<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static NAT to allow RDP through my firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009903#M400701</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured the actual object yet for the NAT translation?&lt;/P&gt;&lt;P&gt;You would need to configure the object first before applying the object to the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; host&amp;nbsp; 176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 42.199.102.5 service tcp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDPtoMngmt-on-outside permit tcp any object obj-176.128.1.100 eq 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2012 02:08:20 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-08-20T02:08:20Z</dc:date>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009898#M400696</link>
      <description>&lt;P&gt;Please let me preface this by saying I have not worked deep in networking in years and do not know much about firewalls in general.&amp;nbsp; So please do no assume facts not in evidence.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco ASA 5505 running ASA Ver 8.4 and ASDM Ver 6.4.&amp;nbsp; Firewall mode is set to Routed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My goal is very simple.&amp;nbsp; I want to allow RDP from the internet to a management server I have setup in my internal network.&amp;nbsp; I know RDP is TCP port 3389.&amp;nbsp; My internal network is a 176.128.1.x network.&amp;nbsp; My external network is on a 42.199.102.2-6 range.&amp;nbsp; The end-client that is initiating the RDP session could be coming in from any IP address on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've looked through the GUI to try and determine how to configure this, but for the life of me I can't figure this out.&amp;nbsp;&amp;nbsp; I am looking under Configuration &amp;gt; NAT Rules &amp;gt; +Add&amp;nbsp; This is the screen I get to, I just have no idea what data goes in what fields.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="webkit-fake-url://FDAB20F5-A0A3-46A8-9635-7F3C04723867/image.tiff" /&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all constructive assistance is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009898#M400696</guid>
      <dc:creator>wvdarlington</dc:creator>
      <dc:date>2019-03-11T23:43:25Z</dc:date>
    </item>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009899#M400697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the CLI configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that the server is: 176.128.1.100, and you woud like to NAT it to 42.199.102.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; host&amp;nbsp; 176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 42.199.102.5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need to add access-list on the outside interface to allow the RDP access. If you already have an existing ACL on the outside, just add to the existing ACL as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &lt;ACL-NAME-ON-OUTSIDE&gt; permit tcp any object obj-176.128.1.100 eq 3389&lt;/ACL-NAME-ON-OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are sharing the public ip address with other services and servers, then here is the config:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; host&amp;nbsp; 176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 42.199.102.5 service tcp 3389 3389&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 07:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009899#M400697</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-17T07:35:40Z</dc:date>
    </item>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009900#M400698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes this does help.&amp;nbsp; I have an outside IP (42.199102.5) that is dedicated just for the purpose of letting RDP traffic into a single server (176.128.1.100) on my LAN.&amp;nbsp; As such I went with the last option you provided which seems to specificaly allow 3389 in and out.&amp;nbsp; Does this mean I do not need to create an ACL or do I still need to do that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far this ASA is setup only to allow traffic out of my internal network and back in.&amp;nbsp; No VPN, or anything else to this point.&amp;nbsp; My next step was enabling RDP access.&amp;nbsp; So, with that said, as far as I know I have not created an ACL yet.&amp;nbsp; Not sure how I would go about that exactly. I will poke around on the system to try and figure it out, but if you (or anyone else) has any pointers they would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an FYI...while I may be new to this, the IPs I provided are not my real IP addresses.&amp;nbsp; Don't want anyone worrying that I would provide such info on a public forum.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 20:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009900#M400698</guid>
      <dc:creator>wvdarlington</dc:creator>
      <dc:date>2012-08-17T20:36:31Z</dc:date>
    </item>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009901#M400699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even if you configure port specific static translation statement, you still need to create the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you haven't had anything inbound towards your ASA, most probably you don't have an access-list, so this is how you would apply it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual ACL:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL-NAME-ON-OUTSIDE&gt; permit tcp any object obj-176.128.1.100 eq 3389&lt;/ACL-NAME-ON-OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Applying it on outside interface:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group &lt;ACL-NAME-ON-OUTSIDE&gt; in interface outside&lt;/ACL-NAME-ON-OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2012 23:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009901#M400699</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-17T23:08:40Z</dc:date>
    </item>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009902#M400700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried running the first command as specified and received the following error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "access-list &lt;RDPTOMNGMT-ON-OUTSIDE&gt; permit tcp any object obj-176.128.1.100 eq 3389 &lt;/RDPTOMNGMT-ON-OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: specified object &lt;OBJ-176.128.1.100&gt; does not exist&lt;/OBJ-176.128.1.100&gt;&lt;/P&gt;&lt;P&gt;Usage: &lt;/P&gt;&lt;P&gt;Extended access list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE:&amp;nbsp; In looking at the GUI under Network Objects it does in fact look to be created.&amp;nbsp; I am not against deleting what is there and readding via cmd line, but would need direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Aug 2012 14:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009902#M400700</guid>
      <dc:creator>wvdarlington</dc:creator>
      <dc:date>2012-08-19T14:46:59Z</dc:date>
    </item>
    <item>
      <title>Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009903#M400701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured the actual object yet for the NAT translation?&lt;/P&gt;&lt;P&gt;You would need to configure the object first before applying the object to the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; host&amp;nbsp; 176.128.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 42.199.102.5 service tcp 3389 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list RDPtoMngmt-on-outside permit tcp any object obj-176.128.1.100 eq 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 02:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/2009903#M400701</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-20T02:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT to allow RDP through my firewall</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/3759302#M400702</link>
      <description>&lt;P&gt;I have a similar issue but with an extra hop. I have a comcast business modem/router 71.194.1.31 (public) with internal address of 10.1.10.1. My firewall "PIX" outside interface is 10.1.10.3 with all routes going to 10.1.10.1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Ethernet0&lt;BR /&gt;&amp;nbsp;description outside interface&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.1.10.3 255.255.255.0&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Ethernet1&lt;BR /&gt;&amp;nbsp;description inside interface&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.1 255.255.0.0&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.1.10.1 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to figure our how I can route RDP traffic to a server of 10.1.2.243? So I need the public address "71.194.1.31" to NAT to 10.1.2.243 with out affecting anything else. My PIX does not support PAT, its old.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RDP 3389 - 71.194.1.31 "public" --&amp;gt; 10.1.10.3 "PIX" --&amp;gt; 10.1.2.243 "server"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Dec 2018 22:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-allow-rdp-through-my-firewall/m-p/3759302#M400702</guid>
      <dc:creator>cljennings25</dc:creator>
      <dc:date>2018-12-06T22:58:05Z</dc:date>
    </item>
  </channel>
</rss>

