<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The ip very seldom changes in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756176#M192845</link>
    <description>&lt;P&gt;The ip very seldom changes but I have no guarantee of a static IP. This one hasn't changed in the year.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Aug 2015 12:58:04 GMT</pubDate>
    <dc:creator>BartTecter</dc:creator>
    <dc:date>2015-08-14T12:58:04Z</dc:date>
    <item>
      <title>Beyond frustration - ASA5506-x  ACL for RDP access</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756166#M192835</link>
      <description>&lt;P&gt;Sorry to post here with what is likely a really stupid question. &amp;nbsp;BUT, I've been banging my head against the wall for the past two weeks. I've read everything I can find and watched several online lessons (almost everything retaining to the 5505)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I have everything setup properly (I'm using the ASDM interface but have also looked at the CLI output) but I am still not able to get through the firewall with an RDP connection to a server. I can connect to the sever from inside so I know that is not the issue. &amp;nbsp;I have attached the sh run output. Could someone please have a look and tell me what I have missed?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Objective: &amp;nbsp;Is to connect from any outside computer to a server who's inside ip is 192.168.10.2. &amp;nbsp;I have defined this as a network object call Server-RDP, &amp;nbsp;I have setup a service called RDP with the correct ports, Nat and ACL entries. &amp;nbsp;The ASA is working fine for all outgoing traffic. &amp;nbsp;ASA inside IP is 192.168.10.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, Bart&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756166#M192835</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2019-03-12T06:25:28Z</dc:date>
    </item>
    <item>
      <title>Bart-The ACL is wrong. You</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756167#M192836</link>
      <description>&lt;P&gt;Bart-&lt;/P&gt;&lt;P&gt;The ACL is wrong. You can remove&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit object RDP any object Server-RDP&amp;nbsp;&lt;/P&gt;&lt;P&gt;and then add&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any object Server-RDP eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 17:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756167#M192836</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-08-13T17:24:04Z</dc:date>
    </item>
    <item>
      <title>Thanks Colin,I have made the</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756168#M192837</link>
      <description>&lt;P&gt;Thanks Colin,&lt;/P&gt;&lt;P&gt;I have made the change you have suggested, (see attached file) but still no luck. &amp;nbsp;any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 19:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756168#M192837</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-13T19:44:00Z</dc:date>
    </item>
    <item>
      <title>Try switching the interfaces</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756169#M192838</link>
      <description>&lt;P&gt;Try switching the interfaces in your NAT statement-&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
nat (outside,inside) static interface service tcp 3389 3389 &lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
nat (&lt;STRONG&gt;inside,outside&lt;/STRONG&gt;) static interface service tcp 3389 3389 &lt;/PRE&gt;</description>
      <pubDate>Thu, 13 Aug 2015 19:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756169#M192838</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-08-13T19:44:01Z</dc:date>
    </item>
    <item>
      <title>Still no luck.   On one level</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756170#M192839</link>
      <description>&lt;P&gt;Still no luck. &amp;nbsp; On one level this seems all so simple but then .... It is very frustrating.&lt;/P&gt;&lt;P&gt;Thanks again Collin. I really appreciate your help with this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 20:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756170#M192839</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-13T20:32:40Z</dc:date>
    </item>
    <item>
      <title>Hmm. Can you post the results</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756171#M192840</link>
      <description>&lt;P&gt;Hmm. Can you post the results of this command?&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 5.6.7.8 8912 192.168.10.2 3389 detail&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 20:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756171#M192840</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-08-13T20:32:41Z</dc:date>
    </item>
    <item>
      <title>Sorry this is a screen grab</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756172#M192841</link>
      <description>&lt;P&gt;Sorry this is a screen grab but the command line interface within asdm&amp;nbsp;will not let me cut and paste text.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 23:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756172#M192841</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-13T23:04:03Z</dc:date>
    </item>
    <item>
      <title>Can you post a "sh nat" from</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756173#M192842</link>
      <description>&lt;P&gt;Can you post a "sh nat" from the firewall.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 13 Aug 2015 23:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756173#M192842</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-13T23:04:04Z</dc:date>
    </item>
    <item>
      <title>Sorry, once again a screen</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756174#M192843</link>
      <description>&lt;P&gt;Sorry, once again a screen capture. But here is the result of the sh&amp;nbsp;nat&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 12:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756174#M192843</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T12:24:01Z</dc:date>
    </item>
    <item>
      <title>There are no hits on your</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756175#M192844</link>
      <description>&lt;P&gt;There are no hits on your static translation which is odd because even though they are both in the same section static should take precedence over dynamic.&lt;/P&gt;&lt;P&gt;I notice your outside interface uses DHCP so how do you know which IP address to use when trying to connect to your server ?&lt;/P&gt;&lt;P&gt;Assuming you do know the public IP of your outside interface can you post -&lt;/P&gt;&lt;P&gt;"packet-tracer input outside tcp 8.8.8.8 12345 &amp;lt;public IP&amp;gt; 3389"&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 12:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756175#M192844</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T12:24:02Z</dc:date>
    </item>
    <item>
      <title>The ip very seldom changes</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756176#M192845</link>
      <description>&lt;P&gt;The ip very seldom changes but I have no guarantee of a static IP. This one hasn't changed in the year.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 12:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756176#M192845</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T12:58:04Z</dc:date>
    </item>
    <item>
      <title>According to the packet</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756177#M192846</link>
      <description>&lt;P&gt;According to the packet-tracer output your firewall is configured correctly ie. the packet is allowed.&lt;/P&gt;&lt;P&gt;Just out of interest can you run "sh nat" again and see if there are any hits next to the static rules, no need to post the output.&lt;/P&gt;&lt;P&gt;If there are, as I say, &amp;nbsp;your configuration looks correct now after the changes suggested by Collin.&lt;/P&gt;&lt;P&gt;Is the default gateway of your server set to the ASA inside interface IP ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 12:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756177#M192846</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T12:58:05Z</dc:date>
    </item>
    <item>
      <title>The server does have internet</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756178#M192847</link>
      <description>&lt;P&gt;The server does&amp;nbsp;have internet access correct (web surfing)? &amp;nbsp;Can you type 'clear xlate' and try access again?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 13:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756178#M192847</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-08-14T13:24:40Z</dc:date>
    </item>
    <item>
      <title>Collin,Yes, the server does</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756179#M192848</link>
      <description>&lt;P&gt;Collin,&lt;/P&gt;&lt;P&gt;Yes, the server does have internet access and can browse google for ex. with no issues. &amp;nbsp;I can connect to the server with RDP internally and have checked that the server firewall will allow outside connections. If I remove the ASA5506 and use a router with port forwarding it works fine.&lt;/P&gt;&lt;P&gt;But, even after all the changes suggested in this thread I can still not connect through the ASA unit.&lt;/P&gt;&lt;P&gt;When I do a packet trace it always drops&amp;nbsp;on the&amp;nbsp;rpf-check &amp;nbsp;and references the nat network object entry.&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 15:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756179#M192848</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T15:23:20Z</dc:date>
    </item>
    <item>
      <title>Jon,The sh nat shows 0</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756180#M192849</link>
      <description>&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;The sh nat shows 0 translated hits and 4 untranslated hits for the 3389 port as well as 6K translated and 300 untranslated hit for the dynamic obj_any interface.&lt;/P&gt;&lt;P&gt;Still not working..&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 15:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756180#M192849</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T15:27:31Z</dc:date>
    </item>
    <item>
      <title>Bart-I just tested and I am</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756181#M192850</link>
      <description>&lt;P&gt;Bart-&lt;/P&gt;&lt;P&gt;I just tested and I am able to telnet to your IP on 3389. How are you testing it?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Collin&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 15:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756181#M192850</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2015-08-14T15:31:47Z</dc:date>
    </item>
    <item>
      <title>When I do a packet trace it</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756182#M192851</link>
      <description>&lt;P&gt;&lt;EM&gt;When I do a packet trace it always drops&amp;nbsp;on the&amp;nbsp;rpf-check &amp;nbsp;and references the nat network object entry.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;It does if you use the private IP of the server which is the wrong IP to use.&lt;/P&gt;&lt;P&gt;When you used the public IP of the server&amp;nbsp;the RPF check was passed and the firewall allowed the packet.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 15:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756182#M192851</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T15:39:33Z</dc:date>
    </item>
    <item>
      <title>CollinI'm using RDP on a</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756183#M192852</link>
      <description>&lt;P&gt;Collin&lt;/P&gt;&lt;P&gt;I'm using RDP on a windows workstation. &amp;nbsp;Both ws and server are using 3389 (I know that is not secure and will change the ports but for now wanted to keep everything simple until I can get it working.&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 16:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756183#M192852</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T16:16:09Z</dc:date>
    </item>
    <item>
      <title>Jon, I'm not sure I</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756184#M192854</link>
      <description>&lt;P&gt;Jon, I'm not sure I understand your comment. &amp;nbsp;With RDP from outside my lan I can only use the public IP connected to the ASA Outside port. &amp;nbsp;The server itself does not have a separate public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 16:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756184#M192854</guid>
      <dc:creator>BartTecter</dc:creator>
      <dc:date>2015-08-14T16:19:27Z</dc:date>
    </item>
    <item>
      <title>What I meant was when you</title>
      <link>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756185#M192856</link>
      <description>&lt;P&gt;What I meant was when you test a packet coming from outside to the public IP on port 3389 your ASA is correctly translating the destination IP to the real server IP and it allows the packet.&lt;/P&gt;&lt;P&gt;You can see that from the packet-tracer output I asked you to run ie. there is no RPF failure.&lt;/P&gt;&lt;P&gt;In terms of testing is your workstation on the outside of the ASA ie. if your workstation is on the same network as the server then this won't work.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 14 Aug 2015 16:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/beyond-frustration-asa5506-x-acl-for-rdp-access/m-p/2756185#M192856</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-14T16:35:32Z</dc:date>
    </item>
  </channel>
</rss>

