<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 Blocking Remote Desktop in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756227#M1021422</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;I think you are mistaken&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is always a possiblity.  Mistaken about what?  The client VPN end point?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Jul 2007 15:06:02 GMT</pubDate>
    <dc:creator>TXLombardi</dc:creator>
    <dc:date>2007-07-12T15:06:02Z</dc:date>
    <item>
      <title>PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756217#M1021408</link>
      <description>&lt;P&gt;I have a client who has a PIX 501 in his office.  He has a server at a co-location facility, which also has a PIX.  When the client wants to access his server, he creates a Cisco client VPN connection (not a PIX to PIX VPN).  However, once the VPN is up, he can't access the server.  If any other router is put in place of his local office PIX, he can then create the client VPN and access his server using RDP with no problem.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any idea how he can access his server at the co-location facility without removing his office PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756217#M1021408</guid>
      <dc:creator>TXLombardi</dc:creator>
      <dc:date>2019-03-11T10:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756218#M1021409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does he have any access to the remote network when the pix is in place? Or is it specifically rdp?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 19:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756218#M1021409</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-09T19:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756219#M1021410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;Does he have any access to the remote network when the pix is in place? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, he has no access.  We tried to ping the server and do a tracert.  Nothing.  If the client removes his local PIX and installs a simple router like Linksys, everything works fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 19:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756219#M1021410</guid>
      <dc:creator>TXLombardi</dc:creator>
      <dc:date>2007-07-09T19:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756220#M1021412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any chance of getting the config from the remote pix? Seems more like a nat-traversal issue than a blocking issue on the local pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 20:59:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756220#M1021412</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-09T20:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756221#M1021413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;Any chance of getting the config from the remote pix? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, but I have the local PIX from where the RDP connection is attempting to be made.  Outside and inside IP's have been changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol pptp 1723&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.25.0 VPNclient&lt;/P&gt;&lt;P&gt;name 1.1.1.10 web_ftp-outside&lt;/P&gt;&lt;P&gt;name 192.168.23.6 web_ftp-inside&lt;/P&gt;&lt;P&gt;name 1.1.1.115 email_RDP-outside&lt;/P&gt;&lt;P&gt;name 192.168.23.5 email_RDP-inside&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any &lt;/P&gt;&lt;P&gt;access-list 101 remark VPN Access Policy&lt;/P&gt;&lt;P&gt;access-list 101 permit ip VPNclient 255.255.255.0 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host email_RDP-outside eq smtp &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host email_RDP-outside eq pop3 &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host email_RDP-outside eq 3389 &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host web_ftp-outside eq ftp-data &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host web_ftp-outside eq ftp &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host web_ftp-outside eq www &lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host web_ftp-outside eq https &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_30 permit ip any VPNclient 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list sasco_splitTunnelAcl permit ip 192.168.23.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.23.0 255.255.255.0 VPNclient 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;ip address outside 1.1.1.20 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 192.168.23.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool sascoVPNpool 192.168.25.51-192.168.25.60 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;pdm location email_RDP-outside 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location web_ftp-inside 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location email_RDP-inside 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location VPNclient 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location web_ftp-outside 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) email_RDP-outside email_RDP-inside netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) web_ftp-outside web_ftp-inside netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.17 1&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-l2tp&lt;/P&gt;&lt;P&gt;auth-prompt prompt Enter login authorization &lt;/P&gt;&lt;P&gt;auth-prompt accept Thank you. Access granted. &lt;/P&gt;&lt;P&gt;auth-prompt reject Either get it right or stop trying to hack your way in. &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 30 match address outside_cryptomap_dyn_30&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 30 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication LOCAL &lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup sasco address-pool sascoVPNpool&lt;/P&gt;&lt;P&gt;vpngroup sasco dns-server email_RDP-inside 65.32.1.70&lt;/P&gt;&lt;P&gt;vpngroup sasco wins-server email_RDP-inside&lt;/P&gt;&lt;P&gt;vpngroup sasco default-domain sasco.local&lt;/P&gt;&lt;P&gt;vpngroup sasco split-tunnel sasco_splitTunnelAcl&lt;/P&gt;&lt;P&gt;vpngroup sasco split-dns sasco.local sasco.lcl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 21:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756221#M1021413</guid>
      <dc:creator>TXLombardi</dc:creator>
      <dc:date>2007-07-09T21:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756222#M1021415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Where is the tunnel connection to? Your 501? Have your friend enabl logging on his PIX if he hast already&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffe 6&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have him try to connect and get a sh log from the PIX. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Jul 2007 23:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756222#M1021415</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-09T23:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756223#M1021416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The remote end point for the Cisco client to PIX VPN is the remote PIX not the local.  The local PIX is in a passive role here.  There is no PIX to PIX VPN.  The owner of the remote PIX will not allow a PIX to PIX VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will get the log and post it late Tuesday.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2007 10:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756223#M1021416</guid>
      <dc:creator>TXLombardi</dc:creator>
      <dc:date>2007-07-10T10:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756224#M1021417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check that the remote pix has "isakmp nat-traversal" in the config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2007 12:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756224#M1021417</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-10T12:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756225#M1021418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dont think "isakmp nat-traversal" is relevant here since the tunnel is not terminating on the remote PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also have him do a capture:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://firewalls.ath.cx/viewtopic.php?t=13" target="_blank"&gt;http://firewalls.ath.cx/viewtopic.php?t=13&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 09:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756225#M1021418</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-11T09:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756226#M1021420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JBDanford2002, I think you are mistaken.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From a few posts above-&lt;/P&gt;&lt;P&gt;"The remote end point for the Cisco client to PIX VPN is the remote PIX not the local."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jul 2007 11:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756226#M1021420</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-11T11:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756227#M1021422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;&amp;gt;I think you are mistaken&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is always a possiblity.  Mistaken about what?  The client VPN end point?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2007 15:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756227#M1021422</guid>
      <dc:creator>TXLombardi</dc:creator>
      <dc:date>2007-07-12T15:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756228#M1021424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;TXLombardi, I was referring to JBDanford2002's comment above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He said your vpn client was not terminating on the remote pix.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2007 15:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756228#M1021424</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-12T15:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Blocking Remote Desktop</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756229#M1021426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah, ok. I re-read the first post. I think you are possibly right acomiskey. The option would be to enable "fixup protocol esp-ike". The downer is that you wont be able to terminate any VPNs on your PIX. NAT-T is definitely the way to go. Definitly take a look at the logs to see if you are dropping on IP 50.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2007 22:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-blocking-remote-desktop/m-p/756229#M1021426</guid>
      <dc:creator>JBDanford2002</dc:creator>
      <dc:date>2007-07-12T22:39:33Z</dc:date>
    </item>
  </channel>
</rss>

