Link to home
Start Free TrialLog in
Avatar of PEOCENTRAL
PEOCENTRALFlag for United States of America

asked on

Cisco ASA 5505 GUI

Programming Cisco ASA 5505 rule access using the GUI.:  Forward RDP to a server 192.168.xxx.xxx internally.
Avatar of jetli87
jetli87

I assume you want to allow incoming connection to a static ip address, correct?
GUI instructions are difficult to type and i think it's actually easier to do this with the CLI:

access-list inbound permit tcp any host <outside static ip> eq 3389
static (inside,outside) tcp <outside static ip> 3389 <inside static ip> 3389 netmask 255.255.255.255 0 0
access-group inbound in interface outside
wr mem

hope that helps!
Avatar of PEOCENTRAL

ASKER

So permissions are allowed via access lists?  By default is port 80 traffic allowed or is a NAT rule need to be setup?
ASKER CERTIFIED SOLUTION
Avatar of jetli87
jetli87

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
So can you briefly tell me the difference between NAT and PAT?  Can Access lists not be used if you used dynamic or static rules with NAT/PAT?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial