Difference between RDP, ICMP and IP protocols.

Posted on 2009-05-04
Last Modified: 2012-05-06

I have set up an IPSec policy for a machine to allow RDP and ICMP but require security for all IP traffic.
Now I can ping the machine to which the policy is applied but can not RDP to it.
I was wondering why ICMP is working and RDP is not, though RDP works at the transport layer and the ICMP at the IP layer or network layer.


Question by:jskfan
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
LVL 32

Accepted Solution

Kamran Arshad earned 500 total points
ID: 24302622

Have you allowed the port TCP 3389 which is used for RDP?

Author Comment

ID: 24305231
<<Have you allowed the port TCP 3389 which is used for RDP?>>

Oh yes, I created a rule that allows RDP for TCP port 3389, but it seems like the Require security for AllIPTraffic overrides that rule. But I wonder why it doesn't override the rule of ALLICMPTraffic(permit).

Author Comment

ID: 24312664
I gues I should have put 3389 where it says "From this port" , and select to Any Port.
What I did was "From Any Port" to "This Port" and typed 3389 in This port field.

Now it works.

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Problem entering Passive Mode with FileZilla ftp Server 7 97
SIEM traffic 5 64
DHCP behind catalyst 3750 POE-48 2 17
hsrp tracking 2 9
A few months ago I attended the Rocky Mountain IPv6 Summit which was a two-day educational event; it was the 3rd annual conference held here in Denver, Colorado that was held at the Hyatt Regency Denver at the Colorado Convention Center. It was an e…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question