Solved

terminal server RDP session through site-to-site VPN

Posted on 2014-01-29
5
917 Views
Last Modified: 2014-05-10
Well, here I am with another stumbling block.

Desired Outline:

RDP terminal server session ---> Cisco ASA 5505 ---> Colo ASA 5510 ---> switch ---> TS



Our branch office has a MPLS T1 as their primary and the Site-to-site VPN is their backup. I was all TS rdp session to go through the VPN, and everything else to use the T1.

I assume I can do this via policy based routing or a general ip route.

Test:
I configured a ip route <server IP> <ASA inside interface>

Branch office ASA ACL:
access-list outside-in extended permit any interface outside eq 3389

Colo ASA ACL:
access-list outside-in extended permit any interface outside eq 3389


Other configs:
I create a rdp-mss class-map

and I tried "crypto ipsec df-bit clear"

I can ping the Terminal server, but, it will not initiate a RDP session.

I also performed a telnet <server IP> 3389, but, the connection failed.


Thank you again ahead of time. I'll paste my configs later.
0
Comment
Question by:RenoGryphon
  • 3
5 Comments
 
LVL 7

Expert Comment

by:Ned Ramsay
ID: 39819790
1) confirm with traceroute that the packets are going on the desired path, not going over the MPLS.
2) try pinging/traceroute from the terminal server back to HQ (did you setup a static route on the terminal servers end to route back via the VPN?)

If 1 and 2 work then the problem is likely the server.

Check the TS for OS based static routes (ive seen this happen so many times).
Ensure the terminal server has the VPN network in its allowed list for RDP and the firewall is disabled (may not see it as a trusted connection).
0
 
LVL 28

Expert Comment

by:asavener
ID: 39838913
I don't think you need the firewall rules; the traffic should be coming in over the VPN, which will bypass firewall rules.

Can you run "show crypto ipsec sa" on both ASAs?

Then try the RDP session.

Then "show crypto ipsec sa" again on both ASAs.

We're looking for the encaps/decaps counters to increase symmetrically on both ASAs.


I suspect what is happening is that you've got an asymmetric route.  Pings will work because they're stateless; RDP fails because the ASA doesn't see a successful 3-way handshake.


Example:  

SYN:  ServerA->MPLSRouterA->ASA-A->VPN->ASA-B->ServerB

SYN-ACK: ServerB->MPLSRouterB->MPLS->MPLSRouterA->ServerA

ACK: ServerA->MPLSRouterA->ASA-A (Blocked!  The ASA never saw the SYN-ACK from ServerB, so it doesn't think it's a valid connection.)


You will have to add a route on the RDP server to route all traffic to SiteA through the VPN.

If this test works, then you can configure policy-based routing so that only RDP traffic is sent over the VPN.

The more complexity you add, though, the more difficult it will be to support the solution.
0
 

Author Comment

by:RenoGryphon
ID: 39855071
Thank you both for your help!! ASAvener, I don't know why I didn't consider this reason for ICMP working and not TCP.
I'll make sure to do what you instructed on each ASA and then post the results.

After this I can then start working on the rest.
0
 

Accepted Solution

by:
RenoGryphon earned 0 total points
ID: 40024580
Very sorry for the long wait we have been able to resolve this issue.
Thank again everyone for the help!!
0
 

Author Closing Comment

by:RenoGryphon
ID: 40055625
We were able to provide a different solution :)
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Juniper VPN devices are a popular alternative to using Cisco products. Last year I needed to set up an international site-to-site VPN over the Internet, but the client had high security requirements -- FIPS 140. What and Why of FIPS 140 Federa…
OpenVPN is a great open source VPN server that is capable of providing quick and easy VPN access to your network on the cheap.  By default the software is configured to allow open access to your network.  But what if you want to restrict users to on…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now