<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firepower 1010 cannot RDP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728467#M1095390</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I have setup VPN according to these instructions:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001682" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001682&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I have the default rule (Inside Zone Any Any to Outside Zone Any Any = Trust)&lt;/P&gt;&lt;P&gt;I have a just in case rule (Inside Zone Any Any to Inside Zone Any Any = Trust)&lt;/P&gt;&lt;P&gt;When I VPN in successfully and try to RDP to any PC’s on the local LAN (192.168.1.0/24) I cannot connect nor can I ping any of the internal IP addresses.&lt;/P&gt;&lt;P&gt;My VPN address is 192.168.1.250/24&lt;/P&gt;&lt;P&gt;What can I be missing?&lt;/P&gt;&lt;P&gt;Thank you for any insight,&lt;/P&gt;&lt;P&gt;JJ&lt;/P&gt;</description>
    <pubDate>Sat, 26 Nov 2022 18:08:57 GMT</pubDate>
    <dc:creator>jjevans1</dc:creator>
    <dc:date>2022-11-26T18:08:57Z</dc:date>
    <item>
      <title>Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728467#M1095390</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I have setup VPN according to these instructions:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001682" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001682&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I have the default rule (Inside Zone Any Any to Outside Zone Any Any = Trust)&lt;/P&gt;&lt;P&gt;I have a just in case rule (Inside Zone Any Any to Inside Zone Any Any = Trust)&lt;/P&gt;&lt;P&gt;When I VPN in successfully and try to RDP to any PC’s on the local LAN (192.168.1.0/24) I cannot connect nor can I ping any of the internal IP addresses.&lt;/P&gt;&lt;P&gt;My VPN address is 192.168.1.250/24&lt;/P&gt;&lt;P&gt;What can I be missing?&lt;/P&gt;&lt;P&gt;Thank you for any insight,&lt;/P&gt;&lt;P&gt;JJ&lt;/P&gt;</description>
      <pubDate>Sat, 26 Nov 2022 18:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728467#M1095390</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-26T18:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728469#M1095391</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; you probably need a NAT exemption rule to ensure your traffic from the internal network the RAVPN network is not unintentially translated. Example:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nat exemption fdm.PNG" style="width: 618px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/169131iA47DC4284027420B/image-size/large?v=v2&amp;amp;px=999" role="button" title="nat exemption fdm.PNG" alt="nat exemption fdm.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If that is not the case, please run packet-tracer from the CLI to simulate the traffic flow, provide the output for review.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Nov 2022 18:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728469#M1095391</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-26T18:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728600#M1095399</link>
      <description>&lt;P&gt;Thank you for your example it was very helpful. This issue I had was it will only accept a network under: IPv4 Split Tunneling Networks. I tried to make a range but it would only allow me to add a network not a range. I was hoping that would work since my VPN range is just a couple of IP’s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN Pool range object: 192.168.1.250-.254&lt;/P&gt;&lt;P&gt;VPN Pool to: 192.168.1.250 - 192.168.1.254&lt;/P&gt;&lt;P&gt;Created NAT Exception Rule for VPN Pool according to your example.&lt;/P&gt;&lt;P&gt;I can ping the inside PC when connected to VPN but not RDP to that PC. I can RDP internally just not through VPN.&lt;/P&gt;&lt;P&gt;I ran packet tracer and it looks like everything it is allowed?? Output is attached.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer input inside icmp 192.168.1.250 8 0 192.168.1.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.1.250 (VPN Pool)&lt;/P&gt;&lt;P&gt;192.168.1.5 (PC on Eth1/2 VLAN 1)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Anything else I can try or is there something I am not doing correctly?&lt;/P&gt;&lt;P&gt;Thank you for your insight,&lt;/P&gt;&lt;P&gt;JJ&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728600#M1095399</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T14:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728606#M1095400</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; if you notice the packet-tracer output confirms the input and output interfaces are both "inside", which is technically accurate (because they overlap) but not what you want. Don't use the same network for the VPN pool, use another separate network that isn't the inside network, i.e. 192.168.2.0/24. You can then create a network object as 192.168.1.0/24 that represents the inside network and reference this in the split-tunnel configuration. Use these 2 unique networks in the NAT exemption rules.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728606#M1095400</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-27T14:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728607#M1095401</link>
      <description>&lt;P&gt;192.168.1.250 (VPN Pool)&lt;/P&gt;&lt;P&gt;192.168.1.5 (PC on Eth1/2 VLAN 1)&lt;BR /&gt;this not work at all,&amp;nbsp;&lt;BR /&gt;the VPN pool must have different subnet than Inside hosts,&amp;nbsp;&lt;BR /&gt;the VPN Pool IP will add to route table as connect direct via OUT not IN interface.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;this is your issue I think&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 14:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728607#M1095401</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T14:13:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728619#M1095405</link>
      <description>&lt;P&gt;Thank you all for your insight it is really appreciated. I have done the following:&lt;/P&gt;&lt;P&gt;Created New VPN Pool Network: 192.168.2.0/24 – Deleted the old&lt;/P&gt;&lt;P&gt;Added both Internal and VPN Pool to Group Policy and NAT Exempt.&lt;/P&gt;&lt;P&gt;Created two NAT exception rules: one for Internal Network and one for VPN Pool.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;Ran packet tracer&lt;STRONG&gt;: &lt;/STRONG&gt;packet-tracer input inside icmp 192.168.2.1 8 0 192.168.1.5&lt;/P&gt;&lt;P&gt;VPN Client = 192.168.2.1/24 Gateway of: 192.168.2.2&lt;/P&gt;&lt;P&gt;192.168.1.5 (PC on Eth1/2 VLAN 1)&lt;/P&gt;&lt;P&gt;Packet tracer shows allowed?&lt;/P&gt;&lt;P&gt;I cannot ping PC on inside. I feel like everything is in order and I am close but just missing one thing? I included snapshots to assist.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 15:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728619#M1095405</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T15:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728621#M1095406</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; the AnyConnect VPN network is on the OUTSIDE, not inside. So your packet-tracer is incorrect, the source interface would be OUTSIDE if the source is 192.168.2.0/24&lt;/P&gt;
&lt;P&gt;Your split-tunnel is incorrect, you need to &lt;EM&gt;&lt;STRONG&gt;allow&lt;/STRONG&gt; &lt;/EM&gt;the internal network (192.168.1.0/24)&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 15:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728621#M1095406</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-27T15:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728622#M1095407</link>
      <description>&lt;P&gt;waiting your new packet-tracer after you change the interface from inside to outside,&amp;nbsp;&lt;BR /&gt;share packet-tracer here.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 15:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728622#M1095407</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T15:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728624#M1095408</link>
      <description>&lt;P&gt;Thank you all,&lt;/P&gt;&lt;P&gt;Changed the Split Tunneling to Allow. Nice catch! Different then on the PeteNetLive example.&lt;/P&gt;&lt;P&gt;Ran new packet trace which is attached.&lt;/P&gt;&lt;P&gt;It looks like the packet is dropped by the default rule on Phase 4. So I think I have to create an Access Control Rule for the VPN Traffic allowing ICMP and RDP???&lt;/P&gt;&lt;P&gt;I really appreciate your patience and insight.&lt;/P&gt;&lt;P&gt;JJ&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 15:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728624#M1095408</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T15:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728626#M1095409</link>
      <description>&lt;P&gt;No need any ACL,&amp;nbsp;&lt;BR /&gt;now use anyconnect user and ping inside and access RDP, all I see is OK now.&amp;nbsp;&lt;BR /&gt;try and share result.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 15:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728626#M1095409</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T15:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728630#M1095410</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; your Access Control Policy is also incorrect, you don't have a rule from outside to inside.&lt;/P&gt;
&lt;P&gt;You need to permit from outside (192.168.2.0/24) to inside (192.168.1.0/24) aswell as the rule from inside (192.168.1.0/24 to outside (192.168.2.0/24).&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; you do need Access Control rules on FTD, VPN traffic is not permitted as default unlike the ASA.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:01:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728630#M1095410</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-27T16:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728631#M1095411</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:02:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728631#M1095411</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T16:02:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728633#M1095412</link>
      <description>&lt;P&gt;AnyConnect User: 192.168.2.1&lt;/P&gt;&lt;P&gt;Cannot ping PC on inside: 192.168.1.5 (PC) or 192.168.1.1 (Inside interface VLAN 1)&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728633#M1095412</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T16:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728637#M1095413</link>
      <description>&lt;P&gt;Created two new Access Rules: Allow VPN IN: Outside to Inside and Allow VPN Out: Inside to Outside.&lt;/P&gt;&lt;P&gt;Looks like ICMP was dropped in Phase 8 due to WEBVPN SVC in packet trace&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728637#M1095413</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T16:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728638#M1095414</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; are you actually connected to the VPN on 192.168.2.1? If so use an IP address in the VPN pool that is not in use and try packet-tracer again - "packet-tracer input outside icmp 192.168.2.&lt;STRONG&gt;22&lt;/STRONG&gt; 8 0 192.168.1.5" or just generate real traffic.&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:26:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728638#M1095414</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-27T16:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728639#M1095415</link>
      <description>&lt;P&gt;totally right since your packet reach phase 8 then there is no issue except&amp;nbsp;&lt;BR /&gt;in packet-tracer you must not use anyconnect active user IP&lt;BR /&gt;so as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;mention change IP or use real anyconnect&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728639#M1095415</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-27T16:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728641#M1095416</link>
      <description>&lt;P&gt;Attached is new packet tracer from 192.168.2.22. I have a test machine that is connected to the VPN. It’s IP address is: 192.168.2.2/24 and it not able to ping 192.168.1.5 (PC)&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728641#M1095416</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T16:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728642#M1095417</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1296488"&gt;@jjevans1&lt;/a&gt; packet-tracer confirms it should now work, is there a local firewall on the PC blocking the ping?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 16:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728642#M1095417</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-27T16:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 1010 cannot RDP</title>
      <link>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728645#M1095418</link>
      <description>&lt;P&gt;I rebooted the inside PC. There was some network connection conflict with all the changes I made in the FDM on that PC. I am now able to ping and RDP to is successfully. Your expertise really makes this community a great place. Thank you for all your insight. I have really learned a lot with your assistance. Thank you so much!&lt;/P&gt;</description>
      <pubDate>Sun, 27 Nov 2022 17:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-1010-cannot-rdp/m-p/4728645#M1095418</guid>
      <dc:creator>jjevans1</dc:creator>
      <dc:date>2022-11-27T17:04:00Z</dc:date>
    </item>
  </channel>
</rss>

