Solved

Cisco firewall port forwarding

Posted on 2013-05-16
4
626 Views
Last Modified: 2014-08-18
I am trying to set up a port forward on a cisco isa550 firewall. I am wanting to forward port 3390 to an internal IP address. I have set up the port forward and ACL in the firewall, but every time I try to remote in with Remote Desktop it does not work. It will work from within the the network by typing the internal IP address instead of the wan address. Any ideas?
0
Comment
Question by:ltwilliams
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
Akinsd earned 500 total points
ID: 39173335
Port forwarding is Static NAT in enterprise devices.
0
 
LVL 1

Author Comment

by:ltwilliams
ID: 39173346
So you are saying dont put anything in port forwarding, use static nat?
0
 
LVL 18

Expert Comment

by:Akinsd
ID: 39173374
Looks like you are using ASDM

I use command line as that gives me a lot more control. You can use that, I guess. To be safe, turn on the feature that lets you view cli commands before delivering it to the device. I believe that is in preferences somewhere.

The idea is to identify source IP address and port. You can specify any for both. Identify the destination port 3390. Them specify the IP or host name of computer you're forwarding to.

To access the PC on that port, you may need to specify the port after the public IP. Generally, RDP will append :3389 for RDP communications when not specified. Eg
10.10.10.10:3390

Verify that RDP traffic is permitted on your firewall (ASA) and the firewall of the destination pc (if firewall is enabled there)

Lastly, make sure to turn on RDP feature on the destination PC and the user you are logging on as is allowed (if 'everyone' is not granted access)
0
 
LVL 18

Expert Comment

by:fgasimzade
ID: 39178731
Can you post your config?
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
Need to grow your business through quality cloud solutions? With everything required to build a cloud platform and solution, you may feel like the distance between you and the cloud is quite long. Help is here. Spend some time learning about the Con…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now