<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Deploying an RODC in a Perimeter Network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869651#M491877</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do thank u.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Dec 2011 11:39:11 GMT</pubDate>
    <dc:creator>jamesfick</dc:creator>
    <dc:date>2011-12-14T11:39:11Z</dc:date>
    <item>
      <title>Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869646#M491872</link>
      <description>&lt;P&gt;We need to deploy a RODC in a perimeter network and allow replication via IPsec through our ASA from the DC.&amp;nbsp; Was wondering if anyone here has done this and if so could you share with me what worked and didn't work.&amp;nbsp; We are using several Microsoft documents to do this deployment but none of the documents can agree on what ports are needed to be opened on the ASA to allow this traffic through, and from which direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or advice would be greatly appreciated.&amp;nbsp; Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jim&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869646#M491872</guid>
      <dc:creator>jamesfick</dc:creator>
      <dc:date>2019-03-11T21:58:29Z</dc:date>
    </item>
    <item>
      <title>Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869647#M491873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RODC as in Read-Only Domain Controller? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see so many deployment guides on google as well.&amp;nbsp; Best thing to do is watch the logs on the ASA and look for denied packets due to access-list message and selectively open ports for those that are blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://forums.techarena.in/active-directory/1303925.htm"&gt;http://forums.techarena.in/active-directory/1303925.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable logging on the ASA:&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;loggin on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x (where x.x.x.x is the iP address of RODC)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 22:01:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869647#M491873</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-12-08T22:01:18Z</dc:date>
    </item>
    <item>
      <title>Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869648#M491874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been doing this exercise during this week.&lt;/P&gt;&lt;P&gt;I have used this document:&lt;/P&gt;&lt;P&gt;&lt;A href="http://technet.microsoft.com/en-us/library/dd728028(WS.10).aspx"&gt;http://technet.microsoft.com/en-us/library/dd728028(WS.10).aspx&lt;/A&gt; - Required communication ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also, required communication on 135-139 (udp i tcp) and 80 (tcp) toward CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything seems to be working with this setup ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It all has been done on one ASA (from DMZ to trusted server network).&lt;/P&gt;&lt;P&gt;But if you use IPSec, I suppose that IPsec is created from ASA (not from Windows server), so port requirements should be same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2011 09:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869648#M491874</guid>
      <dc:creator>Pavel Pokorny</dc:creator>
      <dc:date>2011-12-09T09:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869649#M491875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the info, I will look over the document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;James Fick&lt;/P&gt;&lt;P&gt;Security Engineer&lt;/P&gt;&lt;P&gt;2501 Jolly Road, Suite 180&lt;/P&gt;&lt;P&gt;Okemos, MI 48917&lt;/P&gt;&lt;P&gt;Tel: 517-324-8304&lt;/P&gt;&lt;P&gt;Fax: 517-324-7364&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="Description: MPHI_logo_102_2607 111709.JPG"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;www.mphi.org&lt;&gt;&lt;/&gt;&lt;/P&gt;&lt;P&gt;Working with You to Promote Health&lt;/P&gt;&lt;P&gt;&lt;A href="Description: MPHI 2 color wave.jpg"&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Dec 2011 13:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869649#M491875</guid>
      <dc:creator>jamesfick</dc:creator>
      <dc:date>2011-12-13T13:41:41Z</dc:date>
    </item>
    <item>
      <title>Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869650#M491876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good work Kureli....Deserves a high 5!!&amp;nbsp;&amp;nbsp; James, please rate the query and mark it as answered.&amp;nbsp;&amp;nbsp; Regards,&amp;nbsp; Ankur thukral&amp;nbsp; Community Manager: Security and VPN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 10:53:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869650#M491876</guid>
      <dc:creator>athukral</dc:creator>
      <dc:date>2011-12-14T10:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying an RODC in a Perimeter Network</title>
      <link>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869651#M491877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do thank u.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Dec 2011 11:39:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deploying-an-rodc-in-a-perimeter-network/m-p/1869651#M491877</guid>
      <dc:creator>jamesfick</dc:creator>
      <dc:date>2011-12-14T11:39:11Z</dc:date>
    </item>
  </channel>
</rss>

