Tim Neilen    Books    Now    Quotes


We’ve been moving our clients to using VPN connections (SSL VPN using WatchGuards, specifically) when they need to access their computers via RDP, and don’t have a Remote Desktop Server in place. Not only is opening up port 3389 a major attack vector with no bruteforce protection, but new vulnerabilties such as BlueKeep and BlackSquid don’t even need to authenticate to exploit the RDP protocol.

There have been a couple of instances where clients have reported drop outs and freezing, it only happens for a couple of seconds but is quite an annoyance.

Turns out by default, starting from Remote Desktop Protocol (RDP) 8.0, it will try to use UDP for connections in order provide a better user experience on slow connections. However with with the VPN in the mix, it causes a lot of IP fragmentation which can’t be properly reassembled in time, or at all - leading to drop outs, black screens and freezing.

The work around which we have used with success is to disable the UDP protocol in Remote Desktop. This can be done through the Registry, or Group Policy:


  1. Navigate to HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client.

  2. Create a DWORD named fClientDisableUDP and assign it a value of 1.

Group Policy

  1. Navigate to Computer Configuration > Administration Templates > Windows Components > Remote Desktop Services > Remote Desktop Connection Client.

  2. Set Turn Off UDP On Client to Enabled.