cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
8005
Views
5
Helpful
16
Replies

Port Forwarding for ASA Using ASDM

chuckbalogh
Level 1
Level 1

Hello.  I am a Cisco enterprise equipment newbie so I have  a newbie  question.  I am trying to setup 2 RDP port  forwards  through the ASA 5505.  I can currently RDP through the ASA with the default listening port, 3389. However, my attempts are  configuring RDP with other ports has not  panned out  at  all.  I inherited this setup so I did not originally configure the ASA. 

I am using the ASDM interface and would like to continue to do so if  possible.  The ASA is v8.2 and  the ASDM is  v6.3. 

The ASA is configured  for  1  Outside port  (10.10.30.85 - DHCP) and 3 Inside ports (10.10.30.254).  One inside port  is  connected  to a Dell PowerConnect switch which supplies a server and  4 workstations.  The  Outside  ASA port  is  connected  to an  ATT Pace  4111N-031 modem/router. 

With other  equipment, I have just configured  a port  forward and it was pretty straightforward.  I have  seen much about  using a NAT rule.  Do I/Should  ICan I/ use a NAT Rule? 

I have attached screen  shots for the NAT and Access Rules.

Thank you in advance for  your assistance

1 Accepted Solution

Accepted Solutions

Ok internally you can keep port 3389 but in your NAT translation, original port is set to 3396 and translated set to 3396. If you want to keep port 3389 on your server, it should be original port 3389 and translated to 3396.

Thanks

PS: Please don't forget to rate and mark as correct answer if this answered your question


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

View solution in original post

16 Replies 16

Francesco Molino
VIP Alumni
VIP Alumni

Hi

Your nat is done on outside interface but your acl is pointing to an object called WAN. You should put outside like it was done for the real rdp port.

Based on your description your asa outside had a private IP and your modem/router had the public IP, am I right? If yes, you need to configure your router as well to forward this port to your asa.

Thanks

PS: Please don't forget to rate and mark as correct answer if this answered your question


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi and thanks for your response.

I created the rule to the WAN_ destination as a test.  There also already exists a rule with Destination outside.  I was trying to mirror the rules that were already in place for Port 3389 (default listening port). 

All of these rules are "outside" incoming rules" which would explain needing to use a Destination interface of "outside".  Are rules required for outgoing (to the WAN) traffic or are these port  rules bi-directional?

As far as the router, I do have port  forwarding configured for ports 3389, 3395 and 3396.  I eventually want to stop using 3389 to allow two different people to log in to two different machines (COTEDECO-1 and  COTEDECO-2) with ports 3395 and 3396.

Static NAT is bidirectional and dynamic nat is unidirectional.  

You will also need to add access-list entries to allow the traffic from WAN interface to the inside host you are setting this up for.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

Thank  you Marius.  I appreciate the NAT information.  I am using Static NAT's.  

You mention that I need to add access-list entires to allow traffice from WAN Interface to the inside host.  I think that these already exist.  

I have attached the ACL for your review.  

Aren't rules 2, 7 and 8 what I need to cover any of the three RDP Ports?    I created rules 9 and 10 an experiment to test the rues.  

Thanks again and I look forward to hearing back from you.

Chuck

Well as mentioned earlier you one NAT rule is not correct. You need to change the original source to 3389 and keep the translated source to 3396.  Your access list looks correct.

Unless you change the port which the server is listening to it will not respond on 3396, but if you NAT 3389 to 3396 then you should be able to access the server using port 3396 from a PC located on the WAN interface.

--
Please remember to select a correct answer and rate helpful posts

Thanks for  your patience on this.  I now see what you are saying.  The NAT must be to the Windows  Server machine which will have port 3389 (not to each individual machine).  This  then allows any port to be used externally (remotely) and the "server/local network" doesn't care as it will always look like 3389.

I will try this later tonight.  I have to run out again.

Thanks.

Ok internally you can keep port 3389 but in your NAT translation, original port is set to 3396 and translated set to 3396. If you want to keep port 3389 on your server, it should be original port 3389 and translated to 3396.

Thanks

PS: Please don't forget to rate and mark as correct answer if this answered your question


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hello Francesco.  Thanks again for your help on this.

I did as you suggested and it worked.  To further test it, I created another rule for one of the other computers and it worked as expected.

I can't thank you enough.....but if you don't mind, can I ask another question or two?

For the NAT rules, why is the "Original" "Source" an inside device?  From the terminology, I would have  thought that this  should be from the network (WAN) so it would read "any" - because we don't know who will be RDP's in.  My guess is that "Original" has nothing to do with the direction of the communication but purely relative to the port that you are wanting to translate.  Can  you confirm this (and please embellish if you feel up to it).

Secondly, I have revised (removed several of) the Access Rules.  I first removed two of the rules (#9 and #10) which had pc's as destinations, not outside.

Again, my confusion is over terminology.  The Source and Destination for these rules was Any and Outside respectively.  It seems like the Destination should have been "inside".   Further confusing me is that this is an Outside rule based on the Outside interface.  So, it seems contradictory that the Source is any but also outside and the Destination is Outside.  See my attached Access Rules  screen shot. Can you offer any guidance on this terminology.

One more related to access rules - Are they bidirectional?  They seem to be.

My final question is can you offer any literature to read where I can learn this stuff better.  I already have the Cisco online documentation but it would be nice to have another source to help me resolve conflicts (in my mind -- and I know they will occur).

Thank you again for your help.  I understand if you don't want to take the time to reply to all of my questions.  Have a great day.

Chuck

Hi

For books, you can have a look on all Cisco Press books and specially the CCNA Security and Cisco ASA All-in-one.

For NAT, you need to think the other way, it looks like strange but let me explain:

  • Your internal host is natted on a public IP with a port x
    • This explain that original are everything internal (IP + PORT SOURCE)
    • And Natted is (PUBLIC + PORT DESTINATION) ==> This will be the information facing internet and be accessible from outside.

For ACL, on old version (before 8.3), the destination on acl for outside acl was the Public IP of the natted object. Since 8.3, the source is IP coming from internet (anyone for example) and destination will be the real IP of the object (Inside object).

Hope this more clear.

Thanks

PS: Please don't forget to rate and mark as correct answer if this answered your question


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Thank you. It does help.  I will be putting in some time on this as it is important.

My next project is to setup VPN for this same customer so you may see more posts from me then.

Cheers.

You're very welcome


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Looks like your NAT rule is incorrect.  you are translating the port tcp/3396 to tcp/3396.  This will not work as the server is, i assume, listening for port tcp/3389.  Set the original port to tcp/3389 and it should work fine.

--

Please remember to select a correct answer and rate helpful posts

--
Please remember to select a correct answer and rate helpful posts

Francesco Molino
VIP Alumni
VIP Alumni

Hi

I didn't read correctly, Marius is right you're trying to do 2 nats with different ports on same machine COTEDECO-1. 

You need to modify the second nat with the 2nd machine 

Thanks


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Hi,

Thanks for  your response.  My original config did have both ports 3389 and 3395 intentionallyl NAT'd to COTEDECO-1.  My thought was that, as an experiment, I could just change the listening port on COTEDECO-1 and then  be able to remote in with either  port (as a test).  Currently I can remotely access COTEDECO-1 and was trying to figure out how to access it with a different port. 

I have since changed the  rules to NAT port 3396 to a different machine COTEDECO-2.  My thought was that I could use 3396 to get into COTEDECO-2.  This does not work. 

Can you please help me understand what affect an Access Rule has what  I am trying to do? 

Review Cisco Networking for a $25 gift card