01-11-2017 12:49 PM - edited 03-12-2019 01:45 AM
Hello. I am a Cisco enterprise equipment newbie so I have a newbie question. I am trying to setup 2 RDP port forwards through the ASA 5505. I can currently RDP through the ASA with the default listening port, 3389. However, my attempts are configuring RDP with other ports has not panned out at all. I inherited this setup so I did not originally configure the ASA.
I am using the ASDM interface and would like to continue to do so if possible. The ASA is v8.2 and the ASDM is v6.3.
The ASA is configured for 1 Outside port (10.10.30.85 - DHCP) and 3 Inside ports (10.10.30.254). One inside port is connected to a Dell PowerConnect switch which supplies a server and 4 workstations. The Outside ASA port is connected to an ATT Pace 4111N-031 modem/router.
With other equipment, I have just configured a port forward and it was pretty straightforward. I have seen much about using a NAT rule. Do I/Should ICan I/ use a NAT Rule?
I have attached screen shots for the NAT and Access Rules.
Thank you in advance for your assistance
Solved! Go to Solution.
01-30-2017 02:45 PM
Ok internally you can keep port 3389 but in your NAT translation, original port is set to 3396 and translated set to 3396. If you want to keep port 3389 on your server, it should be original port 3389 and translated to 3396.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-25-2017 09:09 PM
Hi
Your nat is done on outside interface but your acl is pointing to an object called WAN. You should put outside like it was done for the real rdp port.
Based on your description your asa outside had a private IP and your modem/router had the public IP, am I right? If yes, you need to configure your router as well to forward this port to your asa.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-30-2017 05:18 AM
Hi and thanks for your response.
I created the rule to the WAN_ destination as a test. There also already exists a rule with Destination outside. I was trying to mirror the rules that were already in place for Port 3389 (default listening port).
All of these rules are "outside" incoming rules" which would explain needing to use a Destination interface of "outside". Are rules required for outgoing (to the WAN) traffic or are these port rules bi-directional?
As far as the router, I do have port forwarding configured for ports 3389, 3395 and 3396. I eventually want to stop using 3389 to allow two different people to log in to two different machines (COTEDECO-1 and COTEDECO-2) with ports 3395 and 3396.
01-30-2017 06:06 AM
Static NAT is bidirectional and dynamic nat is unidirectional.
You will also need to add access-list entries to allow the traffic from WAN interface to the inside host you are setting this up for.
--
Please remember to select a correct answer and rate helpful posts
01-30-2017 10:22 AM
Thank you Marius. I appreciate the NAT information. I am using Static NAT's.
You mention that I need to add access-list entires to allow traffice from WAN Interface to the inside host. I think that these already exist.
I have attached the ACL for your review.
Aren't rules 2, 7 and 8 what I need to cover any of the three RDP Ports? I created rules 9 and 10 an experiment to test the rues.
Thanks again and I look forward to hearing back from you.
Chuck
01-30-2017 10:56 AM
Well as mentioned earlier you one NAT rule is not correct. You need to change the original source to 3389 and keep the translated source to 3396. Your access list looks correct.
Unless you change the port which the server is listening to it will not respond on 3396, but if you NAT 3389 to 3396 then you should be able to access the server using port 3396 from a PC located on the WAN interface.
01-30-2017 12:30 PM
Thanks for your patience on this. I now see what you are saying. The NAT must be to the Windows Server machine which will have port 3389 (not to each individual machine). This then allows any port to be used externally (remotely) and the "server/local network" doesn't care as it will always look like 3389.
I will try this later tonight. I have to run out again.
Thanks.
01-30-2017 02:45 PM
Ok internally you can keep port 3389 but in your NAT translation, original port is set to 3396 and translated set to 3396. If you want to keep port 3389 on your server, it should be original port 3389 and translated to 3396.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-30-2017 06:46 PM
Hello Francesco. Thanks again for your help on this.
I did as you suggested and it worked. To further test it, I created another rule for one of the other computers and it worked as expected.
I can't thank you enough.....but if you don't mind, can I ask another question or two?
For the NAT rules, why is the "Original" "Source" an inside device? From the terminology, I would have thought that this should be from the network (WAN) so it would read "any" - because we don't know who will be RDP's in. My guess is that "Original" has nothing to do with the direction of the communication but purely relative to the port that you are wanting to translate. Can you confirm this (and please embellish if you feel up to it).
Secondly, I have revised (removed several of) the Access Rules. I first removed two of the rules (#9 and #10) which had pc's as destinations, not outside.
Again, my confusion is over terminology. The Source and Destination for these rules was Any and Outside respectively. It seems like the Destination should have been "inside". Further confusing me is that this is an Outside rule based on the Outside interface. So, it seems contradictory that the Source is any but also outside and the Destination is Outside. See my attached Access Rules screen shot. Can you offer any guidance on this terminology.
One more related to access rules - Are they bidirectional? They seem to be.
My final question is can you offer any literature to read where I can learn this stuff better. I already have the Cisco online documentation but it would be nice to have another source to help me resolve conflicts (in my mind -- and I know they will occur).
Thank you again for your help. I understand if you don't want to take the time to reply to all of my questions. Have a great day.
Chuck
01-30-2017 07:11 PM
Hi
For books, you can have a look on all Cisco Press books and specially the CCNA Security and Cisco ASA All-in-one.
For NAT, you need to think the other way, it looks like strange but let me explain:
For ACL, on old version (before 8.3), the destination on acl for outside acl was the Public IP of the natted object. Since 8.3, the source is IP coming from internet (anyone for example) and destination will be the real IP of the object (Inside object).
Hope this more clear.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-30-2017 08:23 PM
Thank you. It does help. I will be putting in some time on this as it is important.
My next project is to setup VPN for this same customer so you may see more posts from me then.
Cheers.
01-30-2017 08:24 PM
You're very welcome
01-26-2017 01:04 AM
Looks like your NAT rule is incorrect. you are translating the port tcp/3396 to tcp/3396. This will not work as the server is, i assume, listening for port tcp/3389. Set the original port to tcp/3389 and it should work fine.
--
Please remember to select a correct answer and rate helpful posts
01-26-2017 04:34 AM
Hi
I didn't read correctly, Marius is right you're trying to do 2 nats with different ports on same machine COTEDECO-1.
You need to modify the second nat with the 2nd machine
Thanks
01-30-2017 04:52 AM
Hi,
Thanks for your response. My original config did have both ports 3389 and 3395 intentionallyl NAT'd to COTEDECO-1. My thought was that, as an experiment, I could just change the listening port on COTEDECO-1 and then be able to remote in with either port (as a test). Currently I can remotely access COTEDECO-1 and was trying to figure out how to access it with a different port.
I have since changed the rules to NAT port 3396 to a different machine COTEDECO-2. My thought was that I could use 3396 to get into COTEDECO-2. This does not work.
Can you please help me understand what affect an Access Rule has what I am trying to do?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide