Port Forward on an ASA

MulLa

Golden Member
Jun 20, 2000
1,755
0
0
Hi All,

Haven't been here for a while, things looked a little quiet compared to a few years back

Anyway, hope someone can point me in the right direct in regards to port forwarding RDP traffic on an ASA. For the life of me I couldn't work out why the below config isn't working, I can post full config if anyone needs more info.

Also this is a lab environment so security isn't a concern with rpd.


* 10.10.10.4 is the inside TS server that I'm trying to access.

access-list outside_access_in extended permit tcp any interface outside eq 3389
static (inside,outside) tcp interface 3389 10.10.10.4 3389 netmask 255.255.255.255 0 0
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside

Thanks heaps in advance!
 

nightowl

Golden Member
Oct 12, 2000
1,935
0
0
Granted it is early for me, but everything looks good. The only thing that is an unknown is what the inside access-list contains. You could be blocking the traffic coming back from the RDP server with your inside access-list.
 

MulLa

Golden Member
Jun 20, 2000
1,755
0
0
Thanks nightowl, I think I remember seeing your name from way back

I certainly didn't think about the inside access list, but upon further inspection, the inside list seemed to be an allow all list as follows.

access-list outside_access_in remark Inbound Access from Outside
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit ip any any
access-list inside_access_in extended permit ip any any

static (inside,outside) tcp interface 3389 10.10.10.4 3389 netmask 255.255.255.255 0 0
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside

Didn't think anything is out of the ordinary myself and got one of my mate to check it as well. We're both stumped as to why it refuses to work
 

nightowl

Golden Member
Oct 12, 2000
1,935
0
0
MuLa, did you try using the packet tracer just to make sure that nothing else is blocking/dropping the traffic on port 3389? Also, I am assuming that you can RDP to the device without going through the ASA?
 

jlazzaro

Golden Member
May 6, 2004
1,743
0
0
are you getting hits on the outside access-list? do you have logging configured to see what exactly is getting blocked?

it shouldn't matter, but try using the actual ip address rather than the interface command
 

MulLa

Golden Member
Jun 20, 2000
1,755
0
0
Hi Guys, really appreciate the assistance.

I have tried the packet tracer if I have the destination as the outside ASA interface everything checks out. If I have the destination as the TS box then the NAT rule seemed to be dropping packet. I really don't understand why it's dropping packets here

Config
static (inside,outside) tcp interface 3389 10.10.10.4 3389 netmask 255.255.255.255 match tcp inside host 10.10.10.4 eq 3389 outside any static translation to 10.96.253.68/3389 translate_hits = 0, untranslate_hits = 1

Tried using actual IPs rather than interface to no avail

This is mad! And it's only a demo lab that I'm helping to setup!!
 

MulLa

Golden Member
Jun 20, 2000
1,755
0
0
Thanks heaps in advance guys for the help! Below are various "shows" and the full congif. Sorry this is a little long. As mentioned before, this is a lab environment thus all IPs are private ranges.

10.96.253.71 <- this is the box that we're TS'ing from.


ASA1# sh xlate detail
1 in use, 1 most used
Flags: D - DNS, d - dump, I - identity, i - dynamic, n - no random,
r - portmap, s - static
TCP PAT from inside:10.10.10.4/3389 to outside:10.96.253.68/3389 flags sr
ASA1#


eASA1# sh nat

NAT policies on Interface inside:
match tcp inside host 10.10.10.4 eq 3389 outside any
static translation to 10.96.253.68/3389
translate_hits = 0, untranslate_hits = 1
ASA1#


ASA1# sh run
: Saved
:
ASA Version 8.0(2)
!
hostname ASA1
domain-name XXXX
enable password XXXX encrypted
names
dns-guard
!
interface Ethernet0/0
nameif inside
security-level 100
ip address 10.10.10.254 255.255.255.0
!
interface Ethernet0/1
nameif outside
security-level 0
ip address 10.96.253.68 255.255.255.224
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif ASA_Management
security-level 100
ip address 192.168.1.1 255.255.255.0
ospf cost 10
management-only
!
passwd XXXX encrypted
boot system disk0:/asa802-k8.bin
ftp mode passive
clock timezone EST 10
clock summer-time EDT recurring last Sun Oct 2:00 last Sun Mar 3:00
dns domain-lookup ASA_Management
dns server-group DefaultDNS
name-server 10.96.253.73
domain-name XXXX
access-list outside_access_in remark Inbound Access from Outside
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit ip any any
access-list inside_access_in extended permit ip any any
pager lines 24
logging enable
logging trap debugging
logging asdm informational
logging host ASA_Management 10.96.253.79
logging debug-trace
logging permit-hostdown
mtu inside 1500
mtu outside 1500
mtu ASA_Management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
asdm image disk0:/asdm-602.bin
asdm history enable
arp timeout 14400
static (inside,outside) tcp interface 3389 10.10.10.4 3389 netmask 255.255.255.255
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 10.96.253.94 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
http server enable
http 10.96.253.71 255.255.255.255 ASA_Management
http 10.10.10.0 255.255.255.0 inside
http 10.96.253.0 255.255.255.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no crypto isakmp nat-traversal
telnet 10.10.10.0 255.255.255.0 inside
telnet 10.96.253.71 255.255.255.255 ASA_Management
telnet timeout 5
ssh 10.10.10.0 255.255.255.0 inside
ssh 10.0.253.64 255.25.255.224 outside
ssh 10.0.253.32 255.25.255.224 outside
ssh 10.96.253.64 255.255.255.224 outside
ssh 10.96.253.0 255.255.255.0 outside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
!
!
username XXXX password XXXX encrypted privilege 15
prompt hostname context
Cryptochecksum:XXXX
: end
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |