<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - cut through proxy authentication for RDP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426721#M268928</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clientless SSL VPN with the RDP plug-in is viable. It would require Anyconnect Premium licenses though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also do SSL (or IPsec) remote access VPN with access-list tied to the users (or group profile that a set of users are authorized use).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 01 Mar 2014 20:11:44 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-03-01T20:11:44Z</dc:date>
    <item>
      <title>ASA - cut through proxy authentication for RDP?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426717#M268924</link>
      <description>&lt;P&gt;I know how to set this up on a router (dynamic access-list - lock and key)... But, I'm having trouble understanding how to setup OUTSIDE to INSIDE cut through proxy authentication for RDP.&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;/P&gt;&lt;P&gt;OUTSIDE to INSIDE RDP is currently working.&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;/P&gt;&lt;P&gt;I have 2 servers I want RDP open for.. &lt;/P&gt;&lt;P&gt;[*]OUTSIDE 1.1.1.1 to INSIDE 10.10.70.100&lt;/P&gt;&lt;P&gt;[*]OUTSIDE 1.1.1.2 to INSIDE 10.10.50.200&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;/P&gt;&lt;P&gt;What's required for OUTSIDE users&amp;nbsp; to authenticate on the ASA before allowing port 3389 opens? &lt;SPAN style="font-size: 10pt;"&gt;I was hoping for is a way to SSH into this ASA, login with a special user, then have the ASA add a dynamic ACE on the OUTSISE interface to open 3389 for a designated time limit. Is this possible?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Here is my current config.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;[code]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5505&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.10.0.0 LANTraffic&lt;/P&gt;&lt;P&gt;name 10.10.30.0 SALES&lt;/P&gt;&lt;P&gt;name 10.10.40.0 FoodServices&lt;/P&gt;&lt;P&gt;name 10.10.99.0 Management&lt;/P&gt;&lt;P&gt;name 10.10.20.0 Office&lt;/P&gt;&lt;P&gt;name 10.10.80.0 Printshop&lt;/P&gt;&lt;P&gt;name 10.10.60.0 Regional&lt;/P&gt;&lt;P&gt;name 10.10.70.0 Servers&lt;/P&gt;&lt;P&gt;name 10.10.50.0 ShoreTel&lt;/P&gt;&lt;P&gt;name 10.10.100.0 Surveillance&lt;/P&gt;&lt;P&gt;name 10.10.90.0 Wireless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description TO INTERNET&lt;/P&gt;&lt;P&gt; switchport access vlan 11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description TO INSIDE 3560X&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; description Cisco 3560x&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.10.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan11&lt;/P&gt;&lt;P&gt; description Internet Interface&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup OUTSIDE&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 4.2.2.2&lt;/P&gt;&lt;P&gt; domain-name test.local&lt;/P&gt;&lt;P&gt;access-list RDP-INBOUND extended permit tcp any host 1.1.1.1 eq 3389&lt;/P&gt;&lt;P&gt;access-list RDP-INBOUND extended permit tcp any host 1.1.1.2 eq 3389&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging device-id hostname&lt;/P&gt;&lt;P&gt;logging host INSIDE 10.10.70.100&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface OUTSIDE&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 1 interface&lt;/P&gt;&lt;P&gt;nat (INSIDE) 1 LANTraffic 255.255.0.0&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) tcp interface 3389 10.10.70.100 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) tcp 1.1.1.2 3389 10.10.50.200 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group RDP-INBOUND in interface OUTSIDE&lt;/P&gt;&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/P&gt;&lt;P&gt;route INSIDE LANTraffic 255.255.0.0 10.10.1.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http Management 255.255.255.0 INSIDE&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.10.70.100 255.255.255.255 INSIDE&lt;/P&gt;&lt;P&gt;ssh Management 255.255.255.0 INSIDE&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 OUTSIDE&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #006600; font-family: Monaco, 'Courier New', monospace; font-size: 11px; line-height: 18.200000762939453px;" /&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username scott password CNjeKgq88PLZXETE encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:1e9d278ce656f22829809f4c46b04a07&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[/code]&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426717#M268924</guid>
      <dc:creator>scottjsee</dc:creator>
      <dc:date>2019-03-12T03:51:32Z</dc:date>
    </item>
    <item>
      <title>ASA - cut through proxy authentication for RDP?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426718#M268925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're running ASA 8.2(5). In 8.4(2) Cisco added support for what they call Identity Firewall rules. That is, you can make access-lists entries specific to users (or object groups containing users).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's an overview document on this posted &lt;A href="https://community.cisco.com/document/80646/asa-idfw-identity-firewall-step-step-configuration"&gt;here&lt;/A&gt;. It's a bit dated but I believe the only change is that Cisco is now preferring use of the more current Context Directory Agent (CDA) - a free VM they provide - vs. the deprecated AD agent (software service that runs on your DC).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 14:06:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426718#M268925</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-02-28T14:06:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - cut through proxy authentication for RDP?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426719#M268926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seem's as though my current ASA 8.2(5) version does not offer the type of authentication features I'm wishing to implement? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm begining to think the only way to deploy a secure RDP on this 8.2(5) is through the ASA Clientless SSL VPN: RDP Plug-in.. Does that seem accurate? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Feb 2014 20:42:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426719#M268926</guid>
      <dc:creator>scottjsee</dc:creator>
      <dc:date>2014-02-28T20:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - cut through proxy authentication for RDP?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426720#M268927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Scott.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Microsoft RDP protocol could be protected by SSL encapsulation, that Microsoft called as "RD Gateway".&lt;/P&gt;&lt;P&gt;This solution allows you to control access per user/per destination at the same time using SSL for authentication and data protection.&lt;/P&gt;&lt;P&gt;The solution is really scalable.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Mar 2014 13:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426720#M268927</guid>
      <dc:creator>Vasilii Mikhailovskii</dc:creator>
      <dc:date>2014-03-01T13:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - cut through proxy authentication for RDP?</title>
      <link>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426721#M268928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clientless SSL VPN with the RDP plug-in is viable. It would require Anyconnect Premium licenses though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also do SSL (or IPsec) remote access VPN with access-list tied to the users (or group profile that a set of users are authorized use).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Mar 2014 20:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cut-through-proxy-authentication-for-rdp/m-p/2426721#M268928</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-03-01T20:11:44Z</dc:date>
    </item>
  </channel>
</rss>

