<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Yordon, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860591#M167771</link>
    <description>&lt;P&gt;Hi Yordon,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From the configuration, i could see that you have configured action 'pass' for the concerned traffic from out to in zone, however for in to out zone, I could only see 'inspect' action. This would not work, as the return traffic would not find any session due to pass action. So perform inspect from Out to In for rdp or add Pass action from In to Out zone.&lt;/P&gt;
&lt;P&gt;Also try with &amp;nbsp;'private ip address and port' in the access-list which is matching the traffic in zone-pair as untranslation would occur before zone based match.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
    <pubDate>Sun, 06 Mar 2016 09:43:32 GMT</pubDate>
    <dc:creator>Akshay Rastogi</dc:creator>
    <dc:date>2016-03-06T09:43:32Z</dc:date>
    <item>
      <title>Allowing RDP through ZBF</title>
      <link>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860588#M167768</link>
      <description>ZBF</description>
      <pubDate>Tue, 12 Mar 2019 07:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860588#M167768</guid>
      <dc:creator>Yordan1</dc:creator>
      <dc:date>2019-03-12T07:25:57Z</dc:date>
    </item>
    <item>
      <title>Ok in your other post you did</title>
      <link>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860589#M167769</link>
      <description>&lt;P&gt;Ok in your other post you did not include the&amp;nbsp;&lt;STRONG&gt;RDP_ACCESS&amp;nbsp;&lt;/STRONG&gt;ACL configuration. &amp;nbsp;So you will need to either change the ports in this ACL to 3389, remove it from the&amp;nbsp;&lt;STRONG&gt;RDP_ACCESS_TRAFFIC&amp;nbsp;&lt;/STRONG&gt;class-map, or change the RDP server to listen on port&amp;nbsp;&lt;STRONG&gt;60006.&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp;Your choice.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 05:32:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860589#M167769</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-03-03T05:32:43Z</dc:date>
    </item>
    <item>
      <title>hi</title>
      <link>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860590#M167770</link>
      <description>&lt;P&gt;hi&lt;/P&gt;
&lt;P&gt;i tried, but without success. now i made the config clear (only generated from CCP).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please tell me, what i should do, to reach my internal PC (10.1.1.2 and 10.1.1.3) from outside with RDP. This is the config now:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any SDM_BOOTPC&lt;BR /&gt; match access-group name SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-3&lt;BR /&gt; match access-group 105&lt;BR /&gt; match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--2-1&lt;BR /&gt; match access-group 103&lt;BR /&gt; match protocol user-protocol--2&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-2&lt;BR /&gt; match access-group 104&lt;BR /&gt; match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--2-2&lt;BR /&gt; match access-group 104&lt;BR /&gt; match protocol user-protocol--2&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-1&lt;BR /&gt; match access-group 103&lt;BR /&gt; match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--2-3&lt;BR /&gt; match access-group 105&lt;BR /&gt; match protocol user-protocol--2&lt;BR /&gt;class-map type inspect match-all CCP_SSLVPN&lt;BR /&gt; match access-group 102&lt;BR /&gt;class-map type inspect match-any ccp-skinny-inspect&lt;BR /&gt; match protocol skinny&lt;BR /&gt;class-map type inspect match-any sdm-cls-bootps&lt;BR /&gt; match protocol bootps&lt;BR /&gt;class-map type inspect match-any SDM_WEBVPN&lt;BR /&gt; match access-group name SDM_WEBVPN&lt;BR /&gt;class-map type inspect match-any ccp-h323nxg-inspect&lt;BR /&gt; match protocol h323-nxg&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any ccp-h225ras-inspect&lt;BR /&gt; match protocol h225ras&lt;BR /&gt;class-map type inspect match-any ccp-h323annexe-inspect&lt;BR /&gt; match protocol h323-annexe&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol pptp&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any SDM_SSH&lt;BR /&gt; match access-group name SDM_SSH&lt;BR /&gt;class-map type inspect match-any SDM_HTTPS&lt;BR /&gt; match access-group name SDM_HTTPS&lt;BR /&gt;class-map type inspect match-all SDM_GRE&lt;BR /&gt; match access-group name SDM_GRE&lt;BR /&gt;class-map type inspect match-any SDM_SHELL&lt;BR /&gt; match access-group name SDM_SHELL&lt;BR /&gt;class-map type inspect match-any ccp-h323-inspect&lt;BR /&gt; match protocol h323&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 101&lt;BR /&gt;class-map type inspect match-any ccp-sip-inspect&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect match-any sdm-cls-access&lt;BR /&gt; match class-map SDM_HTTPS&lt;BR /&gt; match class-map SDM_SSH&lt;BR /&gt; match class-map SDM_SHELL&lt;BR /&gt;class-map type inspect match-any SDM_DHCP_CLIENT_PT&lt;BR /&gt; match class-map SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-any CCP_PPTP&lt;BR /&gt; match class-map SDM_GRE&lt;BR /&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;BR /&gt; match class-map SDM_WEBVPN&lt;BR /&gt; match access-group 106&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all sdm-access&lt;BR /&gt; match class-map sdm-cls-access&lt;BR /&gt; match access-group 102&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class class-default&lt;BR /&gt; drop&lt;BR /&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt; class type inspect sdm-nat-user-protocol--1-1&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-nat-user-protocol--2-1&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-nat-user-protocol--1-2&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-nat-user-protocol--2-2&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-nat-user-protocol--1-3&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-nat-user-protocol--2-3&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect CCP_PPTP&lt;BR /&gt; pass&lt;BR /&gt; class class-default&lt;BR /&gt; drop log&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class type inspect SDM_WEBVPN_TRAFFIC&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect sdm-access&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect SDM_DHCP_CLIENT_PT&lt;BR /&gt; pass&lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class class-default&lt;BR /&gt; drop&lt;BR /&gt;policy-map type inspect ccp-sslvpn-pol&lt;BR /&gt; class type inspect CCP_SSLVPN&lt;BR /&gt; pass&lt;BR /&gt; class class-default&lt;BR /&gt; drop&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect sdm-cls-bootps&lt;BR /&gt; pass&lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt; inspect&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt; inspect&lt;BR /&gt; class class-default&lt;BR /&gt; pass&lt;BR /&gt;!&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security zp-in-zone-in-zone source in-zone destination in-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback10&lt;BR /&gt; description $FW_INSIDE$&lt;BR /&gt; ip address 10.2.2.1 255.255.255.0&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt;!&lt;BR /&gt;interface BRI0&lt;BR /&gt; no ip address&lt;BR /&gt; encapsulation hdlc&lt;BR /&gt; shutdown&lt;BR /&gt; isdn termination multidrop&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet5&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet6&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet7&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template10&lt;BR /&gt; description $FW_INSIDE$&lt;BR /&gt; ip unnumbered Loopback10&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt; description INTERNET$FW_OUTSIDE$&lt;BR /&gt; ip address dhcp client-id GigabitEthernet0&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt; ip address 200.200.200.1 255.255.255.0&lt;BR /&gt; arp timeout 0&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description LAN$FW_INSIDE$&lt;BR /&gt; ip address 10.1.1.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly in&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt;!&lt;BR /&gt;ip local pool webvpn-pool 10.2.2.2 10.2.2.250&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 100 interface GigabitEthernet0 overload&lt;BR /&gt;ip nat inside source static tcp 10.1.1.3 3389 interface GigabitEthernet0 60006&lt;BR /&gt;ip nat inside source static udp 10.1.1.3 3389 interface GigabitEthernet0 60006&lt;BR /&gt;ip nat inside source static tcp 10.1.1.4 3389 interface GigabitEthernet0 60007&lt;BR /&gt;ip nat inside source static udp 10.1.1.4 3389 interface GigabitEthernet0 60007&lt;BR /&gt;ip nat inside source static tcp 10.1.1.2 3389 interface GigabitEthernet0 60005&lt;BR /&gt;ip nat inside source static udp 10.1.1.2 3389 interface GigabitEthernet0 60005&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended SDM_BOOTPC&lt;BR /&gt; remark CCP_ACL Category=0&lt;BR /&gt; permit udp any any eq bootpc&lt;BR /&gt;ip access-list extended SDM_GRE&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit gre any any&lt;BR /&gt;ip access-list extended SDM_HTTPS&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 443&lt;BR /&gt;ip access-list extended SDM_SHELL&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq cmd&lt;BR /&gt;ip access-list extended SDM_SSH&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 22&lt;BR /&gt;ip access-list extended SDM_WEBVPN&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 60004&lt;BR /&gt;!&lt;BR /&gt;logging host 10.1.1.2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit ip any any&lt;BR /&gt;access-list 101 remark CCP_ACL Category=128&lt;BR /&gt;access-list 101 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 101 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 102 remark CCP_ACL Category=128&lt;BR /&gt;access-list 102 permit ip any any&lt;BR /&gt;access-list 103 remark CCP_ACL Category=0&lt;BR /&gt;access-list 103 permit ip any host 10.1.1.3&lt;BR /&gt;access-list 104 remark CCP_ACL Category=0&lt;BR /&gt;access-list 104 permit ip any host 10.1.1.4&lt;BR /&gt;access-list 105 remark CCP_ACL Category=0&lt;BR /&gt;access-list 105 permit ip any host 10.1.1.2&lt;BR /&gt;access-list 106 remark CCP_ACL Category=128&lt;BR /&gt;access-list 106 permit ip any host&amp;nbsp;&lt;STRONG&gt;WAN IP ADDRESS&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2016 07:56:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860590#M167770</guid>
      <dc:creator>Yordan1</dc:creator>
      <dc:date>2016-03-06T07:56:23Z</dc:date>
    </item>
    <item>
      <title>Hi Yordon,</title>
      <link>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860591#M167771</link>
      <description>&lt;P&gt;Hi Yordon,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From the configuration, i could see that you have configured action 'pass' for the concerned traffic from out to in zone, however for in to out zone, I could only see 'inspect' action. This would not work, as the return traffic would not find any session due to pass action. So perform inspect from Out to In for rdp or add Pass action from In to Out zone.&lt;/P&gt;
&lt;P&gt;Also try with &amp;nbsp;'private ip address and port' in the access-list which is matching the traffic in zone-pair as untranslation would occur before zone based match.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2016 09:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-rdp-through-zbf/m-p/2860591#M167771</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-03-06T09:43:32Z</dc:date>
    </item>
  </channel>
</rss>

