<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Terminal Services Client through VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133416#M1062102</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using VPN Client 3.6.3, Set MTU to 576 and away you go! As long as the inbound ACL has 3389 allowed of course.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, in case your wondering, NO I have not spent all this time figuring this out  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Jan 2003 09:23:54 GMT</pubDate>
    <dc:creator>ali-franks</dc:creator>
    <dc:date>2003-01-15T09:23:54Z</dc:date>
    <item>
      <title>Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133409#M1062095</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Having trouble with this one so I wonder if anyone can help please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN establishes from client 3.5.1 to PIX no prob. Can establish mapped drives, browse network etc.&lt;/P&gt;&lt;P&gt;The PIX has an ACL allowing port 3389, the MS default port, to the server. Now, this works OK if you dial an ISP then connect using the Connection Manager, login as normal etc. but will not play using a VPN!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133409#M1062095</guid>
      <dc:creator>ali-franks</dc:creator>
      <dc:date>2020-02-21T06:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133410#M1062096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the information here, I can only guess that your problem might have to do with routing. The first thing you need to check is which interface you are terminating your tunnel on. You need to verify that the PIX is forwarding traffic to the interface where the crypto map exists. You need to ensure that you have specified a route to the remote network with the appropriate next hop. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2002 20:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133410#M1062096</guid>
      <dc:creator>bbaley</dc:creator>
      <dc:date>2002-12-03T20:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133411#M1062097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bill,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN is terminating correctly on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you say "You need to ensure that you have specified a route to the remote network with the appropriate next hop. " do you mean a route inside?&lt;/P&gt;&lt;P&gt;The WTS server is on the same LAN as the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2002 10:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133411#M1062097</guid>
      <dc:creator>ali-franks</dc:creator>
      <dc:date>2002-12-05T10:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133412#M1062098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ali,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Using the same host that is having problems when connecting through the VPN, use the statically translated Public ip address and make sure that Terminal Services is working fine for this host. This is just to make sure that you are having issues only through VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Now make an IPSec connection using the VPN Client and try pinging the Terminal Server and if that works fine then we know that there is IP Connectivity and your routing is looking good. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now from the same host and through the IPSec connection, send ping packets with different packet size and see where the pings start failing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if possible, try to lower the MTU size on the host and then give it a shot. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Dec 2002 08:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133412#M1062098</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2002-12-07T08:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133413#M1062099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.The statically translated address works fine when used with normal dial access to an ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Using the VPN client I can ping the public IP address and the statically assigned&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Pinging the Terminal Server with 992 bytes is no prob but it fails on 993 bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A colleague reckons that to change the MTU on the client involves using the command line and that in turn will change the MTU setting in the registry. Is that correct or am I of down the wrong road?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2002 15:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133413#M1062099</guid>
      <dc:creator>ali-franks</dc:creator>
      <dc:date>2002-12-09T15:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133414#M1062100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ali,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use a software called DrTCP to adjust the MTU.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2002 19:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133414#M1062100</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2002-12-09T19:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133415#M1062101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried that but DrTCP doesn't seem to pick up the Modem Interface on my Xircom PC card for some reason. Tried reboots, start/stop service etc but to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas please?&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2002 10:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133415#M1062101</guid>
      <dc:creator>ali-franks</dc:creator>
      <dc:date>2002-12-11T10:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Terminal Services Client through VPN</title>
      <link>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133416#M1062102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using VPN Client 3.6.3, Set MTU to 576 and away you go! As long as the inbound ACL has 3389 allowed of course.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By the way, in case your wondering, NO I have not spent all this time figuring this out  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ali&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2003 09:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/terminal-services-client-through-vpn/m-p/133416#M1062102</guid>
      <dc:creator>ali-franks</dc:creator>
      <dc:date>2003-01-15T09:23:54Z</dc:date>
    </item>
  </channel>
</rss>

