RDP into the network

Posted on 2007-10-01
Last Modified: 2008-01-09
I am attempting to setup a Cisco ASA 5505.

For security I am using as the outside IP instead of the actual IP.

Internet <------> (eth0/0 - ASA5505 <---(eth0/1 - ---> PC

I have a single IP address from my ISP.

I can successfully access the internet from inside the network.
I can ping from an outside address. (I get replies and I can see the traffic in the logs)

Issue:  I cannot RDP from an outside IP address into the PC which has an IP of; I do not even see log entries on the ASA of any attempt to connect from the outside IP to the ASA for tcp/3389 or any other port for that matter.

Here is the config:

asdm image disk0:/asdm521.bin
no asdm history enable
: Saved
ASA Version 7.2(1)
hostname ciscoasa
domain-name default.domain.invalid
enable password ***************** encrypted
interface Vlan1
 nameif inside
 security-level 100
 ip address
interface Vlan2
 mac-address 000f.b5bd.5ea9 standby 000f.b5bd.5ea8
 nameif outside
 security-level 0
 ip address
interface Ethernet0/0
 switchport access vlan 2
 no nameif
 no security-level
 no ip address
interface Ethernet0/1
 no nameif
 no security-level
 no ip address
interface Ethernet0/2
 no nameif
 no security-level
 no ip address
interface Ethernet0/3
 no nameif
 no security-level
 no ip address
interface Ethernet0/4
 no nameif
 no security-level
 no ip address
interface Ethernet0/5
 no nameif
 no security-level
 no ip address
interface Ethernet0/6
 no nameif
 no security-level
 no ip address
interface Ethernet0/7
 no nameif
 no security-level
 no ip address
passwd ************ encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name default.domain.invalid
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list outside_access_in extended permit icmp any any
access-list outside_access_in extended permit tcp any eq 3389 host eq 3389 log
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp permit any outside
asdm image disk0:/asdm521.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1
static (inside,outside) netmask
access-group outside_access_in in interface outside
route outside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http outside
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
dhcpd address inside
dhcpd dns interface inside
dhcpd enable inside

class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
service-policy global_policy global
prompt hostname context
: end
Question by:gratiot
    LVL 33

    Expert Comment

    IIRC, You can't assign the external IP address on ETH 0/0 to a statically assigned internal address.  You'll need another IP address or you can do port forwarding to the 192 host.
    LVL 5

    Expert Comment

    static (inside,outside) your pc ip  netmask 3389
    LVL 79

    Accepted Solution

    Remove the existing static:
      no static (inside,outside) netmask
      clear xlate

    Remove the existing Acl:
      no access-list outside_access_in extended permit tcp any eq 3389 host eq 3389 log
      no access-group outside_access_in in interface outside

    Replace both, using port redirect and "interface"
     static (inside,outside) tcp interface 3389 3389 netmask
     access-list outside_access_in permit tcp any interface outside eq 3389 log
     access-group outside_access_in in interface outside

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
    This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now