<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling Particular RDP Port ASA 8.6 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enabling-particular-rdp-port-asa-8-6/m-p/2356609#M307692</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration doesnt make sense to me atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that you are simply allowing traffic from behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface to &lt;STRONG&gt;"any"&lt;/STRONG&gt; destination IP address with the destination port TCP/60892. These configurations would not allow any connections from Internet to your internal host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are attempting to connect to some internal host from the external network then you will need the NAT configuration and ACL allowing the traffic on your ASAs external interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To change the default port you would typically configure Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network RDP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 3389 60892&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will need to check the ACL attached to your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see an ACL attached to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface then you should add a rule to that ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE-ACL-NAME&gt; permit tcp any object RDP-SERVER eq 3389&lt;/OUTSIDE-ACL-NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would then need to connect from the external network to your ASAs public IP address with the port TCP/60892 for the connection to be forwarded to the local IP address and port TCP/3389 by the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Dec 2013 16:47:51 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-12-05T16:47:51Z</dc:date>
    <item>
      <title>Enabling Particular RDP Port ASA 8.6</title>
      <link>https://community.cisco.com/t5/network-security/enabling-particular-rdp-port-asa-8-6/m-p/2356608#M307691</link>
      <description>&lt;P&gt;Hi Experts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am very beginneer in ASA &amp;amp; firewalling, i just want to enable RDP port 60892&amp;nbsp; for accesing one server outside what i did is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service rdp&lt;/P&gt;&lt;P&gt;service tcp destination eq 60892 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service NET&lt;/P&gt;&lt;P&gt;service-object object rdp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit object-group NET object INSIDE-LAN any ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is that ok ... &lt;/P&gt;&lt;P&gt;any thing which i m missing ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also how to check if the traffic is getting drop due to some reason .... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enabling-particular-rdp-port-asa-8-6/m-p/2356608#M307691</guid>
      <dc:creator>alap84</dc:creator>
      <dc:date>2019-03-12T03:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling Particular RDP Port ASA 8.6</title>
      <link>https://community.cisco.com/t5/network-security/enabling-particular-rdp-port-asa-8-6/m-p/2356609#M307692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration doesnt make sense to me atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that you are simply allowing traffic from behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface to &lt;STRONG&gt;"any"&lt;/STRONG&gt; destination IP address with the destination port TCP/60892. These configurations would not allow any connections from Internet to your internal host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are attempting to connect to some internal host from the external network then you will need the NAT configuration and ACL allowing the traffic on your ASAs external interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To change the default port you would typically configure Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network RDP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 3389 60892&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will need to check the ACL attached to your &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see an ACL attached to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface then you should add a rule to that ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE-ACL-NAME&gt; permit tcp any object RDP-SERVER eq 3389&lt;/OUTSIDE-ACL-NAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would then need to connect from the external network to your ASAs public IP address with the port TCP/60892 for the connection to be forwarded to the local IP address and port TCP/3389 by the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 16:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enabling-particular-rdp-port-asa-8-6/m-p/2356609#M307692</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T16:47:51Z</dc:date>
    </item>
  </channel>
</rss>

