Remote Desktop with Cisco VPN client Issue

I have been looking at the posts on configuring Remote Desktop access for vpn clients on Cisco Pix 501.  I am trying to figure out instead of mapping one IP to one host how can I give vpn clients full access to remote desktop to mulitple computers.  I have only one static IP.

Is there a command that can be used to allow remote desktop access to multiple computers or do i have to map an ip to each host?

thanks in advance.

Rosen500Asked:
Who is Participating?

[Webinar] Streamline your web hosting managementRegister Today

x
 
stuknhawaiiConnect With a Mentor Commented:
You should create a client access vpn, your users will use Cisco VPN Client. THen when they connnect it's just as if they're sitting on the LAN and they can RDP to any machine that has it enabled. If you need more info on this type of setup just let me know !!!
0
 
Rosen500Author Commented:
Here is my config info.  I can access network shares with no problem.  I am only having issues with remote desktop.  Remote desktop is enabled on all systems.

ssh 0.0.0.0 0.0.0.0 outside
ssh 172.19.1.22 255.255.255.255 inside
ssh timeout 30
console timeout 0
dhcpd address 172.19.1.20-172.19.1.35 inside
dhcpd dns 68.87.71.226 68.87.73.242
dhcpd lease 172800
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
username keith password BXZ8NND2QMJZjgCI encrypted privilege 5
username andy password d8paZjE08YYid1qh encrypted privilege 5
terminal width 80
Cryptochecksum:135e5d44b501152a35f4669a8e67e4a3
0
 
Rosen500Author Commented:
Let me try this again.

access-list inside_outbound_nat0_acl permit ip 172.19.1.0 255.255.255.0 Orchard 255.255.255.0
access-list inside_outbound_nat0_acl permit ip any 172.30.1.0 255.255.255.224
access-list outside_cryptomap_20 permit ip 172.19.1.0 255.255.255.0 Orchard 255.255.255.0
access-list vpnusers_splitTunnelAcl permit ip any any
access-list outside_cryptomap_dyn_20 permit ip any 172.30.1.0 255.255.255.224
access-list outbound permit ip 172.19.1.0 255.255.255.0 Orchard 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 74.94.169.193 255.255.255.252
ip address inside 172.19.1.1 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool s_vpnusers 172.30.1.10-172.30.1.25
pdm location Orchard 255.255.255.0 outside
pdm location 172.19.1.0 255.255.255.255 inside
pdm location 172.19.1.22 255.255.255.255 inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
route outside 0.0.0.0 0.0.0.0 66.x.x.x 1
route outside Orchard 255.255.255.0 66.x.x.x 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 172.19.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 66.x.x.x
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 66.x.x.x netmask 255.255.255.255 no-xauth no-config-mode
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup vpnusers address-pool s_vpnusers
vpngroup vpnusers split-tunnel vpnusers_splitTunnelAcl
vpngroup vpnusers idle-time 1800
vpngroup vpnusers password ********
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 outside
ssh 172.19.1.22 255.255.255.255 inside
ssh timeout 30
console timeout 0
dhcpd address 172.19.1.20-172.19.1.35 inside
dhcpd dns 172.19.1.49
dhcpd lease 172800
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80
Cryptochecksum:135e5d44b501152a35f4669a8e67e4a3
0
All Courses

From novice to tech pro — start learning today.