<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unstable RDP sessions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492595#M717413</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'd need to get a sniffer trace for this&amp;nbsp; exact traffic (ASA has "capture" command built in).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/system/message/logmsgs.html#wp4768860"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/system/message/logmsgs.html#wp4768860&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At minimum tell us what is the software versions of ASA and RDP server/client versions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Jun 2010 07:02:08 GMT</pubDate>
    <dc:creator>Marcin Latosiewicz</dc:creator>
    <dc:date>2010-06-01T07:02:08Z</dc:date>
    <item>
      <title>Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492594#M717412</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User A can login into server B via RDP (tcp 3389) however he cannot copy the file from server B via remote desktop.He also can ping and do a traceroute to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a testing with him, I’ve found out the following message on ASA. This is the only message that I saw on the firewall. &lt;STRONG&gt;%ASA-2-106001: Inbound TCP connection denied from&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;ASA-fw# sh log | grep 1.1.1.1&lt;BR /&gt;Jun 01 2010 08:46:00 3.3.3.3 : %ASA-2-106001: Inbound TCP connection denied from 1.1.1.1/1852 to 2.2.2.2/3389 flags PSH ACK&amp;nbsp; on interface inside&lt;BR /&gt;Jun 01 2010 08:46:00 3.3.3.3 : %ASA-2-106001: Inbound TCP connection denied from 1.1.1.1/1852 to 2.2.2.2/3389 flags PSH ACK&amp;nbsp; on interface inside&lt;BR /&gt;Jun 01 2010 08:46:00 3.3.3.3 : %ASA-2-106001: Inbound TCP connection denied from 1.1.1.1/1852 to 2.2.2.2/3389 flags PSH ACK&amp;nbsp; on interface inside&lt;BR /&gt;Jun 01 2010 08:46:00 3.3.3.3 : %ASA-2-106001: Inbound TCP connection denied from 1.1.1.1/1852 to 2.2.2.2/3389 flags PSH ACK&amp;nbsp; on interface inside&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say &lt;BR /&gt;User A = 1.1.1.1&lt;BR /&gt;Server B = 2.2.2.2&lt;BR /&gt;New Fw ASA = 3.3.3.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fw is allowed RDP connection from user A to Server B.Here are the rules on the firewall related to the server B.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;object-group service Standard_Remote_Access&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-object tcp eq telnet&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-object tcp eq ssh&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-object tcp eq https&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-object tcp eq www&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; service-object tcp eq 3389&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;access-list acl-in extended permit object-group Standard_Remote_Access&amp;nbsp; any object-group Network_2.2.2.2_24&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;This problem only occured after New Fw ASA installed between the user A and server B. Any advice would be appreciated. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492594#M717412</guid>
      <dc:creator>Adam David</dc:creator>
      <dc:date>2019-03-11T17:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492595#M717413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You'd need to get a sniffer trace for this&amp;nbsp; exact traffic (ASA has "capture" command built in).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/system/message/logmsgs.html#wp4768860"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/system/message/logmsgs.html#wp4768860&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At minimum tell us what is the software versions of ASA and RDP server/client versions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jun 2010 07:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492595#M717413</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-06-01T07:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492596#M717414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marcin for your suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RDP client version is 5.1(Build 2600), Control Version 5.1.2600.3627&lt;/P&gt;&lt;P&gt;RDPserver version is 5.2.3790.3959 &amp;lt;-- I'm not sure whether this is correct or not? May I know how to check the version of RDP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the packet capture and here is the result...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Packet 1-3: TCP Three way handshake&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; 1: 10:05:27.279373 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: S 945100646:945100646(0) win 64512 &amp;lt;[|tcp]&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:05:27.280381 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: S 2051713410:2051713410(0) ack 945100647 win 16384 &amp;lt;[|tcp]&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:05:27.280548 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: . ack 2051713411 win 64860 &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The next packet: Data transfer&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&amp;nbsp;&amp;nbsp; 4: 10:05:27.280731 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: P 945100647:945100685(38) ack 2051713411 win 64860 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:05:27.282273 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: P 2051713411:2051713422(11) ack 945100685 win 65497 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:05:27.282517 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: P 945100685:945101097(412) ack 2051713422 win 64849 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 10:05:27.283859 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: P 2051713422:2051713759(337) ack 945101097 win 65085 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 10:05:27.284119 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: P 945101097:945101109(12) ack 2051713759 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 10:05:27.284164 1.1.1.1.5555 &amp;gt; 2.2.2.2.3389: P 945101109:945101117(8) ack 2051713759 win 64512 &lt;BR /&gt;&amp;nbsp; 10: 10:05:27.284851 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: . ack 945101117 win 65065 &lt;/PRE&gt;&lt;P&gt;Everything looks normal untill packet number 511. User sents a few PUSH packet to the server, but the server never reply.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;511: 10:06:32.454215 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295239:457295635(396) ack 3592134313 win 64860 &lt;BR /&gt; 512: 10:06:32.738258 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295121:457295635(514) ack 3592134313 win 64860 &lt;BR /&gt; 513: 10:06:33.285156 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295121:457295635(514) ack 3592134313 win 64860 &lt;BR /&gt; 514: 10:06:33.557145 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295635:457295657(22) ack 3592134313 win 64860 &lt;BR /&gt; 515: 10:06:33.665981 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295657:457295758(101) ack 3592134313 win 64860 &lt;BR /&gt; 516: 10:06:33.802158 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295758:457295838(80) ack 3592134313 win 64860 &lt;BR /&gt; 517: 10:06:33.953869 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295838:457295862(24) ack 3592134313 win 64860 &lt;BR /&gt; 518: 10:06:34.394739 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295862:457295928(66) ack 3592134313 win 64860 &lt;BR /&gt; 519: 10:06:34.488256 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295121:457295657(536) ack 3592134313 win 64860 &lt;BR /&gt; 520: 10:06:36.894423 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P 457295121:457295657(536) ack 3592134313 win 64860 &lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;At packet 521, suddently the server sent RESET packet to the user to terminate the connection&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;521: 10:06:36.894591 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: R 3592134313:3592134313(0) ack 457295657 win 64860 &lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;Packet 522-524, client try to re-establish the connection&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt; 522: 10:06:36.919630 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: S 2294133377:2294133377(0) win 64512 &amp;lt;[|tcp]&amp;gt; &lt;BR /&gt; 523: 10:06:36.920484 2.2.2.2.3389 &amp;gt; 1.1.1.1.6666: S 2704546546:2704546546(0) ack 2294133378 win 16384 &amp;lt;[|tcp]&amp;gt; &lt;BR /&gt; 524: 10:06:36.920667 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: . ack 2704546547 win 64860 &lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;And communication re-created again..&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt; 525: 10:06:36.920805 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: P 2294133378:2294133416(38) ack 2704546547 win 64860 &lt;BR /&gt; 526: 10:06:36.922376 2.2.2.2.3389 &amp;gt; 1.1.1.1.6666: P 2704546547:2704546558(11) ack 2294133416 win 65497 &lt;BR /&gt; 527: 10:06:36.922636 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: P 2294133416:2294133828(412) ack 2704546558 win 64849 &lt;BR /&gt; 528: 10:06:36.923978 2.2.2.2.3389 &amp;gt; 1.1.1.1.6666: P 2704546558:2704546895(337) ack 2294133828 win 65085 &lt;BR /&gt; 529: 10:06:36.924207 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: P 2294133828:2294133840(12) ack 2704546895 win 64512 &lt;BR /&gt; 530: 10:06:36.924253 1.1.1.1.6666 &amp;gt; 2.2.2.2.3389: P 2294133840:2294133848(8) ack 2704546895 win 64512 &lt;BR /&gt; 531: 10:06:36.924955 2.2.2.2.3389 &amp;gt; 1.1.1.1.6666: . ack 2294133848 win 65065 &lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;And die again....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand why the server keep sending RESET packet to the client?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 05:34:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492596#M717414</guid>
      <dc:creator>Adam David</dc:creator>
      <dc:date>2010-06-14T05:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492597#M717415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Morning,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please confrim for me rather the ASA version and where the capture was taken ? (outside or inside of the ASA?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please also rememebr that you can extract the captures in pcap so you can open them in wireshark ! &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from cli (copy /pcap capture ...)&lt;/P&gt;&lt;P&gt;from https&amp;nbsp; Https://Ip.address/capture/CAPTURE_NAME_HERE/pcap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note - this is a retranmission.&lt;/P&gt;&lt;P&gt;519: 10:06:34.488256 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P&amp;nbsp; 457295121:457295657(536) ack 3592134313 win 64860 &lt;BR /&gt; 520:&amp;nbsp; 10:06:36.894423 1.1.1.1.5.5.5.5 &amp;gt; 2.2.2.2.3389: P&amp;nbsp; 457295121:457295657(536) ack 3592134313 win 64860&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Followed by reset:&lt;/P&gt;&lt;P&gt;521: 10:06:36.894591 2.2.2.2.3389 &amp;gt; 1.1.1.1.5555: R&amp;nbsp; 3592134313:3592134313(0) ack 457295657 win 64860&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get ot the bottom of things - you'd need to get a capture on both inside and outside interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 09:24:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492597#M717415</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-06-14T09:24:55Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492598#M717416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Marcin for the tips on wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardware: ASA5520,&lt;BR /&gt;Software Version 8.0(4)32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, I notice that. The retransmission started at packet 511 to 520 before the server sent the RST packet.&lt;/P&gt;&lt;P&gt;I've captured both inside and outside interface. The only RST packet that I can see is in inside interface. &lt;BR /&gt;Here are the commands that I use to capture the network packet.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;STRONG&gt;Access list to filter both source &amp;amp; destination&lt;/STRONG&gt;&lt;BR /&gt;access-list cap extended permit tcp host 1.1.1.1 host 2.2.2.2&lt;BR /&gt;access-list cap extended permit tcp host 2.2.2.2 host 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Capture both inside &amp;amp; outside interface&lt;/STRONG&gt;&lt;BR /&gt;capture cap access-list cap interface inside packet-length 54&lt;BR /&gt;capture cap-out access-list cap interface outside packet-length 54&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;View capture&lt;/STRONG&gt;&lt;BR /&gt;show capture cap-in&lt;BR /&gt;show capture cap-out&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Let me know if you need more information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 10:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492598#M717416</guid>
      <dc:creator>Adam David</dc:creator>
      <dc:date>2010-06-14T10:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492599#M717417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand you don't want to share the pcap based capture for security reasons?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you maybe then attach text based capture the full lenght - I'm not sure what I will be able to dig out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you by any chance also try type asp capture?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;--------&lt;/P&gt;&lt;P&gt;capture asp type asp all&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;Will give you information about packet drops on ASA because of security checks ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 10:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492599#M717417</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-06-14T10:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Unstable RDP sessions</title>
      <link>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492600#M717418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running into the same issue with a recent setup on an ASA 5505 running 8.0(5). I'm seeing the same behavior with a handshake, repeated push from the client and then a reset from client. Trying to initiate another rdp connection shows syns from client but no ack from server. clearing the arp cache helps temporarily but the problem returns after a short time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jun 2010 21:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unstable-rdp-sessions/m-p/1492600#M717418</guid>
      <dc:creator>larrylewis</dc:creator>
      <dc:date>2010-06-14T21:02:51Z</dc:date>
    </item>
  </channel>
</rss>

