<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Having Problems RDPing using External IP but External FQDN w in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498910#M698279</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't make sense for RDP because as soon as the RDP host is resolved it should be a simple TCP connection destined to 74.203.134.37on port 3389 which is the same as RDP-ing to 74.203.134.37 from the beginning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only packet captures will show you what is happening. remote.ridecitrus.com resolves to 74.203.134.3, so RDP-ing to the hostname or ip should be the same. You can capture packets sourced from your external ip that is rdp-ing on the inside and outside interface and try to see what is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Jun 2010 14:39:35 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-06-15T14:39:35Z</dc:date>
    <item>
      <title>Having Problems RDPing using External IP but External FQDN works</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498903#M698272</link>
      <description>&lt;P&gt;Im new to the ASA5520, I have NAT rules setup and&lt;/P&gt;&lt;P&gt;im having some issues allowing RDP traffic from external IP to internal IP. I have one IP/Address that translates fine if you use the FQDN and not the IP&lt;/P&gt;&lt;P&gt;if you use the IP it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i Use the packet tracer is get NAT-EXEMPT Subtype-rpf-check Action-DROP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Info: (acl-drop) Flow is denied by configured rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;74.203.134.* are the externals. Im stumped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 74.203.134.30 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name citrus-conn.local&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group service RSI&lt;BR /&gt;service-object tcp-udp eq 3156 &lt;BR /&gt;service-object tcp-udp eq 3256 &lt;BR /&gt;object-group service Satellite_Integrators&lt;BR /&gt;service-object tcp-udp eq 3000 &lt;BR /&gt;service-object tcp eq www &lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;port-object eq aol&lt;BR /&gt;port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_6 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_7 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_8 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_9 tcp&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_10 tcp&lt;BR /&gt;port-object eq imap4&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_11 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_12 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.38 eq pptp &lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.38 eq 3389 &lt;BR /&gt;access-list WAN_access_in remark VIP_Lakeland&lt;BR /&gt;access-list WAN_access_in extended permit icmp any host 74.203.134.38 &lt;BR /&gt;access-list WAN_access_in remark RSI&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.41 eq 3389 &lt;BR /&gt;access-list WAN_access_in remark ASA Public IP&lt;BR /&gt;access-list WAN_access_in extended permit icmp any host 74.203.134.30 &lt;BR /&gt;access-list WAN_access_in remark DVR&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.31 eq www &lt;BR /&gt;access-list WAN_access_in remark DVR&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.32 eq www &lt;BR /&gt;access-list WAN_access_in remark DVR&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.33 eq www &lt;BR /&gt;access-list WAN_access_in remark MailServer&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.34 eq smtp &lt;BR /&gt;access-list WAN_access_in remark MailServer&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.34 eq www &lt;BR /&gt;access-list WAN_access_in remark MailServer&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.34 eq https &lt;BR /&gt;access-list WAN_access_in remark MailServer&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.34 eq pop3 &lt;BR /&gt;access-list WAN_access_in remark MailServ Public IP&lt;BR /&gt;access-list WAN_access_in extended permit icmp any host 74.203.134.34 &lt;BR /&gt;access-list WAN_access_in remark TermServ&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.37 eq pptp &lt;BR /&gt;access-list WAN_access_in remark TermServ&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.37 eq https &lt;BR /&gt;access-list WAN_access_in remark TermServ&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.37 eq 3389 &lt;BR /&gt;access-list WAN_access_in remark Satellite Integrators&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.40 eq www &lt;BR /&gt;access-list WAN_access_in remark Satellite Integrators&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any host 74.203.134.40 eq 3000 &lt;BR /&gt;access-list WAN_access_in remark RSI System&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any host 74.203.134.41 eq 700 &lt;BR /&gt;access-list WAN_access_in remark RSI System&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any host 74.203.134.41 eq 3156 &lt;BR /&gt;access-list WAN_access_in remark RSI System&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any host 74.203.134.41 eq 3256 &lt;BR /&gt;access-list WAN_access_in remark MDT Terminal Services&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 74.203.134.42 eq 3389 &lt;BR /&gt;access-list WAN_access_in remark Cryoserver&lt;BR /&gt;access-list WAN_access_in extended permit tcp any host 212.36.41.22 object-group DM_INLINE_TCP_12 &lt;BR /&gt;access-list WAN_access_in remark Blackberry Inbound&lt;BR /&gt;access-list WAN_access_in extended permit tcp any any eq 3101 &lt;BR /&gt;access-list WAN_access_in remark Wachovia FTPS&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any range 1024 65535 &lt;BR /&gt;access-list WAN_access_in remark Time America Clocks&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 3734 &lt;BR /&gt;access-list WAN_access_in extended permit tcp any any eq imap4 &lt;BR /&gt;access-list WAN_access_in remark Shoutcast Radio&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 8002 &lt;BR /&gt;access-list WAN_access_in extended permit tcp any any eq pop3 &lt;BR /&gt;access-list WAN_access_in extended permit udp any any eq 33001 &lt;BR /&gt;access-list WAN_access_in remark shoretel softphone&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 5004 &lt;BR /&gt;access-list WAN_access_in remark shoretel softphone&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 2427 &lt;BR /&gt;access-list WAN_access_in remark shoretel softphone&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 2727 &lt;BR /&gt;access-list WAN_access_in extended permit udp any any eq 33011 &lt;BR /&gt;access-list WAN_access_in remark Blackberry Inbound&lt;BR /&gt;access-list WAN_access_in extended permit tcp any any eq 3500 &lt;BR /&gt;access-list WAN_access_in remark POP3/SMTP&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 995 &lt;BR /&gt;access-list WAN_access_in remark POP3/SMTP&lt;BR /&gt;access-list WAN_access_in extended permit object-group TCPUDP any any eq 465 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq ssh &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq telnet &lt;BR /&gt;access-list LAN_access_in extended permit udp 192.168.1.0 255.255.255.0 any eq domain &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq 3389 &lt;BR /&gt;access-list LAN_access_in remark Shoutcast Radio&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any eq 8002 &lt;BR /&gt;access-list LAN_access_in remark Wachovia FTPS&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any range 1024 65535 &lt;BR /&gt;access-list LAN_access_in remark POP3/SMTP&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP host 192.168.1.15 any eq 995 &lt;BR /&gt;access-list LAN_access_in remark POP3/SMTP&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP host 192.168.1.15 any eq 465 &lt;BR /&gt;access-list LAN_access_in remark TEST VIP&lt;BR /&gt;access-list LAN_access_in extended permit tcp host 192.168.1.18 any eq 3389 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq aol &lt;BR /&gt;access-list LAN_access_in remark BlackBerry outbound&lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq 3101 &lt;BR /&gt;access-list LAN_access_in remark BlackBerry Outbound2&lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq 3500 &lt;BR /&gt;access-list LAN_access_in extended permit icmp 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq imap4 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq pop3 &lt;BR /&gt;access-list LAN_access_in remark Time America Clocks&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any eq 3734 &lt;BR /&gt;access-list LAN_access_in remark shoretel softphone&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any eq 5004 &lt;BR /&gt;access-list LAN_access_in remark shoretel softphone&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any eq 2427 &lt;BR /&gt;access-list LAN_access_in remark shoretel softphone&lt;BR /&gt;access-list LAN_access_in extended permit object-group TCPUDP 192.168.1.0 255.255.255.0 any eq 2727 &lt;BR /&gt;access-list LAN_access_in remark BDR&lt;BR /&gt;access-list LAN_access_in extended permit udp host 192.168.1.23 any eq 33001 &lt;BR /&gt;access-list LAN_access_in remark mailserv&lt;BR /&gt;access-list LAN_access_in extended permit tcp host 192.168.1.15 any object-group DM_INLINE_TCP_9 &lt;BR /&gt;access-list LAN_access_in remark Cryoserver&lt;BR /&gt;access-list LAN_access_in extended permit tcp host 192.168.1.219 any object-group DM_INLINE_TCP_11 &lt;BR /&gt;access-list LAN_access_in remark TLS450&lt;BR /&gt;access-list LAN_access_in extended permit tcp host 192.168.1.176 any object-group DM_INLINE_TCP_10 &lt;BR /&gt;access-list LAN_access_in remark BDR&lt;BR /&gt;access-list LAN_access_in extended permit udp host 192.168.1.23 any eq 33011 &lt;BR /&gt;access-list everyone_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list LAN_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 172.16.1.0 255.255.255.224 &lt;BR /&gt;access-list LAN_nat0_outbound extended permit ip any 172.16.1.0 255.255.255.224 &lt;BR /&gt;access-list LAN_nat0_outbound extended permit ip any 192.168.1.0 255.255.255.128 &lt;BR /&gt;access-list DefaultGroup_splitTunnelAcl standard permit any &lt;BR /&gt;access-list global_mpc extended permit tcp any any object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list global_mpc_1 extended permit tcp any any object-group DM_INLINE_TCP_4 &lt;BR /&gt;access-list global_mpc_2 extended permit tcp any any object-group DM_INLINE_TCP_5 &lt;BR /&gt;access-list global_mpc_4 extended permit tcp 74.203.134.0 255.255.255.0 192.168.1.0 255.255.255.0 object-group DM_INLINE_TCP_7 &lt;BR /&gt;access-list global_mpc_3 extended permit tcp 192.168.1.0 255.255.255.0 74.203.134.0 255.255.255.0 object-group DM_INLINE_TCP_6 &lt;BR /&gt;access-list global_mpc_5 extended permit tcp any any object-group DM_INLINE_TCP_8 &lt;BR /&gt;access-list LAMTD_splitTunnelAcl standard permit any &lt;BR /&gt;access-list LAMTD_splitTunnelAcl_1 standard permit any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging mail emergencies&lt;BR /&gt;logging from-address&lt;/P&gt;&lt;P&gt;logging recipient-address&amp;nbsp; level errors&lt;BR /&gt;logging class auth mail emergencies &lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool RemoteClientPool 172.16.1.2-172.16.1.255 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (WAN) 101 interface&lt;BR /&gt;nat (LAN) 0 access-list LAN_nat0_outbound&lt;BR /&gt;nat (LAN) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;static (LAN,WAN) 74.203.134.37 192.168.1.10 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.38 192.168.1.18 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.31 192.168.1.12 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.32 192.168.1.13 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.33 192.168.1.14 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.34 192.168.1.15 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.42 192.168.1.33 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.41 192.168.1.253 netmask 255.255.255.255 &lt;BR /&gt;static (LAN,WAN) 74.203.134.40 192.168.1.254 netmask 255.255.255.255 &lt;BR /&gt;access-group WAN_access_in in interface WAN&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 74.203.134.1 1&lt;BR /&gt;route LAN 192.168.0.0 255.255.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server my_authent_grp protocol kerberos&lt;BR /&gt;aaa-server my_authent_grp (LAN) host 192.168.1.16&lt;BR /&gt;timeout 30&lt;BR /&gt;kerberos-realm CITRUS-CONN.LOCAL&lt;BR /&gt;aaa-server my_author_grp protocol ldap&lt;BR /&gt;aaa-server my_author_grp (LAN) host 192.168.1.16&lt;BR /&gt;ldap-base-dn dc=citrus-conn;dc=local&lt;BR /&gt;ldap-group-base-dn dc=citrus-conn;dc=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;server-type microsoft&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.1.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.1.0 255.255.255.0 LAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map WAN_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map WAN_map interface WAN&lt;BR /&gt;crypto map LAN_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map LAN_map interface LAN&lt;BR /&gt;crypto isakmp enable WAN&lt;BR /&gt;crypto isakmp enable LAN&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DefaultGroup internal&lt;BR /&gt;group-policy DefaultGroup attributes&lt;BR /&gt;dns-server value 192.168.1.16&lt;BR /&gt;vpn-tunnel-protocol IPSec svc &lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value DefaultGroup_splitTunnelAcl&lt;BR /&gt;default-domain value citrus-conn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;dns-server value 192.168.1.16&lt;BR /&gt;group-policy LAMTD internal&lt;BR /&gt;group-policy LAMTD attributes&lt;BR /&gt;dns-server value 192.168.1.16&lt;BR /&gt;vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value everyone_splitTunnelAcl&lt;BR /&gt;default-domain value citrus-conn.local&lt;BR /&gt;address-pools value RemoteClientPool&lt;BR /&gt;tunnel-group LAMTD type remote-access&lt;BR /&gt;tunnel-group LAMTD general-attributes&lt;BR /&gt;address-pool RemoteClientPool&lt;BR /&gt;authentication-server-group my_authent_grp&lt;BR /&gt;authentication-server-group (LAN) my_authent_grp&lt;BR /&gt;authorization-server-group my_author_grp&lt;BR /&gt;default-group-policy LAMTD&lt;BR /&gt;tunnel-group LAMTD ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;match access-list global_mpc_5&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;class global-class&lt;BR /&gt;&amp;nbsp; csc fail-close&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 192.168.1.15&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:368e12bbcbfb9b5dcaa73b2dbb70d4fa&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498903#M698272</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2019-03-11T17:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498904#M698273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it has to do with the NAT ordering? &lt;BR /&gt;NAT 0 access-list takes precedence over the STATIC NAT.&lt;/P&gt;&lt;P&gt;So, if the IP that you're trying to reach from outside, is included in the NAT0, the NAT0 will take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 20:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498904#M698273</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T20:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498905#M698274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What would i do to correct this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and why would it let the FQDN pass through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you rdp remote.ridecitrus.com it connects if you use the ip 74.203.134.37 it doesnt.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 20:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498905#M698274</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2010-06-14T20:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498906#M698275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check if the internal IP is part of the ACL applied to the NAT 0.&lt;/P&gt;&lt;P&gt;If so, create a deny statement for that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post ''sh run | i x.x.x.x ''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where x.x.x.x is the internal IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 20:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498906#M698275</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-14T20:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498907#M698276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "sh run | i 192.168.1.18"&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit tcp host 192.168.1.18 any eq 3389 &lt;BR /&gt;static (LAN,WAN) 74.203.134.38 192.168.1.18 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 21:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498907#M698276</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2010-06-14T21:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498908#M698277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You had said&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;if you rdp remote.ridecitrus.com it 
connects if you use the ip 
74.203.134.37 it doesnt.&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about if you RDP to 74.203.134.38? I see that is the ip the host 192.168.1.18 is translated to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 21:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498908#M698277</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-14T21:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498909#M698278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cant RDP any external IP they arnt being translated internally. I can see the counter going up in the ACL list but they wont connect.&lt;/P&gt;&lt;P&gt; and I was using the FQDN as an example any IP 30-45 i cannot RDP on even with the rules in place. Only if i use the FQDN it rdps. I only have one server with a FQDN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 13:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498909#M698278</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2010-06-15T13:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498910#M698279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't make sense for RDP because as soon as the RDP host is resolved it should be a simple TCP connection destined to 74.203.134.37on port 3389 which is the same as RDP-ing to 74.203.134.37 from the beginning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only packet captures will show you what is happening. remote.ridecitrus.com resolves to 74.203.134.3, so RDP-ing to the hostname or ip should be the same. You can capture packets sourced from your external ip that is rdp-ing on the inside and outside interface and try to see what is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jun 2010 14:39:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498910#M698279</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-15T14:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498911#M698280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thats what i mean... its odd that it lets it pass the one with the FQDN and nothing else...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 13:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498911#M698280</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2010-06-16T13:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498912#M698281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just tried again outside the network and it finally worked with the IP address. I tested with my iPhone iPad and Laptop via Cellular and it finally connected. Only when inside the network i cant RDP using the public IP only the FQDN which still is weird...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 13:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498912#M698281</guid>
      <dc:creator>robertmehrer</dc:creator>
      <dc:date>2010-06-16T13:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Having Problems RDPing using External IP but External FQDN w</title>
      <link>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498913#M698282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check what ip you get for the FQDN name. Your internal DNS server is probably giving you a local ip and you can RDP. But when you use the global it does not work because the ASA does not hair-pin the traffic on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 14:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-problems-rdping-using-external-ip-but-external-fqdn-works/m-p/1498913#M698282</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-16T14:08:49Z</dc:date>
    </item>
  </channel>
</rss>

