Hi Gary,
I understand you need to allow only web browsing traffic initiated from internal network to outside.
Please use the below command to allow this traffic.
#access-list 101 permit tcp any any gt 1023 established
This will allow only packets fo...
Hi Gary,
The access-list 101 is applied in which direction on the interface(out or in)?
It seems that the access-list is applied in 'in' direction on interface Dialer0. There is no access-list to allow this traffic.
To confirm the same, please confi...
Hi,
The NAT configuration and access-list looks fine to me.
Please paste the output of below command so we could find the issue.
#packet-tracer input outside tcp <source-IP> <source-port> <destination-IP> <destination-port> detailed
source-IP - sou...
Hi Tony,
What is the NAT configuration for this server on ASA?
Please make sure that you apply the internal IP of the RDP server in the access-list.
To verify why the traffic is not working, please use packet-tracer on ASA.
#packet-tracer input outs...
Hi Gary,
You are using an access-list on the outside interface and you are not allowing this traffic.
You need to configure and ACL on 101 to allow this traffic. Please add a term like this.
#access-list 101 line 1 extended permit ip <source-address...