<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Scott, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065509#M147220</link>
    <description>&lt;P&gt;Hi Scott,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Going with your query, it seems that we need to allow traffic from one subnet to another. This can be done by applying access lists on the required interface and allowing the interesting traffic.&lt;/P&gt;
&lt;P&gt;If you need assistance with that, please draw a topology and let me know which traffic you want to allow.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2017 18:18:30 GMT</pubDate>
    <dc:creator>Pulkit Saxena</dc:creator>
    <dc:date>2017-01-27T18:18:30Z</dc:date>
    <item>
      <title>Rule to allow remote connections from 2 networks</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065508#M147218</link>
      <description>&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Hello!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;I am new to the Cisco ASA world. I do have exp with Cisco Switching and Routing, however, the ASA is a new learning opportunity for me. With that I have a question of Remote Connections through the ASA Firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Environment: Lab Firewalled off from the Corp. LAN with ASA 5525-X. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Corp Network: 10.110.X.X (outside), 10.120.X.X&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Lab Network: 10.110.101.X (Inside)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Remote Users on Corp LAN: 20 (DHCP)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Servers to Attach to in LAB: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Needs:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Since the Corp. LAN is on DHCP, I need to create a rule (s) that allow all Remote Connections to the 10.110.101.X from the 2 Networks (10.110.X.X and 10.120.X.X) through the Firewall to connect to the LAB servers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Hope this makes since. Thanks for your help in Advance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065508#M147218</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2019-03-12T08:50:49Z</dc:date>
    </item>
    <item>
      <title>Hi Scott,</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065509#M147220</link>
      <description>&lt;P&gt;Hi Scott,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Going with your query, it seems that we need to allow traffic from one subnet to another. This can be done by applying access lists on the required interface and allowing the interesting traffic.&lt;/P&gt;
&lt;P&gt;If you need assistance with that, please draw a topology and let me know which traffic you want to allow.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 18:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065509#M147220</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-01-27T18:18:30Z</dc:date>
    </item>
    <item>
      <title>Just adding ACL entries to</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065510#M147221</link>
      <description>&lt;P&gt;Just adding ACL entries to the outside interface allowing 10.110.x.x and 10.120.x.x to 10.110.101.x on a specified port or all ports (IP). &amp;nbsp;depending on what the rest of your network looks like you might also need to establish routing to the 10.110.101.x network .&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 18:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065510#M147221</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-27T18:45:07Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065511#M147223</link>
      <description>&lt;P&gt;Thanks for the response Pulkit! The attached diagram gives a good idea of what I am looking at.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 18:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065511#M147223</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2017-01-27T18:58:45Z</dc:date>
    </item>
    <item>
      <title>Scott,</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065512#M147225</link>
      <description>&lt;P&gt;Scott,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Going with the attached diagram, we need to create an access list to allow the source subnet to the destination server's. We do not need to worry about the return traffic, since ASA being a stateful device will keep a track of it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, since the source subnet's are not directly connected, we also need to ensure that proper routing is there and we should be good.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you have any additional query.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;
&lt;P&gt;Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2017 19:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065512#M147225</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-01-27T19:13:31Z</dc:date>
    </item>
    <item>
      <title>Pulkit,</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065513#M147228</link>
      <description>&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;Pulkit,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="outline: none; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; word-spacing: 0px; margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;I have just gotten to the point where I could test the above and I am getting the below error when attempting to access the PC via RDP from another subnet. Please see below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in 0in 7.5pt 0in;"&gt;&lt;SPAN style="font-family: 'Arial',sans-serif; color: #58585b;"&gt;The message is seen when I attempt an RDP session to 10.190.201.232 from 10.190.80.196. &lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE style="border-collapse: collapse;"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="14" style="width: 10.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="39" style="width: 29.15pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="63" style="width: 47.2pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="10" style="width: 7.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="98" style="width: 73.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="46" style="width: 34.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="106" style="width: 79.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="38" style="width: 28.5pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="210" style="width: 157.65pt; padding: 0in 2.25pt 0in 2.25pt;"&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P style="line-height: normal; text-autospace: none; margin: 2.0pt 0in 2.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Segoe UI',sans-serif; color: black;"&gt;5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mar 02 2017&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14:50:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.190.80.196&amp;nbsp;&amp;nbsp;&amp;nbsp; 64379&amp;nbsp;&amp;nbsp; 10.190.201.232&amp;nbsp;&amp;nbsp; 3389&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:10.190.80.196/64379 dst Deltav:10.190.201.232/3389 denied due to NAT reverse path failure &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I can upload the configuration if need be.&lt;/P&gt;
&lt;P&gt;Any help will be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 19:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065513#M147228</guid>
      <dc:creator>Scott</dc:creator>
      <dc:date>2017-03-02T19:56:52Z</dc:date>
    </item>
    <item>
      <title>Scott,</title>
      <link>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065514#M147231</link>
      <description>&lt;P&gt;Scott,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes, please upload the configuration and packet-tracer output for this setup.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Pulkit&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2017 00:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rule-to-allow-remote-connections-from-2-networks/m-p/3065514#M147231</guid>
      <dc:creator>Pulkit Saxena</dc:creator>
      <dc:date>2017-04-24T00:17:23Z</dc:date>
    </item>
  </channel>
</rss>

