<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: RDP Access problem  through ASA5510 FW in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876269#M459477</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please find the report.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# packet-tracer input inside tcp 172.16.48.213 1025 74.94.242.13$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   0.0.0.0         0.0.0.0         outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: inspect-skinny&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 Block_FromASA_ThroughUntangle1 255.255.255.192&lt;/P&gt;&lt;P&gt;  match ip inside Block_FromASA_ThroughUntangle1 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (122.168.191.66 &lt;A href="Interface PAT"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;    translate_hits = 59925, untranslate_hits = 345&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 172.16.48.213/1025 to 122.168.191.66/29284 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 Block_FromASA_ThroughUntangle1 255.255.255.192&lt;/P&gt;&lt;P&gt;  match ip inside Block_FromASA_ThroughUntangle1 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (122.168.191.66 &lt;A href="Interface PAT"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;    translate_hits = 59925, untranslate_hits = 345&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 59535332, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 122.168.191.65 using egress ifc outside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0019.2f8e.c639 hits 29742&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Feb 2012 01:45:59 GMT</pubDate>
    <dc:creator>saroj pradhan</dc:creator>
    <dc:date>2012-02-14T01:45:59Z</dc:date>
    <item>
      <title>RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876265#M459468</link>
      <description>&lt;P&gt;i&amp;nbsp; am&amp;nbsp; using Cisco ASA5510 Firewall&amp;nbsp; in my&amp;nbsp; Network in the distrubition Layer .&lt;/P&gt;&lt;P&gt;Private Range of Network Address&amp;nbsp; use&amp;nbsp; in the Network&amp;nbsp; and PAT&amp;nbsp; at the FW for&amp;nbsp; address translation.&lt;/P&gt;&lt;P&gt;presently&amp;nbsp; encountering an issue&amp;nbsp; the users&amp;nbsp; behind&amp;nbsp; the FW&amp;nbsp; in my network&amp;nbsp; unable to&amp;nbsp; RDP&amp;nbsp; at port 2000&amp;nbsp; presented&amp;nbsp; at the Client Network.&lt;/P&gt;&lt;P&gt;Able to Telnet&amp;nbsp; on port2000 but&amp;nbsp; not RDP .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advice&amp;nbsp; any changes needed at the FW end&amp;nbsp; to&amp;nbsp; get the RDP Access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876265#M459468</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2019-03-11T22:29:12Z</dc:date>
    </item>
    <item>
      <title>RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876266#M459470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We need more information!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where are the clients? On the trusted or untrusted zone&lt;/P&gt;&lt;P&gt;Where is the RDP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post your configuration ( with some changes of course due to security purposes)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876266#M459470</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-14T01:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876267#M459473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My  users  are  behind  the ASA Firewall  in  my Network  and  trying to access the Server  through RDP  the server Location is at USA.&lt;/P&gt;&lt;P&gt;No idea  about  client  environment  but  the RDP  works   in Internet dada card, Through   Checkpoint FW  and  Sonicwall  Firewall .&lt;/P&gt;&lt;P&gt;Enclosed the Config File  of ASA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876267#M459473</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-14T01:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876268#M459475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please provide following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp x.x.x.x (inside_user_Ip) 1025 y.y.y.y(RDP_server_ip) 2000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876268#M459475</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-14T01:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876269#M459477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please find the report.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# packet-tracer input inside tcp 172.16.48.213 1025 74.94.242.13$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   0.0.0.0         0.0.0.0         outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in_1 in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: inspect-skinny&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 Block_FromASA_ThroughUntangle1 255.255.255.192&lt;/P&gt;&lt;P&gt;  match ip inside Block_FromASA_ThroughUntangle1 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (122.168.191.66 &lt;A href="Interface PAT"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;    translate_hits = 59925, untranslate_hits = 345&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 172.16.48.213/1025 to 122.168.191.66/29284 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 Block_FromASA_ThroughUntangle1 255.255.255.192&lt;/P&gt;&lt;P&gt;  match ip inside Block_FromASA_ThroughUntangle1 255.255.255.192 outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (122.168.191.66 &lt;A href="Interface PAT"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;    translate_hits = 59925, untranslate_hits = 345&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 59535332, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: output and adjacency&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop 122.168.191.65 using egress ifc outside&lt;/P&gt;&lt;P&gt;adjacency Active&lt;/P&gt;&lt;P&gt;next-hop mac address 0019.2f8e.c639 hits 29742&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876269#M459477</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-14T01:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876270#M459478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Saroj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;everything looks good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do captures in order to troubleshoot this, captures need it on the inside and outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://analysisandreview.com/cisco/how-to-configure-a-packet-capture-in-the-cisco-asa/"&gt;http://analysisandreview.com/cisco/how-to-configure-a-packet-capture-in-the-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.techrepublic.com/blog/networking/easy-packet-captures-straight-from-the-cisco-asa-firewall/1317"&gt;http://www.techrepublic.com/blog/networking/easy-packet-captures-straight-from-the-cisco-asa-firewall/1317&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876270#M459478</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-14T01:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876271#M459481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have  captured the Log  from the ASA While conncting the RDP Server.&lt;/P&gt;&lt;P&gt;6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 14 2012&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;07:19:39&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;302014&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;74.94.242.139&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.51.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;48312&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teardown TCP connection 59541059 for outside:74.94.242.139/3389 to inside:172.16.51.10/48312 duration 0:00:00 bytes 0 TCP Reset-O&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876271#M459481</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-14T01:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876272#M459482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is all we need.. Reset-O&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A reset packet is comming from the outside, that is why we should create a packet-capture, we should have seen those packets comming from the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connection is being closed by the RDP server!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 02:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876272#M459482</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-14T02:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876273#M459483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As&amp;nbsp; per your&amp;nbsp; instruction&amp;nbsp; I have configured on the ASA the following&amp;nbsp; command to capture packet&amp;nbsp; but&amp;nbsp; no result.&lt;/P&gt;&lt;P&gt;Showing 0 packet captured&amp;nbsp; while trying with RDP&amp;nbsp; On port 2000 ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capin permit tcp host rdp_client_private_ip host server_outside eq 2000&lt;/P&gt;&lt;P&gt;access-list capin permit tcp&amp;nbsp; host server_outside eq 2000 host rdp_client_private_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capout permit tcp host rdp_client_public_ip host server_outside eq 2000&lt;/P&gt;&lt;P&gt;access-list capout permit tcp host server_outside eq 2000 host rdp_client_public_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capin access-list capin interface inside&lt;/P&gt;&lt;P&gt;capture capout access-list capout interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2012 01:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876273#M459483</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-15T01:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876274#M459484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i am unbale&amp;nbsp; to capture&amp;nbsp; log&amp;nbsp; due to performance issue .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please find the report.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# capture capin access-list capin interface inside real-time dum$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warning: using this option with a slow console connection may&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use ctrl-c to terminate real-time capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packets shown.&lt;/P&gt;&lt;P&gt;0 packets not shown due to performance limitations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2012 08:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876274#M459484</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-15T08:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876275#M459485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please find the output of the capture packet from&amp;nbsp; the inside Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# capture capin access-list capin interface inside real-time&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warning: using this option with a slow console connection may&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use ctrl-c to terminate real-time capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 13:50:54.278138 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 13:50:54.592666 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 13:50:54.593902 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 13:50:54.594329 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 13:50:54.594390 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 13:51:20.340390 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 13:51:20.340467 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 13:51:20.657848 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 13:51:23.381877 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 10: 13:51:23.696527 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 11: 13:51:23.697717 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 12: 13:51:23.698495 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 13: 13:51:23.698557 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 14: 13:51:36.024519 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 15: 13:51:36.024595 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 16: 13:51:36.345120 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 17: 13:51:38.761892 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 18: 13:51:39.074260 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 13:51:39.075054 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 20: 13:51:39.075496 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 21: 13:51:39.075557 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 22: 13:52:27.816180 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 23: 13:52:27.816257 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 24: 13:52:28.132561 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25: 13:52:31.949459 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 26: 13:52:32.265367 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 27: 13:52:32.266267 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 28: 13:52:32.267060 [|ip]&lt;/P&gt;&lt;P&gt;&amp;nbsp; 29: 13:52:32.267121 [|ip]&lt;/P&gt;&lt;P&gt;29 packets shown.&lt;/P&gt;&lt;P&gt;0 packets not shown due to performance limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# sh capture capin access-list capin detail&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;82 packets captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i tried to capture&amp;nbsp; from outside interface&amp;nbsp; no data shown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netlink-OS-ASA# capture capout access-list capout interface outside real-time&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warning: using this option with a slow console connection may&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use ctrl-c to terminate real-time capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packets shown.&lt;/P&gt;&lt;P&gt;0 packets not shown due to performance limitations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2012 08:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876275#M459485</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-15T08:34:44Z</dc:date>
    </item>
    <item>
      <title>RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876276#M459486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help me resolved the RDP Issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Feb 2012 13:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876276#M459486</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-15T13:34:16Z</dc:date>
    </item>
    <item>
      <title>RDP Access problem  through ASA5510 FW</title>
      <link>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876277#M459487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please&amp;nbsp; help&amp;nbsp; to get a resolution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ThanKS,&lt;/P&gt;&lt;P&gt;SAROJ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 10:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rdp-access-problem-through-asa5510-fw/m-p/1876277#M459487</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2012-02-16T10:51:19Z</dc:date>
    </item>
  </channel>
</rss>

