<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 3389 port allowed from some IP's on ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934418#M437527</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we have another problem since the PAT will hit first, try the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; no nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic network obj_any interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may cause loss of connectivty while you do the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 May 2012 18:58:43 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2012-05-08T18:58:43Z</dc:date>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934415#M437523</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to setup an cisco ASA 5505 to only allow certain IP's on port 3389, but i can't get it to work. Maybe some of you experts know why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3)&lt;BR /&gt;!&lt;BR /&gt;hostname cisco-asa&lt;BR /&gt;enable password ** encrypted&lt;BR /&gt;passwd ** encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 95.*.*.* 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network rdpuser-1&lt;BR /&gt;host 46.*.*.*&lt;BR /&gt;object network rdpuser-2&lt;BR /&gt;host 48.*.*.*&lt;BR /&gt;object network rdp-host-pc&lt;BR /&gt;host 192.168.1.20&lt;BR /&gt;object service newRDP&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;object network internal_RDS_NAT&lt;BR /&gt;host 192.168.1.20&lt;BR /&gt;object-group network rdp-group&lt;BR /&gt;network-object object rdpuser-1&lt;BR /&gt;network-object object rdpuser-2&lt;BR /&gt;access-list outside_access_in extended permit object newRDP object-group rdp-group object rdp-host-pc&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network internal_RDS_NAT&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 3389&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 95.*.*.*&lt;BR /&gt;1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;The allowed IP's are setup on user level (rdpuser-1 and rdpuser-2) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still do, I can't connect to the server from any of these IP's...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934415#M437523</guid>
      <dc:creator>Tim Roelands</dc:creator>
      <dc:date>2019-03-11T23:03:14Z</dc:date>
    </item>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934416#M437524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tim, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike here, This is incorrect: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service newRDP&lt;/P&gt;&lt;P&gt;service tcp destination eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please change it to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service newRDP&lt;/P&gt;&lt;P&gt;service tcp &lt;STRONG&gt;source &lt;/STRONG&gt;eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it out and let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 23:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934416#M437524</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-07T23:35:11Z</dc:date>
    </item>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934417#M437525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maykol!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No go after changing the rule. It was a bit of a ride because at first I could not delete the object (before creating a new one), because the object was in use...but after some puzzling, this is what I made from it. But still no go...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname cisco-asa&lt;BR /&gt;enable password ** encrypted&lt;BR /&gt;passwd ** encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.253 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 95.*.*.* 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network rdpuser-1&lt;/P&gt;&lt;P&gt;host 46.*.*.*&lt;BR /&gt;object network rdpuser-2&lt;BR /&gt;host 48.*.*.*&lt;BR /&gt;object network rdp-host-pc&lt;BR /&gt;host 192.168.1.20&lt;BR /&gt;object service newRDP&lt;BR /&gt;service tcp source eq 3389&lt;BR /&gt;object network internal_RDS_NAT&lt;BR /&gt;host 192.168.1.20&lt;BR /&gt;object-group network rdp-group&lt;BR /&gt;network-object object rdpuser-1&lt;BR /&gt;network-object object rdpuser-2&lt;BR /&gt;access-list outside_access_in extended permit object newRDP object-group rdp-group object rdp-host-pc&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network internal_RDS_NAT&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 3389&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 95.97.209.217 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 18:48:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934417#M437525</guid>
      <dc:creator>Tim Roelands</dc:creator>
      <dc:date>2012-05-08T18:48:43Z</dc:date>
    </item>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934418#M437527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now we have another problem since the PAT will hit first, try the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; no nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic network obj_any interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may cause loss of connectivty while you do the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2012 18:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934418#M437527</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-08T18:58:43Z</dc:date>
    </item>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934419#M437529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maykol,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sorry, this is what happened:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco-asa(config)# object network obj_any&lt;/P&gt;&lt;P&gt;cisco-asa(config-network-object)# no nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;cisco-asa(config-network-object)# nat (inside,outside) after-auto source dynamic network obj_any interface&lt;/P&gt;&lt;P&gt;ERROR: network doesn't match an existing object or object-group&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 May 2012 14:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934419#M437529</guid>
      <dc:creator>Tim Roelands</dc:creator>
      <dc:date>2012-05-09T14:12:51Z</dc:date>
    </item>
    <item>
      <title>3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934420#M437531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, there is a network keyword there. I must put it there by mistake. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic obj_any interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There. Try it out. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 May 2012 05:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934420#M437531</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-10T05:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: 3389 port allowed from some IP's on ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934421#M437533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, still no go Maykol....The command works, but I still can't get any connection to de RDS...&lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 May 2012 10:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/3389-port-allowed-from-some-ip-s-on-asa-5505/m-p/1934421#M437533</guid>
      <dc:creator>Tim Roelands</dc:creator>
      <dc:date>2012-05-11T10:11:40Z</dc:date>
    </item>
  </channel>
</rss>

