We help IT Professionals succeed at work.

Remote Desktop with Cisco VPN client Issue

I have been looking at the posts on configuring Remote Desktop access for vpn clients on Cisco Pix 501.  I am trying to figure out instead of mapping one IP to one host how can I give vpn clients full access to remote desktop to mulitple computers.  I have only one static IP.

Is there a command that can be used to allow remote desktop access to multiple computers or do i have to map an ip to each host?

thanks in advance.

Watch Question

You should create a client access vpn, your users will use Cisco VPN Client. THen when they connnect it's just as if they're sitting on the LAN and they can RDP to any machine that has it enabled. If you need more info on this type of setup just let me know !!!


Here is my config info.  I can access network shares with no problem.  I am only having issues with remote desktop.  Remote desktop is enabled on all systems.

ssh outside
ssh inside
ssh timeout 30
console timeout 0
dhcpd address inside
dhcpd dns
dhcpd lease 172800
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
username keith password BXZ8NND2QMJZjgCI encrypted privilege 5
username andy password d8paZjE08YYid1qh encrypted privilege 5
terminal width 80


Let me try this again.

access-list inside_outbound_nat0_acl permit ip Orchard
access-list inside_outbound_nat0_acl permit ip any
access-list outside_cryptomap_20 permit ip Orchard
access-list vpnusers_splitTunnelAcl permit ip any any
access-list outside_cryptomap_dyn_20 permit ip any
access-list outbound permit ip Orchard
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside
ip address inside
ip audit info action alarm
ip audit attack action alarm
ip local pool s_vpnusers
pdm location Orchard outside
pdm location inside
pdm location inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0 0
route outside 66.x.x.x 1
route outside Orchard 66.x.x.x 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 20 ipsec-isakmp
crypto map outside_map 20 match address outside_cryptomap_20
crypto map outside_map 20 set peer 66.x.x.x
crypto map outside_map 20 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp key ******** address 66.x.x.x netmask no-xauth no-config-mode
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup vpnusers address-pool s_vpnusers
vpngroup vpnusers split-tunnel vpnusers_splitTunnelAcl
vpngroup vpnusers idle-time 1800
vpngroup vpnusers password ********
telnet timeout 5
ssh outside
ssh inside
ssh timeout 30
console timeout 0
dhcpd address inside
dhcpd dns
dhcpd lease 172800
dhcpd ping_timeout 750
dhcpd auto_config outside
dhcpd enable inside
terminal width 80