<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 506 Filtering Terminal Services in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7336#M711528</link>
    <description>&lt;P&gt;I have a PIX 506 that is blocking MS Terminal Services which uses port 3389 tcp/udp.  Whenever I apply the conduit or access-list statements to allow full access using these ports, they are still being filtered by the PIX even after the clear xlate command is issued.  I know that the PIX is filtering Terminal Services because when I open the PIX up fully you can then terminal service in through the PIX.  Has anyone that's ever used Microsoft Terminal Services before had this problem or does anyone know what port numbers that needs to be opened that I'm unaware of?&lt;/P&gt;&lt;P&gt;Here are my filters that I'm using that don't seem to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;conduit permti udp any any eq 3389&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;access-list incoming tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list incoming udp any any eq 3389&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 05:47:57 GMT</pubDate>
    <dc:creator>brody</dc:creator>
    <dc:date>2020-02-21T05:47:57Z</dc:date>
    <item>
      <title>PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7336#M711528</link>
      <description>&lt;P&gt;I have a PIX 506 that is blocking MS Terminal Services which uses port 3389 tcp/udp.  Whenever I apply the conduit or access-list statements to allow full access using these ports, they are still being filtered by the PIX even after the clear xlate command is issued.  I know that the PIX is filtering Terminal Services because when I open the PIX up fully you can then terminal service in through the PIX.  Has anyone that's ever used Microsoft Terminal Services before had this problem or does anyone know what port numbers that needs to be opened that I'm unaware of?&lt;/P&gt;&lt;P&gt;Here are my filters that I'm using that don't seem to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;conduit permti udp any any eq 3389&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;access-list incoming tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list incoming udp any any eq 3389&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7336#M711528</guid>
      <dc:creator>brody</dc:creator>
      <dc:date>2020-02-21T05:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7337#M711529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a PIX 506 that is blocking MS Terminal Services which uses port 3389 tcp/udp.  Whenever I apply the conduit or access-list statements to allow full access using these ports, they are still being filtered by the PIX even after the clear xlate command is issued.  I know that the PIX is filtering Terminal Services because when I open the PIX up fully you can then terminal service in through the PIX.  Has anyone that's ever used Microsoft Terminal Services before had this problem or does anyone know what port numbers that needs to be opened that I'm unaware of?  I've looked on IANA and just about every port listing site and they all reflect 3389 tcp/udp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are my filters that I'm using that don't appear to be working.&lt;/P&gt;&lt;P&gt;conduit permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;conduit permit udp any any eq 3389&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;access-list incoming tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list incoming udp any any eq 3389&lt;/P&gt;&lt;P&gt;access-group incoming in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2001 18:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7337#M711529</guid>
      <dc:creator>brody</dc:creator>
      <dc:date>2001-05-30T18:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7338#M711531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a NAT statement to the Terminal Services Box?  Use that public address in the conduit/ACL.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following statement works for us. (Given you add the public IP)&lt;/P&gt;&lt;P&gt;access-list acl_outside permit tcp any host #.#.#.# eq 3389&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2001 18:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7338#M711531</guid>
      <dc:creator>timtron</dc:creator>
      <dc:date>2001-05-30T18:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7339#M711534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The rdp listener will listen on port 3389 , the actual connection takes place over a port above 1024 &lt;/P&gt;&lt;P&gt;you have to open a range of tcp ports between 1024 and 3389 that your terminal server will use. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2001 04:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7339#M711534</guid>
      <dc:creator>irsanc</dc:creator>
      <dc:date>2001-06-06T04:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7340#M711537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What client are you using to connect?  The following is from a Microsoft knowledge base article.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://support.microsoft.com/support/kb/articles/q150/5/43.asp" target="_blank"&gt;http://support.microsoft.com/support/kb/articles/q150/5/43.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RDP Client (Microsoft)      TCP:3389 (Pre Beta2:1503)&lt;/P&gt;&lt;P&gt;ActiveX Client (TSAC)       TCP:80, 3389&lt;/P&gt;&lt;P&gt;ICA Client (Citrix)         TCP:1494 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob Staaf&lt;/P&gt;&lt;P&gt;Southern Web Services&lt;/P&gt;&lt;P&gt;Orlando, Fl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2001 11:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7340#M711537</guid>
      <dc:creator>rstaaf</dc:creator>
      <dc:date>2001-06-06T11:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7341#M711541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's a suggestion that will serve you beyound this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Set up a syslog server (if you don't have one, search the Internet for KIWI Syslog).  You can install Kiwi's syslog server on a windows PC and configure your PIX to syslog to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have the PIX syslogging.  Configure your conduit's and then try to Terminal Server across it.  The pix will log every packet blocked including the destination ports that you'll want to open up.  This will speed diagnosis along for most any problem you may have in the future.  One problem with this is that access-lists don't log the port number.  So if you are using access-lists, temporarily configure with conduits watch the logs, then once you have a list of ports that need to be open, change back to access-lists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2001 16:17:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7341#M711541</guid>
      <dc:creator>thomas.waddell</dc:creator>
      <dc:date>2001-06-06T16:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 506 Filtering Terminal Services</title>
      <link>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7342#M711544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have your port statements in the wrong location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try:&lt;/P&gt;&lt;P&gt;conduit permit tcp any eq 3389 any&lt;/P&gt;&lt;P&gt;conduit permti udp any eq 3389 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By typing it in the way you have it in your post you're saying that the connection from the remote location must be initiated on port 3389.  As I have it above, the connection must be destined to port 3389.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jun 2001 16:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-506-filtering-terminal-services/m-p/7342#M711544</guid>
      <dc:creator>jose.calvillo</dc:creator>
      <dc:date>2001-06-06T16:52:46Z</dc:date>
    </item>
  </channel>
</rss>

