CISCO ASA 5505 and RDP out

Posted on 2008-10-23
Last Modified: 2012-06-22
I have a ASA 5505 that is one of our field offices.  I am able to connect to it through CISCO ASDM (v 6).  The users need to go through the firewall and do a RDP session on a server on the Internet.  I know you need to open a port (believe 3389) but cannot figure out how to open port through ASDM.  Everything I have read only discusses how to open ASA for incoming RDP sessions but none for outgoing.  Plus everyone wants you to use Command Line, which I have no problem with but was hoping to use the ASDM interface.

Any help will be appreciated.
Question by:amforem
  • 5
  • 3

Expert Comment

Comment Utility
At the field office the users that are behind the firewall are they in the INSIDE network? Is the security level 100 ?  By default users in the inside network are allowed to to go to any security level lower then 100  with a default  access list IP any any. That access list is a reflexive access list which allows return traffic on all established connections.

Is there a firewall at the remote location? Is it allowing Port 3389 inbound?

Author Comment

Comment Utility
The users in the field office are behind the firewall on an inside network.  The last time I worked on a Cisco was a 2600 about 7 years ago and have never been trained on the ASDM but from what I see the level is 100.

I have no idea about the remote location except that they do have other users from other offices able to access the RDP server.

Expert Comment

Comment Utility
Can you produce a show run ? Log into the firewall CLI and in priv mode enter show run command. copy that into here. I can check  your configuration for you. If everything adds up, then permissions are incorrect for remote desktop accessibility for your users or a upstream device or firewall is blocking the port inbound.

Author Comment

Comment Utility
Thanks for your help.  Hopefully the below will help.

Result of the command: "show run"

: Saved
ASA Version 8.0(3)
hostname Oak-Ridge
domain-name ntlan1.local
enable password uhWqqZ.b7kayfoam encrypted
name Corporate1
name Corporate5
name BellSouth_DNS1
name BellSouth_DNS2
name BranchTN description Branch LAN
name Corporate_ISP
name Branch_ISP
name Corporate
interface Vlan1
 nameif LAN
 security-level 100
 ip address
interface Vlan2
 nameif WAN
 security-level 0
 pppoe client vpdn group OAKRIDGE-PPOE
 ip address pppoe
interface Ethernet0/0
 switchport access vlan 2
interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
passwd 2KFQnbNIdI.2KYOU encrypted
banner exec *****************************************************
banner exec * * * *              W A R N I N G            * * * *
banner exec * * * *    THIS CONNECTION IS BEING LOGGED    * * * *
banner exec * * * *   UNAUTHORIZED ACCESS IS PROHIBITED   * * * *
banner exec *****************************************************
boot system disk0:/asa803.bin
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup LAN
dns server-group DefaultDNS
 name-server BellSouth_DNS1
 name-server BellSouth_DNS2
 domain-name ntlan1.local
object-group service DATAMover
 service-object gre
 service-object tcp eq pptp
access-list LAN_nat0_outbound extended permit ip Corporate
access-list LAN_nat0_outbound extended permit ip BranchTN
access-list WAN_nat0_outbound extended permit ip any Corporate
access-list VPNClient_splitTunnelAcl standard permit
access-list WAN_cryptomap_1 extended permit ip Corporate
access-list WAN_2_cryptomap extended permit ip BranchTN
access-list LAN_access_in extended permit ip any any
access-list Trackit extended permit tcp Corporate
pager lines 24
logging enable
logging list Logs level notifications
logging asdm informational
logging class auth trap notifications
logging class bridge trap notifications
logging class config trap notifications
logging class sys trap notifications
logging class vpdn trap notifications
logging class vpn trap notifications
logging class webfo trap notifications
logging class webvpn trap notifications
logging class ca trap notifications
logging class email trap notifications
logging class eap trap notifications
logging class svc trap notifications
logging class csd trap notifications
logging class ssl trap notifications
logging class dap trap notifications
mtu LAN 1500
mtu WAN 1500
ip local pool VPNPOOL mask
ip verify reverse-path interface LAN
ip verify reverse-path interface WAN
ip audit name IPInfo info action alarm drop
ip audit name IPAttack attack action alarm drop
ip audit interface LAN IPInfo
ip audit interface LAN IPAttack
ip audit interface WAN IPInfo
ip audit interface WAN IPAttack
ip audit signature 2000 disable
ip audit signature 2001 disable
ip audit signature 2004 disable
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm603.bin
asdm history enable
arp timeout 14400
global (WAN) 1 interface
nat (LAN) 0 access-list LAN_nat0_outbound
nat (LAN) 1
nat (WAN) 0 access-list WAN_nat0_outbound
access-group LAN_access_in in interface LAN
route WAN 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication telnet console LOCAL
aaa authentication ssh console LOCAL
http server enable
http LAN
http Corporate LAN
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map WAN_map 1 match address WAN_cryptomap_1
crypto map WAN_map 1 set pfs
crypto map WAN_map 1 set peer Corporate_ISP
crypto map WAN_map 1 set transform-set ESP-3DES-SHA
crypto map WAN_map 1 set phase1-mode aggressive
crypto map WAN_map 1 set reverse-route
crypto map WAN_map 2 match address WAN_2_cryptomap
crypto map WAN_map 2 set pfs
crypto map WAN_map 2 set peer Branch_ISP
crypto map WAN_map 2 set transform-set ESP-3DES-SHA
crypto map WAN_map 2 set reverse-route
crypto map WAN_map interface WAN
crypto isakmp enable WAN
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
no crypto isakmp nat-traversal
telnet LAN
telnet timeout 5
ssh Corporate LAN
ssh Corporate_ISP WAN
ssh timeout 5
console timeout 0
management-access LAN
vpdn group OAKRIDGE-PPOE request dialout pppoe
vpdn group OAKRIDGE-PPOE localname
vpdn group OAKRIDGE-PPOE ppp authentication pap
vpdn username password ********* store-local
dhcpd dns Corporate1
dhcpd domain ntlan1.local
dhcpd address LAN
vpnclient server
vpnclient mode client-mode
vpnclient vpngroup TestGroup password ********
vpnclient username UserTest password ********
vpnclient management tunnel
threat-detection basic-threat
threat-detection statistics
ntp server source LAN prefer
 enable WAN
 csd image disk0:/SD_asa-
 csd enable
 svc image disk0:/sslclient-win-2.2.0133-k9.pkg 1
group-policy DfltGrpPolicy attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
group-policy WebVPNAdminPolicy internal
group-policy WebVPNAdminPolicy attributes
 vpn-tunnel-protocol svc webvpn
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list none
 default-domain value ntlan1.local
  customization value DfltCustomization
group-policy AFMVPNTunnel internal
group-policy AFMVPNTunnel attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec
username XXXXXXXXXX password .OGfR0JjwOsrQE90 encrypted privilege 15
tunnel-group type ipsec-l2l
tunnel-group general-attributes
 default-group-policy AFMVPNTunnel
tunnel-group ipsec-attributes
 pre-shared-key *
tunnel-group AFMVPNClient type remote-access
tunnel-group AFMVPNClient general-attributes
tunnel-group AFMWebAdmin type remote-access
tunnel-group AFMWebAdmin general-attributes
 address-pool VPNPOOL
 default-group-policy WebVPNAdminPolicy
tunnel-group type ipsec-l2l
tunnel-group general-attributes
 default-group-policy AFMVPNTunnel
tunnel-group ipsec-attributes
 pre-shared-key *
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
service-policy global_policy global
prompt hostname context
: end
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline


Assisted Solution

leonjs earned 150 total points
Comment Utility
Iis there a Terminal Server gateway involved?

Author Comment

Comment Utility
I have no idea.  All I know is that the user clicks on the RDP client icon on their desktop, it sends them to an IP address on the web where they should be able to login to the server.

Assisted Solution

gratex_ssd earned 100 total points
Comment Utility
You don't need to do anything... I think you have everythig good set....

Your users have NAT defined through your firewall and also access list  LAN->WAN is a bit benevolent (look at part of your config):

access-list LAN_nat0_outbound extended permit ip Corporate
access-list LAN_nat0_outbound extended permit ip BranchTN
access-list LAN_access_in extended permit ip any any
global (WAN) 1 interface
nat (LAN) 0 access-list LAN_nat0_outbound
nat (LAN) 1
access-group LAN_access_in in interface LAN

If there is a problem with acces and you have FOS 7.2 or higher, use "packet tracer" feature to find where is problem...

I think, you have to try to connect from your internet space (in front of firewall) to that RDP location... It looks like they have open that connection only to allowed IP adresses... If your PC (in front of firewall / or with FW IP set -> and on the same cable as FW before) will not connect, then problem is at the other  side...

I hope this helps...

Author Comment

Comment Utility
Let me say first that I screwed up and have wasted your time.  It seems that I did not know about one step.  The user has to do a VPN connection to the external site then do the RDP.  It is the VPN connection that is messing up.  When he tries to connect through the VPN he is getting: Error Message   305006: regular translation creation failed for protocol 47 src LAN: dst dst WAN:

What I have found so far is for the PIX firewall so do not want to use unless am sure it will work for the ASA 5505.

Thanks and sorry again


Accepted Solution

amforem earned 0 total points
Comment Utility
I finally found my solution.  I did not have "Inspect PPTP" turned on.

Thanks for your help.

Featured Post

How to improve team productivity

Quip adds documents, spreadsheets, and tasklists to your Slack experience
- Elevate ideas to Quip docs
- Share Quip docs in Slack
- Get notified of changes to your docs
- Available on iOS/Android/Desktop/Web
- Online/Offline

Join & Write a Comment

I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now