| trevor |
04-05-2012 04:26 PM |
Quote:
Originally Posted by acme
(Post 675978)
so, as that is the case, I can feel save about using remote management and screen sharing?
what about the warning against having port 5900 open ever?
|
NAT (in your home router) stops connections that are initiated from outside of your local network from getting to computers that are inside your local network. So if you have NAT (which you do) and don't poke any holes in it, there's no easy way for someone with a VNC client outside of your local network from connecting to your VNC server listening on port 5900. Even when that someone with a VNC client outside of your local network is actually you, and you WANT to connect to the VNC server listening on port 5900.
To actually use VNC from outside your local network to connect to a computer inside your local network, you will have to open holes in the protection offered by NAT. Specifically, this is sometimes done by port forwarding connections to a specific port on the external interface of your router (say, port 5900 for VNC Display number 0) from your router to the computer that you have listening on that port.
That lets you, when you're outside of your LAN, connect via VNC to a computer inside your LAN. However it simultaneously lets anyone else connect to the VNC port on the computer inside of your LAN.
VNC is not a very secure connection, which is why forwarding port 5900 from your router to the computer running VNC server is kinda scary.
That all was general explanation. Now to your specifics...if I'm interpreting you correctly, both the VNC client and the VNC server machines are inside of the same local network. Is that right? It doesn't really matter if they connect over ethernet or WiFi, they're both connected to the same router and they're both inside of the network. So you don't need to set up port forwarding--and don't do it if you don't need to. As mentioned, VNC is insecure. So keep it inside the walled garden of your internal network, keep your wireless security good by using WPA2 on your WiFi so you can't be cracked by someone parked in front of your home or office, and you should (generally) be safe.
Trevor
|