<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP behind a PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784530#M1021680</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wilsonargroup, glad it worked out, please check that not just anyone can access your ftp site and files. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Jun 2007 12:30:52 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-06-28T12:30:52Z</dc:date>
    <item>
      <title>FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784513#M1021657</link>
      <description>&lt;P&gt;The answer to my problem is probably hidden among the hundreds of discussions already posted, so I apologize for my lack of experience/knowledge of networking, servers and all that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having several problems and all appear to point to the configuration of my PIX 501.  Let's deal with this one first...Using Windows SBS 2003, I have set up an FTP site for my company.  It works great internally, but no one outside of the company can access the file(s) that I want them to.  I am aware that Port 21 needs to be open for FTP and I'm pretty sure that it's enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this isn't enough information, please let me know so I can provide more details.  &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784513#M1021657</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2019-03-11T10:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784514#M1021658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's almost enough information. I assume they are attempting to access it via a public ip address or the outside address of your pix? If you want to, post a config, minus passwords etc. Let us know the inside ftp server address and the address outside users will use to access it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 12:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784514#M1021658</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T12:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784515#M1021659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.  I'll paste the config at the bottom of this response.  More questions though...I think your response has raised the question of whether I actually have the site set up properly.  The inside address is 10.0.0.2.  I wasn't aware that the outside users required an address.  Can you help me with that issue??  Here's the PIX config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password (.........)encrypted&lt;/P&gt;&lt;P&gt;passwd (.........)encrypted&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name wilsonargroup.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.58 eq www &lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.58 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 65.65.172.57 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 206.126.51.0 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.58 www 10.0.0.2 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.58 smtp 10.0.0.2 smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.65.172.62 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10 &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 206.126.51.0 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 206.x.x.0 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username admin password (......)&lt;/P&gt;&lt;P&gt;encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 12:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784515#M1021659</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T12:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784516#M1021660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;User's on the outside will not be able to access &lt;A class="jive-link-custom" href="ftp://10.0.0.2" target="_blank"&gt;ftp://10.0.0.2&lt;/A&gt; as that is not a routable internet address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will work for ftp the same as it is now working for your www and smtp servers. They are accessed via 65.65.172.58.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if you wanted to do &lt;A class="jive-link-custom" href="ftp://65.65.172.58" target="_blank"&gt;ftp://65.65.172.58&lt;/A&gt;, you would need to add...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.58 eq ftp&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.58 ftp 10.0.0.2 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 13:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784516#M1021660</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T13:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784517#M1021662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great!  I'll have to figure out how to add the line, but I'm sure I can figure it out.  I'm new to this Admin role.  I was sort of drafted into it a few months ago.  I'll do another post if I have any problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all of your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 13:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784517#M1021662</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T13:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784518#M1021665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay.  It's a bit more complicated than I thought.  I found the *.txt file and made the changes per your suggestion.  I saved the file, but it hasn't changed on the PIX.  Does something need to be rebooted??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 13:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784518#M1021665</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T13:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784519#M1021667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What .txt file?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How did you get the config out of the firewall? Are you connected to the console port?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 14:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784519#M1021667</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T14:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784520#M1021669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All of our equipment was set up by an outside vendor.  After the sale, they abandoned me.  I've been digging around in the system to figure out most stuff on my own.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The installer left a text file on the server and I assumed that was where the PIX got it's information.  Just digging a bit more, I found that not to be true.  I sent you the copy that he left on the machine.  Just a few moments ago, I viewed the actual file, but I don't know how to add the lines now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 14:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784520#M1021669</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T14:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784521#M1021671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to telnet to the inside address from a machine on the 10.0.0.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. telnet 10.0.0.1&lt;/P&gt;&lt;P&gt;2. login&lt;/P&gt;&lt;P&gt;3. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall &amp;gt; en&lt;/P&gt;&lt;P&gt;Password: ******* (enable password here)&lt;/P&gt;&lt;P&gt;pixfirewall # config t&lt;/P&gt;&lt;P&gt;pixfirewall(config) # access-list inbound permit tcp any host 65.65.172.58 eq ftp &lt;/P&gt;&lt;P&gt;pixfirewall(config) # static (inside,outside) tcp 65.65.172.58 ftp 10.0.0.2 ftp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;pixfirewall(config) # exit&lt;/P&gt;&lt;P&gt;pixfirewall # wr mem&lt;/P&gt;&lt;P&gt;pixfirewall # exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if these help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 14:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784521#M1021671</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T14:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784522#M1021672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made a couple of errors.  The original config that I sent was apparently wrong.  I'm resending an excerpt from the correct config with the changes that you suggested.  Note that one line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"static (inside,outside) tcp 65.65.172.58 ftp 10.0.0.2 ftp netmask 255.255.255.255 0 0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;has the IP address as 65.65.172.58 (my goof).  I believe it should have been 65.65.172.57.  Is it possible to change that one line?  If so, how?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service wag tcp &lt;/P&gt;&lt;P&gt;  port-object eq telnet &lt;/P&gt;&lt;P&gt;  port-object eq www &lt;/P&gt;&lt;P&gt;  port-object eq https &lt;/P&gt;&lt;P&gt;  port-object eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.57 eq www &lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.57 eq https &lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.57 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound permit tcp any host 65.65.172.57 eq ftp &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_20 permit ip any 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 65.65.172.58 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.0.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 192.168.99.1-192.168.99.254&lt;/P&gt;&lt;P&gt;pdm location 10.0.0.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 206.126.51.0 255.255.255.192 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 65.65.172.57&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.57 www 10.0.0.2 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.57 https 10.0.0.2 https netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.57 smtp 10.0.0.2 smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.65.172.58 ftp 10.0.0.2 ftp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 16:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784522#M1021672</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T16:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784523#M1021673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pixfirewall(config) # no static (inside,outside) tcp 65.65.172.58 ftp 10.0.0.2 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;pixfirewall(config) # static (inside,outside) tcp 65.65.172.57 ftp 10.0.0.2 ftp netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 16:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784523#M1021673</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T16:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784524#M1021674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've gotten this all done, but still can't access my FTP site.  I'm about to start all over again with creating a new site.  I welcome any other ideas or suggestions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 17:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784524#M1021674</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T17:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784525#M1021675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Um, it does work. Are you sure you tried ftp 65.65.172.57 from OUTSIDE, not from inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying from inside the pix you need to do ftp 10.0.0.2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 17:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784525#M1021675</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T17:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784526#M1021676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well...I'm going by what my test person told me.  Let me have them try again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 17:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784526#M1021676</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T17:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784527#M1021677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, again my person says that all he see's is a blank page.  It said it was getting contents of the folder, but nothing ever happens.  As a matter of fact, when I key in &lt;A class="jive-link-custom" href="ftp://65.65.172.57" target="_blank"&gt;ftp://65.65.172.57&lt;/A&gt;, all I get is that blank page.  Are you actually able to see the file that I have in that directory?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 17:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784527#M1021677</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-26T17:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784528#M1021678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have them open a command prompt and type&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\&amp;gt;ftp 65.65.172.57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They will be prompted for Username and password.(this means that the pix is working)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do this via the web browser, &lt;A class="jive-link-custom" href="ftp://65.65.172.57" target="_blank"&gt;ftp://65.65.172.57&lt;/A&gt;, go up to File and select "login as".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2007 18:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784528#M1021678</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-26T18:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784529#M1021679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I forgot to post that my FTP problem has been resolved.  Thanks for all the time you spent helping/teaching me how to configure my PIX.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jun 2007 12:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784529#M1021679</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-28T12:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784530#M1021680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wilsonargroup, glad it worked out, please check that not just anyone can access your ftp site and files. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jun 2007 12:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784530#M1021680</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-28T12:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTP behind a PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784531#M1021681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, that's what I'm researching now.  Currently, anyone who knows the URL has access to the files.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jun 2007 12:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-behind-a-pix-501/m-p/784531#M1021681</guid>
      <dc:creator>wilsonargroup</dc:creator>
      <dc:date>2007-06-28T12:50:25Z</dc:date>
    </item>
  </channel>
</rss>

