02-16-2012 10:50 AM - edited 03-11-2019 03:30 PM
Hello,
I've been trying to set up a simple port forward on a Cisco ASA 5505 (OS version 8.3.2).
I have an external IP 94.112.245.203 and I'd like to forward a port for Windows Remote Desktop (tcp/3389) to a server at 192.168.10.2.
Here are my object, nat and access-list configurations:
Here's how packet trace goes:
I've tried following several guides and all suggest the very same approach:
object network srv2003
host 192.168.10.2
nat (inside,outside) static interface service tcp 3389 3389
However I feel I must have missed something very basic about access-lists since none of the guides is discussing it.
Any help would be very much appreciated.
Regards,
Martin
02-16-2012 10:55 AM
HI Martin,
Yes you are right the access-list needs to be:
access-list outside_access_in extended permit tcp any 192.168.10.2 eq 3389
since post 8.3, you need to use the private ip instead of the public ip in the outside ACL.
Hope that helps
Thanks,
Varun
02-16-2012 11:15 AM
Hello Varun,
and thank you for a really quick response!
Are you sure that command is syntactically correct?
ciscoasa(config)# access-list outside_access_in extended permit tcp any 192.168.10.2 eq 3389
access-list outside_access_in extended permit tcp any 192.168.10.2 eq 3389
^
ERROR: % Invalid input detected at '^' marker.
(if the formatting "eats" up the whitespace, the '^' marker is pointed at 'eq')
Also, should this rule override the one already present or should it be added to it? Sorry if these questions are of a basic nature.
Thank you.
Regards,
Martin
02-16-2012 11:17 AM
Hey Martin,
M sorry, a tiny winy mistake
access-list outside_access_in extended permit tcp any host 192.168.10.2 eq 3389
we were missing the host keyword.
Thanks,
Varun
02-16-2012 11:25 AM
Hello Varun,
thanks for the clarification.
I've added the permission in the access-list, however I am still unable to connect via RDP and packet-trace still exits on phase 2 (i.e. access-list) with the same error message:
Drop-reason: (acl-drop) Flow is denied by configured rule
Any idea what else I might be missing? Should I post complete show running-config?
Thanks,
Martin
02-16-2012 11:27 AM
It should not say that now, but yes, if you can post the config, that would be helpful.
Thanks,
Varun
02-16-2012 11:35 AM
Here it is:
I've replaced the password hashes with '
Thank you,
Martin
02-16-2012 11:45 AM
Hi Martin,
Cna you delete the old nat statment:
object network srv2003
nat (inside,outside) static interface service tcp 3389 3389
and add this one:
nat (outside,inside) source static any any destination static interface srv2003 service rdp rdp
Can you let me know how it goes.
Thanks,
Varun
02-16-2012 11:57 AM
Hi Varun,
I've deleted the statement as you suggested and added the new one. The configuration now looks as follows:
However the problem persists - I still can not make the RDP connection from the outside and the packet-trace fails too.
Thank you,
Martin
02-16-2012 12:33 PM
Ohhhhhhhhhhhhhhhhhhh how could I just overlooked it
Check these:
It the wrong access-list applied on outside interface, kindly change it to:
access-group outside_access_in in interface outside
Thanks,
Varun
02-16-2012 12:58 PM
Thank you for your response.
I changed it (I suppose it means that I change which access list applies to the given interface?), so it looks like following:
Yet still no luck (neither RDP nor packet-trace, problem is still the same).
Is it possible I might have missed something else (and basic)?
Thank you very much,
Martin
02-17-2012 12:41 PM
Well, I tried several other things I randomly found on the Internet but alas with no success. After those experiment, I went back to the configuration I showed in my last post to keep the thread consistent.
I know this might be a Windows-ish question, but is it possible that a reboot of ASA might solve this issue? If you are certain that these settings are correct than we've sort of exhausted the options, I am afraid.
Thank you very much,
Martin
02-17-2012 12:51 PM
Hi Martin,
For accessing the server on rdp port, we just need the basic config:
access-group outside_access_in in interface outside
access-list outside_access_in extended permit tcp any host 192.168.10.2 eq 3389
object service rdp
service tcp destination eq 3389
object network srv2003
host 192.168.10.2
nat (outside,inside) source static any any destination static interface srv2003 service rdp rdp
after this the packet tracer should not say, implicit deny, n thats wat amazes me. I really dont think it to be a windows issue right now and would love to take it forward with you in digging into it, if u'r fine with it.
Thanks,
Varun
02-17-2012 03:56 PM
Hello Varun,
thanks again for taking time and helping me.
I set up everything like you instructed me to in your last post.
Here's my complete running-config, just to be sure:
And here's the output of packet tracer:
I also don't think it's the Windows problem at the moment (since I am connected to the server via SSH tunnel as of now, since RDP forwarding doesn't work ).
I am glad you take this much interest in this case and I'd love to provide you with as much information as you need to further investigate this problem.
Again, thank you very much!
Martin
::EDIT::
In the meantime, I did a little check and tried the old Linux router we used for our network and port forward works just fine. The purpose was to exclude problems with ISP, Windows Server and anything else that doesn't come to mind at the moment. So it should really be ASA issue at the moment.
02-24-2012 04:36 AM
Hello Varun,
have you got any update on my issue, please?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide