How do I open Remote Desktop port on Pix 501?

Posted on 2007-11-29
Medium Priority
Last Modified: 2012-05-05
Please provide step by step directions...inside ip will be and outside ip lets say
Thank you! P.S. Just the command line, I dont have the GUI.

Open in new window

Question by:Cubbybulin
  • 3
  • 3
LVL 28

Expert Comment

ID: 20376520
Put in the commands below in the CLI:

static (inside,outside) netmask
access-list outside_access_in permit tcp any host eq 3389
access-group outside_access_in in interface outside

The first command creates a static translation for inside IP to be translated to on the outside.  The second command allows TCP 3389 inbound to the public (translated) IP address of the inside host at  The third command  applies the access list to the outside interface in an inbound direction.

Author Comment

ID: 20376855
it says error: - i am showing config - how can i make the machine to be able to do remote desktop? thanks!

ERROR: duplicate of existing static                                  

    from inside: to outside: netmask                                                                        
Usage:  [no] static [(real_ifc, mapped_ifc)]                                            
                {<real_ip> [netmask <mask>]} | {access-list <acl_name>}                                                                      
                [dns] [norandomseq] [<max_conns> [<emb_lim>]]                                                            
        [no] static [(real_ifc, mapped_ifc)] {tcp|udp}                                                      
                {<mapped_ip>|interface} <mapped_port>                                                    
                {<real_ip> <real_port> [netmask <mask>]} |                                                          
                {access-list <acl_name>}                                        
                [dns] [norandomseq] [<max_conns> [<emb_lim>]]                                                            
pixfirewall(config)# show config                                
: Saved      
: Written by enable_15 at 11:59:49.105 UTC Mon Jul 9 2007                                                        
PIX Version 6.3(5)                  
interface ethernet0 10baset                          
interface ethernet1 100full                          
nameif ethernet0 outside security0                                  
nameif ethernet1 inside security100                                  
enable password GWrHuOdSnP3vVpxD encrypted                                          
passwd GWrHuOdSnP3vVpxD encrypted                                
hostname pixfirewall                    
domain-name Mydomain.org                          
fixup protocol dns maximum-length 512                                    
fixup protocol ftp 21                    
fixup protocol h323 h225 1720                            
fixup protocol h323 ras 1718-1719                                
fixup protocol http 80                      
fixup protocol ils 389                      
fixup protocol rsh 514                      
fixup protocol rtsp 554                      
fixup protocol sip 5060                      
fixup protocol sip udp 5060                          
fixup protocol skinny 2000                          
fixup protocol smtp 25                      
fixup protocol sqlnet 1521                          
fixup protocol tftp 69                      
access-list aclin permit tcp any host eq 4899                                                        
access-list aclin permit tcp any host eq smtp                                                        
access-list aclin permit tcp any host eq www                                                        
access-list aclin permit tcp any host eq citrix-ica                                                              
access-list aclin permit tcp host xx.x.xx.xx host eq ldap                                                                    
access-list vpn_nat_acl permit ip 255.255                                                                                
access-list outside_cryptomap_dyn_20 permit ip any                                                                              
access-list jaremotes_splitTunnelAcl permit ip any                                                                          
pager lines 24              
mtu outside 1500                
mtu inside 1500              
ip address outside                                              
ip address inside                                          
ip audit info action alarm                          
ip audit attack action alarm                            
ip local pool RemoteVPNPool                                                        
pdm logging informational 100                            
pdm history enable                  
arp timeout 14400                
global (outside) 1 interface                            
nat (inside) 0 access-list vpn_nat_acl                                      
nat (inside) 1 0 0                                  
static (inside,outside) netmask 0 0                                                                          
static (inside,outside) netmask 0 0                                                                          
static (inside,outside) netmask 0 0                                                                          
access-group aclin in interface outside                                      
route outside 1                                          
timeout xlate 0:05:00                    
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00                                                                            
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00                                                              
timeout sip-disconnect 0:02:00 sip-invite 0:03:00                                                
timeout uauth 0:05:00 absolute                              
aaa-server TACACS+ protocol tacacs+                                  
aaa-server TACACS+ max-failed-attempts 3                                        
aaa-server TACACS+ deadtime 10                              
aaa-server RADIUS protocol radius                                
aaa-server RADIUS max-failed-attempts 3                                      
aaa-server RADIUS deadtime 10                      

aaa-server LOCAL protocol localor a list of available commands
http server enable                  
http inside
LVL 28

Accepted Solution

batry_boy earned 500 total points
ID: 20378810
You already have translated to which is why you got the error when you put in the command that I gave you.  I didn't have your PIX config to reference before now.

Now that I see your config, here is what needs to be done:

access-list aclin permit tcp any host eq 3389

This should allow remote desktop to from anywhere on the Internet.  I don't recommend you keep it like this, however.  I would specify only certain source IP addresses that could remote desktop into an inside host, if possible.  It may not be in your situation, but opening up RDP to the world is just asking for trouble since any simple port scanner will detect the open port.
We Need Your Input!

WatchGuard is currently running a beta program for our new macOS Host Sensor for our Threat Detection and Response service. We're looking for more macOS users to help provide insight and feedback to help us make the product even better. Please sign up for our beta program today!


Author Comment

ID: 20381296
Thank you, its working! :) Can you give me the code also how to undo it if I need to? Thanks so much!
LVL 28

Expert Comment

ID: 20386258
To take it out, just retype that same command with the word "no" in front of it:

no access-list aclin permit tcp any host eq 3389


Author Comment

ID: 20386352
Thank you!

Featured Post

WEBINAR: GDPR Implemented - Tips & Lessons Learned

Join the WatchGuard team on Thursday, March 29th as we recount some valuable lessons learned in weighing the needs of a business against the new regulatory environment, look ahead at the two months left before implementation, and help you understand the steps you can take today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

You deserve ‘straight talk’ from your cloud provider about your risk, your costs, security, uptime and the processes that are in place to protect your mission-critical applications.
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question