I am trying to configure my firewall to let Remote Desktop through the Pix to our terminal server.
We have 2 machines one an SBS server which uses port 3389 and the TS which uses port 3390. I can't get either to let me through.
Enclosed is a portion of the running config...can anyone help
access-list acl-inside permit tcp any any eq ftp
access-list acl-inside permit udp any any eq isakmp
access-list acl-inside permit udp any any eq ntp
access-list acl-inside permit udp any any eq 4500
access-list acl-inside permit tcp any any eq domain
access-list acl-inside permit tcp any any eq www
access-list acl-inside permit tcp any any eq https
access-list acl-inside permit tcp any any eq pop3
access-list acl-inside permit tcp any any eq smtp
access-list acl-inside permit tcp any any eq 3389
access-list acl-inside permit tcp any any eq 3390
access-list allvpnsites permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside dhcp setroute
ip address inside in-LaycocksPix 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnippool 10.0.0.1-10.0.0.254
pdm location 192.168.0.0 255.255.255.0 inside
pdm location in-mail 255.255.255.255 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 10.0.0.0 255.255.255.0 outside
pdm location 192.168.0.2 255.255.255.255 inside
pdm location 192.168.0.5 255.255.255.255 inside
pdm location 0.0.0.0 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list allvpnsites
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface smtp in-mail smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3389 in-mail 3389 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 25 in-mail 25 netmask 255.255.255.255 0 0
static (inside,outside) udp interface snmp in-mail snmp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3390 192.168.0.5 3390 netmask 255.255.255.255 0 0
access-group acl-outside in interface outside
access-group acl-inside in interface inside
We have 2 machines one an SBS server which uses port 3389 and the TS which uses port 3390. I can't get either to let me through.
Enclosed is a portion of the running config...can anyone help
access-list acl-inside permit tcp any any eq ftp
access-list acl-inside permit udp any any eq isakmp
access-list acl-inside permit udp any any eq ntp
access-list acl-inside permit udp any any eq 4500
access-list acl-inside permit tcp any any eq domain
access-list acl-inside permit tcp any any eq www
access-list acl-inside permit tcp any any eq https
access-list acl-inside permit tcp any any eq pop3
access-list acl-inside permit tcp any any eq smtp
access-list acl-inside permit tcp any any eq 3389
access-list acl-inside permit tcp any any eq 3390
access-list allvpnsites permit ip 192.168.0.0 255.255.255.0 10.0.0.0 255.255.255.0
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside dhcp setroute
ip address inside in-LaycocksPix 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnippool 10.0.0.1-10.0.0.254
pdm location 192.168.0.0 255.255.255.0 inside
pdm location in-mail 255.255.255.255 inside
pdm location 192.168.1.0 255.255.255.0 inside
pdm location 10.0.0.0 255.255.255.0 outside
pdm location 192.168.0.2 255.255.255.255 inside
pdm location 192.168.0.5 255.255.255.255 inside
pdm location 0.0.0.0 255.255.255.255 outside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list allvpnsites
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface smtp in-mail smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3389 in-mail 3389 netmask 255.255.255.255 0 0
static (inside,outside) udp interface 25 in-mail 25 netmask 255.255.255.255 0 0
static (inside,outside) udp interface snmp in-mail snmp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3390 192.168.0.5 3390 netmask 255.255.255.255 0 0
access-group acl-outside in interface outside
access-group acl-inside in interface inside