RDSH servers can access their user sessions remotely via the router port forwarding method. However, this approach can result in security vulnerabilities (port 3389
forwarding) and should be the last option if the customer does not have RD Gateway or VPN infrastructure. The admin should re-enforce a strong password set for accounts to help mitigate
security vulnerability.



Port forwarding maps the port on your router’s IP address (your public IP) to the port and IP address of the RDSH server you want to access. The port forwarding rule intercepts the data traffic heading to your company’s router public IP address and redirects it to the internal RDSH server IP address. This allows NComputing thin clients in a public network to connect to the RDSH server in the private network.

Your IT admin will first setup and enable port forwarding on your organization’s router to allow for Remote Desktop connection outside the organization’s network.

            Please refer to the article below for detailed port forwarding instructions:
Implementation considerations using router port forwarding to access remote RDSH servers
  1. Easy to configure.
  2. Only requires RDSH server address and port.
  3. Works with Dynamic DNS.
  4. Safety depends on the quality of the firewall;
  5. Requires strong user passwords (may be vulnerable to brute force attack).
  6. User session performance may be impacted by latency.