<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5510 and RDP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790378#M532067</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Certainly seems like is not the ASA which is dropping them &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have time for some capturing? I'll be online for a couple of hours so I can check them....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture out interface outside1 match tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;capture in interface inside1 match tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to connect via RDP, once it fails, go ahead and do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap out &lt;/P&gt;&lt;P&gt;show cap in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Copy the output and paste it here, feel free to mask the IPs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Sep 2011 02:08:03 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-09-01T02:08:03Z</dc:date>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790369#M532046</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Recently implemented an ASA5510 and as a total noob on this device I cannot setup RDP access. I've browsed these and other forums and tried all the suggestions that I've been able to find and still no luck. Any help from those of you with more experience would greatly be appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my running config. I have a spare external static ip that i can use 24.xx.xx.57, but would prefer to use the IP of the outside1 interface 24.xx.xx.53. I need access to 3 different machines and was thinking of using ports 3388, 3389 and 3390.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5510&lt;/P&gt;&lt;P&gt;enable password xxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 24.xx.xx.53 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.xx.xx.1 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif inside1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.30.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.40.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network LV_SERVERS&lt;/P&gt;&lt;P&gt; network-object host 8.xx.xx.30&lt;/P&gt;&lt;P&gt; network-object host 8.xx.xx.32&lt;/P&gt;&lt;P&gt; network-object host 8.xx.xx.33&lt;/P&gt;&lt;P&gt; network-object host 8.xx.xx.37&lt;/P&gt;&lt;P&gt; network-object host 8.xx.xx.39&lt;/P&gt;&lt;P&gt;object-group network SQPEZZ_NETWORK&lt;/P&gt;&lt;P&gt; network-object 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside2_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside2_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside2_access_out extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list outside1_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside2_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside2_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside2_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_in extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list outside2_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside1_access_out extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list VPN-TO-LV extended permit ip object-group SQPEZZ_NETWORK object-group LV_SERVERS &lt;/P&gt;&lt;P&gt;access-list IPSEC-TO-LV extended permit ip host 24.xx.xx.56 object-group LV_SERVERS &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside1 1500&lt;/P&gt;&lt;P&gt;mtu inside2 1500&lt;/P&gt;&lt;P&gt;mtu outside2 1500&lt;/P&gt;&lt;P&gt;mtu outside1 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside2) 1 interface&lt;/P&gt;&lt;P&gt;global (outside1) 1 interface&lt;/P&gt;&lt;P&gt;global (outside1) 2 24.xx.xx.56&lt;/P&gt;&lt;P&gt;nat (inside1) 1 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside2) 2 access-list VPN-TO-LV&lt;/P&gt;&lt;P&gt;nat (inside2) 1 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside1,inside2) 192.168.30.0 192.168.30.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside2,inside1) 192.168.40.0 192.168.40.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group inside1_access_in in interface inside1&lt;/P&gt;&lt;P&gt;access-group inside1_access_out out interface inside1&lt;/P&gt;&lt;P&gt;access-group inside2_access_in in interface inside2&lt;/P&gt;&lt;P&gt;access-group inside2_access_out out interface inside2&lt;/P&gt;&lt;P&gt;access-group outside2_access_in in interface outside2&lt;/P&gt;&lt;P&gt;access-group outside1_access_out out interface outside1&lt;/P&gt;&lt;P&gt;route outside1 0.0.0.0 0.0.0.0 24.xx.xx.49 1&lt;/P&gt;&lt;P&gt;route outside2 10.xx.xx.0 255.255.255.0 172.xx.xx.2 1&lt;/P&gt;&lt;P&gt;route outside2 10.xx.xx.0 255.255.255.0 172.xx.xx.2 1&lt;/P&gt;&lt;P&gt;route outside2 10.xx.xx.0 255.255.255.0 172.xx.xx.2 1&lt;/P&gt;&lt;P&gt;route outside2 172.xx.xx.0 255.255.255.0 172.xx.xx.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.30.0 255.255.255.0 inside1&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 inside2&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 1 match address IPSEC-TO-LV&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 1 set peer 4.xx.xx.48 &lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 1 set transform-set ESP-AES-256-SHA&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 1 set security-association lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 1 set security-association lifetime kilobytes 10000&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP interface outside1&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside1&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 192.168.40.0 255.255.255.0 inside2&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.40.0 255.255.255.0 inside2&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.5 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.30.30-192.168.30.120 inside1&lt;/P&gt;&lt;P&gt;dhcpd dns 10.xx.xx.170 10.xx.xx.170 interface inside1&lt;/P&gt;&lt;P&gt;dhcpd enable inside1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.40.15-192.168.40.100 inside2&lt;/P&gt;&lt;P&gt;dhcpd dns 10.xx.xx.170 10.xx.xx.170 interface inside2&lt;/P&gt;&lt;P&gt;dhcpd enable inside2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username xxx password xxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 4.xx.xx.48 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 4.xx.xx.48 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790369#M532046</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2019-03-11T21:19:28Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790370#M532049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 23:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790370#M532049</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-08-31T23:53:22Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790371#M532052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've reviewed that documentation, but can't make heads or tails of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand the 20.1.1.10 external ip address and the 172.16.11.10 internal ip but I get lost with the 209.165.200.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have only an external ip address 24.xx.xx.53 and a couple internal ip's 192.168.30.xx's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd appreciate any clarification that you might be able to offer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 00:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790371#M532052</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T00:16:37Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790372#M532056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've added the following to the config, but it still doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside1_access_in extended permit tcp any any object-group RDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside1,outside1) tcp interface 3389 192.168.30.210 3389 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 00:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790372#M532056</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T00:34:51Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790373#M532060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ohh, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But that 20.1.1.10 is the host on the internet that is trying to access your RDP server, it is just an access list to restrict the guys who are going to access your RDP server, for example here, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the access list, this says that only host 20.1.1.10 on the internet will be able to talk to the RDP server on the RDP server port &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 20.1.1.10 host 209.165.200.10 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the NAT so the outside users can reach the server &lt;/P&gt;&lt;P&gt;static (inside,outside) 209.165.200.10 172.16.11.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this is the access list applied to the interface where the packet is coming from&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have nay further questions let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 00:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790373#M532060</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T00:38:03Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790374#M532063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to apply the access-group &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside1_access_in in interface outside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 00:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790374#M532063</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T00:39:47Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790375#M532064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have now applied the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;access-list outside1_access_in extended permit tcp any any object-group RDP&lt;/P&gt;&lt;P&gt;static (inside1,outside1) tcp interface 3389 192.168.30.210 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside1_access_in in interface outside1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and clear xlate but still no success.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 01:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790375#M532064</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T01:26:15Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790376#M532065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside1 tcp 4.2.2.2 1025 24.x.x.53 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change the x for the outside1 IP... That would simulate a packet coming through the ASA with port 3389. I want to check if the firewall would allow it or deny it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 01:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790376#M532065</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T01:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790377#M532066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input outside1 tcp 4.2.2.2 1025 24.x.x.53 3389"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside1,outside1) tcp interface 3389 192.168.30.210 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside1 host 192.168.30.210 eq 3389 outside1 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 24.x.x.53/3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 3&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside1&lt;/P&gt;&lt;P&gt;Untranslate 24.x.x.53/3389 to 192.168.30.210/3389 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside1_access_in in interface outside1&lt;/P&gt;&lt;P&gt;access-list outside1_access_in extended permit tcp any any object-group RDP &lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside1_access_out out interface inside1&lt;/P&gt;&lt;P&gt;access-list inside1_access_out extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside1,outside1) tcp interface 3389 192.168.30.210 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside1 host 192.168.30.210 eq 3389 outside1 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 24.x.x.53/3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 3&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside1,inside2) 192.168.30.0 192.168.30.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside1 192.168.30.0 255.255.255.0 inside2 any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.30.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1869, untranslate_hits = 9376&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 5408732, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside1&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 01:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790377#M532066</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T01:54:59Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790378#M532067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Certainly seems like is not the ASA which is dropping them &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have time for some capturing? I'll be online for a couple of hours so I can check them....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture out interface outside1 match tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;capture in interface inside1 match tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to connect via RDP, once it fails, go ahead and do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cap out &lt;/P&gt;&lt;P&gt;show cap in &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Copy the output and paste it here, feel free to mask the IPs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 02:08:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790378#M532067</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T02:08:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790379#M532068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "show cap out"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show cap in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;9 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 19:04:55.283341 192.168.30.200.3389 &amp;gt; 192.168.40.5.64885: P 2811343421:2811343538(117) ack 3776020312 win 258 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 19:04:55.490529 192.168.40.5.64885 &amp;gt; 192.168.30.200.3389: . ack 2811343538 win 253 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 19:05:06.450660 192.168.30.200.3389 &amp;gt; 192.168.40.5.64885: P 2811343538:2811343591(53) ack 3776020312 win 258 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 19:05:06.650006 192.168.40.5.64885 &amp;gt; 192.168.30.200.3389: . ack 2811343591 win 253 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 19:05:09.872910 192.168.40.5.64885 &amp;gt; 192.168.30.200.3389: P 3776020312:3776020365(53) ack 2811343591 win 253 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 19:05:09.873917 192.168.30.200.3389 &amp;gt; 192.168.40.5.64885: P 2811343591:2811343660(69) ack 3776020365 win 258 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 19:05:10.079005 192.168.40.5.64885 &amp;gt; 192.168.30.200.3389: . ack 2811343660 win 253 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 8: 19:05:26.468527 192.168.30.200.3389 &amp;gt; 192.168.40.5.64885: P 2811343660:2811343713(53) ack 3776020365 win 258 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 9: 19:05:26.670497 192.168.40.5.64885 &amp;gt; 192.168.30.200.3389: . ack 2811343713 win 258 &lt;/P&gt;&lt;P&gt;9 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what's up with the 192.168.30.200 since I configured for 192.168.30.210&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 02:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790379#M532068</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T02:12:43Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790380#M532069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont see the packets arriving to the outside interface... when you do the RDP you are doing it to the 24 not the 192 address right? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 02:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790380#M532069</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T02:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790381#M532070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I was, but I was trying to log in from an internal machine with the external IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I tried from an off network machine it worked correctly and I was able to quickly configure the natting for a couple additional external ports and internal ip's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently using the external ip address from an internal machine requires additional configurations that we don't really need to explore since it's not a necessary function.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate all your help with this!! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 02:39:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790381#M532070</guid>
      <dc:creator>todd</dc:creator>
      <dc:date>2011-09-01T02:39:02Z</dc:date>
    </item>
    <item>
      <title>ASA5510 and RDP</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790382#M532071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, if you try to access the RDP from inside using the public IP, it will actually give you an error, that is what is called U-Turning or Hairpinning which as you suggested requires additional configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to configure that in the future just come back to this forum, I will help you out with that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For now I think that it would be it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad it worked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Sep 2011 02:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-and-rdp/m-p/1790382#M532071</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-09-01T02:42:21Z</dc:date>
    </item>
  </channel>
</rss>

