silentblue
Technical User
Hi guys and girls I need help as this has been driving me crazy for 3 weeks now!
I'm trying to setup ASA 5510 to allow incoming traffic port 3389 (Terminal Server) to an inside server.
I created only one static NAT entry to translate outside public address to inside private address.
I allowed tcp 3389 traffic in the ACL.
When I try to connect to the public address, I can see the syslog that an inbound tcp connection is established with NAT. However doesn't connect and after 30seconds the connection gets teared down.
My Config.
ciscoasa# config terminal
ciscoasa(config)# show config
: Saved
: Written by enable_15 at 12:10:11.896 GMT/BDT Thu Oct 12 2006
!
ASA Version 7.2(1)
!
hostname ciscoasa
domain-name xxxxxxxxxxxxxxxxxxxxx
enable password 8Ry2YjIyt7RRXU24 encrypted
names
dns-guard
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address x.x.x.82 255.255.255.240
!
interface Ethernet0/1
nameif Inside
security-level 100
ip address 172.16.100.100 255.255.0.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
passwd 2KFQnbNIdI.
boot system disk0:/pix721.bin
ftp mode passive
clock timezone GMT/BST 0
clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
dns server-group DefaultDNS
domain-name xxxxxxxxxxxxxxxxxxx
object-group service 4XDealer tcp
port-object range 4000 4100
access-list Outside_access_in extended permit tcp any host x.x.x.83 eq 3389
pager lines 24
logging enable
logging asdm informational
mtu Outside 1500
mtu Inside 1500
mtu management 1500
ip local pool RemoteIPs 172.16.250.1-172.16.250.254 mask 255
asdm image disk0:/asdm521.bin
no asdm history enable
arp timeout 14400
nat-control
global (Outside) 1 interface
nat (Inside) 1 0.0.0.0 0.0.0.0
static (Outside,Inside) 172.16.100.104 x.x.x.83 netmask 255.255.255.255
access-group Outside_access_in in interface Outside
route Outside 0.0.0.0 0.0.0.0 x.x.x.81 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
Regards,
Darren
I'm trying to setup ASA 5510 to allow incoming traffic port 3389 (Terminal Server) to an inside server.
I created only one static NAT entry to translate outside public address to inside private address.
I allowed tcp 3389 traffic in the ACL.
When I try to connect to the public address, I can see the syslog that an inbound tcp connection is established with NAT. However doesn't connect and after 30seconds the connection gets teared down.
My Config.
ciscoasa# config terminal
ciscoasa(config)# show config
: Saved
: Written by enable_15 at 12:10:11.896 GMT/BDT Thu Oct 12 2006
!
ASA Version 7.2(1)
!
hostname ciscoasa
domain-name xxxxxxxxxxxxxxxxxxxxx
enable password 8Ry2YjIyt7RRXU24 encrypted
names
dns-guard
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address x.x.x.82 255.255.255.240
!
interface Ethernet0/1
nameif Inside
security-level 100
ip address 172.16.100.100 255.255.0.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
passwd 2KFQnbNIdI.
boot system disk0:/pix721.bin
ftp mode passive
clock timezone GMT/BST 0
clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
dns server-group DefaultDNS
domain-name xxxxxxxxxxxxxxxxxxx
object-group service 4XDealer tcp
port-object range 4000 4100
access-list Outside_access_in extended permit tcp any host x.x.x.83 eq 3389
pager lines 24
logging enable
logging asdm informational
mtu Outside 1500
mtu Inside 1500
mtu management 1500
ip local pool RemoteIPs 172.16.250.1-172.16.250.254 mask 255
asdm image disk0:/asdm521.bin
no asdm history enable
arp timeout 14400
nat-control
global (Outside) 1 interface
nat (Inside) 1 0.0.0.0 0.0.0.0
static (Outside,Inside) 172.16.100.104 x.x.x.83 netmask 255.255.255.255
access-group Outside_access_in in interface Outside
route Outside 0.0.0.0 0.0.0.0 x.x.x.81 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
Regards,
Darren