Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


CISCO ASA 5505 and RDP out

Posted on 2008-10-23
Medium Priority
Last Modified: 2012-06-22
I have a ASA 5505 that is one of our field offices.  I am able to connect to it through CISCO ASDM (v 6).  The users need to go through the firewall and do a RDP session on a server on the Internet.  I know you need to open a port (believe 3389) but cannot figure out how to open port through ASDM.  Everything I have read only discusses how to open ASA for incoming RDP sessions but none for outgoing.  Plus everyone wants you to use Command Line, which I have no problem with but was hoping to use the ASDM interface.

Any help will be appreciated.
Question by:amforem
  • 5
  • 3

Expert Comment

ID: 22789957
At the field office the users that are behind the firewall are they in the INSIDE network? Is the security level 100 ?  By default users in the inside network are allowed to to go to any security level lower then 100  with a default  access list IP any any. That access list is a reflexive access list which allows return traffic on all established connections.

Is there a firewall at the remote location? Is it allowing Port 3389 inbound?

Author Comment

ID: 22790070
The users in the field office are behind the firewall on an inside network.  The last time I worked on a Cisco was a 2600 about 7 years ago and have never been trained on the ASDM but from what I see the level is 100.

I have no idea about the remote location except that they do have other users from other offices able to access the RDP server.

Expert Comment

ID: 22790165
Can you produce a show run ? Log into the firewall CLI and in priv mode enter show run command. copy that into here. I can check  your configuration for you. If everything adds up, then permissions are incorrect for remote desktop accessibility for your users or a upstream device or firewall is blocking the port inbound.
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.


Author Comment

ID: 22790226
Thanks for your help.  Hopefully the below will help.

Result of the command: "show run"

: Saved
ASA Version 8.0(3)
hostname Oak-Ridge
domain-name ntlan1.local
enable password uhWqqZ.b7kayfoam encrypted
name Corporate1
name Corporate5
name BellSouth_DNS1
name BellSouth_DNS2
name BranchTN description Branch LAN
name xxx.xxx.xxx.xxx Corporate_ISP
name Branch_ISP
name Corporate
interface Vlan1
 nameif LAN
 security-level 100
 ip address
interface Vlan2
 nameif WAN
 security-level 0
 pppoe client vpdn group OAKRIDGE-PPOE
 ip address pppoe
interface Ethernet0/0
 switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
passwd 2KFQnbNIdI.2KYOU encrypted
banner exec *****************************************************
banner exec * * * *              W A R N I N G            * * * *
banner exec * * * *    THIS CONNECTION IS BEING LOGGED    * * * *
banner exec * * * *   UNAUTHORIZED ACCESS IS PROHIBITED   * * * *
banner exec *****************************************************
boot system disk0:/asa803.bin
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup LAN
dns server-group DefaultDNS
 name-server BellSouth_DNS1
 name-server BellSouth_DNS2
 domain-name ntlan1.local
object-group service DATAMover
 service-object gre
 service-object tcp eq pptp
access-list LAN_nat0_outbound extended permit ip Corporate
access-list LAN_nat0_outbound extended permit ip BranchTN
access-list WAN_nat0_outbound extended permit ip any Corporate
access-list VPNClient_splitTunnelAcl standard permit
access-list WAN_cryptomap_1 extended permit ip Corporate
access-list WAN_2_cryptomap extended permit ip BranchTN
access-list LAN_access_in extended permit ip any any
access-list Trackit extended permit tcp Corporate
pager lines 24
logging enable
logging list Logs level notifications
logging asdm informational
logging class auth trap notifications
logging class bridge trap notifications
logging class config trap notifications
logging class sys trap notifications
logging class vpdn trap notifications
logging class vpn trap notifications
logging class webfo trap notifications
logging class webvpn trap notifications
logging class ca trap notifications
logging class email trap notifications
logging class eap trap notifications
logging class svc trap notifications
logging class csd trap notifications
logging class ssl trap notifications
logging class dap trap notifications
mtu LAN 1500
mtu WAN 1500
ip local pool VPNPOOL mask
ip verify reverse-path interface LAN
ip verify reverse-path interface WAN
ip audit name IPInfo info action alarm drop
ip audit name IPAttack attack action alarm drop
ip audit interface LAN IPInfo
ip audit interface LAN IPAttack
ip audit interface WAN IPInfo
ip audit interface WAN IPAttack
ip audit signature 2000 disable
ip audit signature 2001 disable
ip audit signature 2004 disable
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm603.bin
asdm history enable
arp timeout 14400
global (WAN) 1 interface
nat (LAN) 0 access-list LAN_nat0_outbound
nat (LAN) 1
nat (WAN) 0 access-list WAN_nat0_outbound
access-group LAN_access_in in interface LAN
route WAN 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication telnet console LOCAL
aaa authentication ssh console LOCAL
http server enable
http LAN
http Corporate LAN
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map WAN_map 1 match address WAN_cryptomap_1
crypto map WAN_map 1 set pfs
crypto map WAN_map 1 set peer Corporate_ISP
crypto map WAN_map 1 set transform-set ESP-3DES-SHA
crypto map WAN_map 1 set phase1-mode aggressive
crypto map WAN_map 1 set reverse-route
crypto map WAN_map 2 match address WAN_2_cryptomap
crypto map WAN_map 2 set pfs
crypto map WAN_map 2 set peer Branch_ISP
crypto map WAN_map 2 set transform-set ESP-3DES-SHA
crypto map WAN_map 2 set reverse-route
crypto map WAN_map interface WAN
crypto isakmp enable WAN
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
no crypto isakmp nat-traversal
telnet LAN
telnet timeout 5
ssh Corporate LAN
ssh Corporate_ISP WAN
ssh timeout 5
console timeout 0
management-access LAN
vpdn group OAKRIDGE-PPOE request dialout pppoe
vpdn group OAKRIDGE-PPOE localname americanforest@bellsouth.net
vpdn group OAKRIDGE-PPOE ppp authentication pap
vpdn username americanforest@bellsouth.net password ********* store-local
dhcpd dns Corporate1
dhcpd domain ntlan1.local
dhcpd address LAN
vpnclient server
vpnclient mode client-mode
vpnclient vpngroup TestGroup password ********
vpnclient username UserTest password ********
vpnclient management tunnel
threat-detection basic-threat
threat-detection statistics
ntp server source LAN prefer
 enable WAN
 csd image disk0:/SD_asa-
 csd enable
 svc image disk0:/sslclient-win-2.2.0133-k9.pkg 1
group-policy DfltGrpPolicy attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
group-policy WebVPNAdminPolicy internal
group-policy WebVPNAdminPolicy attributes
 vpn-tunnel-protocol svc webvpn
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list none
 default-domain value ntlan1.local
  customization value DfltCustomization
group-policy AFMVPNTunnel internal
group-policy AFMVPNTunnel attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec
username XXXXXXXXXX password .OGfR0JjwOsrQE90 encrypted privilege 15
tunnel-group xxx.xxx.xxx.xxx type ipsec-l2l
tunnel-group xxx.xxx.xxx.xxx general-attributes
 default-group-policy AFMVPNTunnel
tunnel-group xxx.xxx.xxx.xxx ipsec-attributes
 pre-shared-key *
tunnel-group AFMVPNClient type remote-access
tunnel-group AFMVPNClient general-attributes
tunnel-group AFMWebAdmin type remote-access
tunnel-group AFMWebAdmin general-attributes
 address-pool VPNPOOL
 default-group-policy WebVPNAdminPolicy
tunnel-group type ipsec-l2l
tunnel-group general-attributes
 default-group-policy AFMVPNTunnel
tunnel-group ipsec-attributes
 pre-shared-key *
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
service-policy global_policy global
prompt hostname context
: end

Assisted Solution

leonjs earned 600 total points
ID: 22790454
Iis there a Terminal Server gateway involved?

Author Comment

ID: 22790472
I have no idea.  All I know is that the user clicks on the RDP client icon on their desktop, it sends them to an IP address on the web where they should be able to login to the server.

Assisted Solution

gratex_ssd earned 400 total points
ID: 22790625
You don't need to do anything... I think you have everythig good set....

Your users have NAT defined through your firewall and also access list  LAN->WAN is a bit benevolent (look at part of your config):

access-list LAN_nat0_outbound extended permit ip Corporate
access-list LAN_nat0_outbound extended permit ip BranchTN
access-list LAN_access_in extended permit ip any any
global (WAN) 1 interface
nat (LAN) 0 access-list LAN_nat0_outbound
nat (LAN) 1
access-group LAN_access_in in interface LAN

If there is a problem with acces and you have FOS 7.2 or higher, use "packet tracer" feature to find where is problem...

I think, you have to try to connect from your internet space (in front of firewall) to that RDP location... It looks like they have open that connection only to allowed IP adresses... If your PC (in front of firewall / or with FW IP set -> and on the same cable as FW before) will not connect, then problem is at the other  side...

I hope this helps...

Author Comment

ID: 22790921
Let me say first that I screwed up and have wasted your time.  It seems that I did not know about one step.  The user has to do a VPN connection to the external site then do the RDP.  It is the VPN connection that is messing up.  When he tries to connect through the VPN he is getting: Error Message   305006: regular translation creation failed for protocol 47 src LAN: dst dst WAN:

What I have found so far is for the PIX firewall so do not want to use unless am sure it will work for the ASA 5505.

Thanks and sorry again


Accepted Solution

amforem earned 0 total points
ID: 22822373
I finally found my solution.  I did not have "Inspect PPTP" turned on.

Thanks for your help.

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
With just a little bit of  SQL and VBA, many doors open to cool things like synchronize a list box to display data relevant to other information on a form.  If you have never written code or looked at an SQL statement before, no problem! ...  give i…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question