We have numerous clients that have custom port numbers translated to their Terminal Servers for RDP connection.
I am using a Kali tool, Hydra, to brute force attack a customer RDS server. Normally, with our Sophos, the firewall will detect the very high and unusual username/password attempts and block the connection.
We have the STRICT SECURITY auto policy enabled (we also tested the CLOUD policy) and neither can detect the repeated RDP log attempts.
Can you please help me understand why the Check Point isn’t behaving like our Sophos XGS, blocking the obvious brute force attack?
Here is an example NAT rule that translates the traffic to the customer’s RDS.
Here is a preview of the firewall allowing the many hundred of connections from my Kali hydra attack.