09-26-2005 10:29 AM - edited 03-09-2019 12:31 PM
I can route traffic over port 3389 to DMZ but the same rule doenst allow 3389 to the internal networks. External on port 0, dmz on 1, internal networks on 2 and 3. I allow connections to internal port 3389 from source "outside" IP to my internal "Destination" IP with for my RDP service group. Again it works for DMZ but not for either of the Internal DMZ
09-26-2005 11:46 AM
Hi mate, it would help if you could post some config in there, it is most likely just config issue....
09-27-2005 06:58 AM
I had the same problem with my ASA 5510. I was using the ASDM 5.0. Nice idea as a GUI, but has many faults. I had to enter in manually the access list.
access-list WAN_access_in extended permit tcp any host x.x.x.x eq 3389
Where x.x.x.x is the public side of the nat. Note this is only an example.
Like the Mate said, plz post config marking out the ip's.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide