<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing only Passive FTP through the Pix 7.x firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650826#M1025011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem is that in order for the pix to nat the port OR passive command, the inspect/fixup for ftp has to be on.    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;227 Entering Passive Mode (10,102,160,20,4,222) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the first 4 numbers there are the IP address it sees for the port command.  As you can see, it's the 10.x address, not the nat address needed to the communication can work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So turning on the inpect/fixup fixes that issue.  However, once the fixup is on, active ftp is allowed as well.  The only way to block  active ftp from the server would be to deny it's ability to initiate connections to anything greater than or equal to port 1024 (which seems to be what you've done in your DMZ access-list, though you may want to make it from all ports rather than just a source port of 20 to be absolutely certain, and change it to be gt 1023).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate this message if it helps solve some or all of your issue/question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Feb 2007 18:41:03 GMT</pubDate>
    <dc:creator>jgervia_2</dc:creator>
    <dc:date>2007-02-25T18:41:03Z</dc:date>
    <item>
      <title>Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650823#M1025005</link>
      <description>&lt;P&gt;Linux_FTP_Server---(DMZ)Pix(ExTERNAL)---Linux_FTP_client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix is running version 7.2(2).  &lt;/P&gt;&lt;P&gt;DB has priority of 70.  EXTERNAL has priority of 0.&lt;/P&gt;&lt;P&gt;Pix DB interface IP is 10.102.160.19/28&lt;/P&gt;&lt;P&gt;Pix EXTERNAL interface IP is 192.168.1.4/24&lt;/P&gt;&lt;P&gt;Linux_FTP_Server is 10.102.160.20&lt;/P&gt;&lt;P&gt;Linux_FTP_client is 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux_FTP_Server is running both "Active" and "Passive" FTP mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux_FTP_Server is being NATted by the pix:&lt;/P&gt;&lt;P&gt;static (DMZ,EXTERNAL) 192.168.1.20 10.102.160.20 net 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that the customer does NOT want to make any changes&lt;/P&gt;&lt;P&gt;to the Linux_FTP_Server.  It is not my decision.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They want me to configure the Pix firewall so that the pix will&lt;/P&gt;&lt;P&gt;allow only "passive" ftp from the Linux_FTP_client to the &lt;/P&gt;&lt;P&gt;Linux_FTP_Server. NO Active ftp is allowed between the Linux_FTP_client&lt;/P&gt;&lt;P&gt;and the Linux_FTP_Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is my config, just for testing purposes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,EXTERNAL) 192.168.1.20 10.102.160.20 net 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list External permit icmp any any log&lt;/P&gt;&lt;P&gt;access-list External permit tcp any any eq 21 log&lt;/P&gt;&lt;P&gt;access-list External permit tcp any any gt 1024 log&lt;/P&gt;&lt;P&gt;access-list DMZ permit icmp any any log&lt;/P&gt;&lt;P&gt;access-list DMZ deny tcp any eq 20 any gt 1024 log&lt;/P&gt;&lt;P&gt;access-list DMZ permit ip any any log &lt;/P&gt;&lt;P&gt;access-group External in interface EXTERNAL&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output from the Linux_FTP_client.  As you can see,&lt;/P&gt;&lt;P&gt;I can login fine but as soon as I type "ls", the connection&lt;/P&gt;&lt;P&gt;hangs.  I suspect that because I turned off ftp fixup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux_FTP_client[admin]# ftp 192.168.1.20&lt;/P&gt;&lt;P&gt;Connected to 192.168.1.20.&lt;/P&gt;&lt;P&gt;220 (vsFTPd 1.1.3)&lt;/P&gt;&lt;P&gt;Name (192.168.1.20:admin): anonymous&lt;/P&gt;&lt;P&gt;331 Please specify the password.&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;230 Login successful. Have fun.&lt;/P&gt;&lt;P&gt;Remote system type is UNIX.&lt;/P&gt;&lt;P&gt;Using binary mode to transfer files.&lt;/P&gt;&lt;P&gt;ftp&amp;gt; bin&lt;/P&gt;&lt;P&gt;200 Switching to Binary mode.&lt;/P&gt;&lt;P&gt;ftp&amp;gt; prompt&lt;/P&gt;&lt;P&gt;Interactive mode off.&lt;/P&gt;&lt;P&gt;ftp&amp;gt; hash&lt;/P&gt;&lt;P&gt;Hash mark printing on (1024 bytes/hash mark).&lt;/P&gt;&lt;P&gt;ftp&amp;gt; passive&lt;/P&gt;&lt;P&gt;Passive mode on.&lt;/P&gt;&lt;P&gt;ftp&amp;gt; ls&lt;/P&gt;&lt;P&gt;227 Entering Passive Mode (10,102,160,20,4,222)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CiscoPix(config)# sh access-list External&lt;/P&gt;&lt;P&gt;access-list External; 3 elements&lt;/P&gt;&lt;P&gt;access-list External line 1 extended permit icmp any any log informational interval 300 (hitcnt=2) 0xa53e0e51&lt;/P&gt;&lt;P&gt;access-list External line 2 extended permit tcp any any eq ftp log informational interval 300 (hitcnt=8) 0x6a1b47d7&lt;/P&gt;&lt;P&gt;access-list External line 3 extended permit tcp any any gt 1024 log informational interval 300 (hitcnt=13) 0xfe0778b4&lt;/P&gt;&lt;P&gt;CiscoPix(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know how to configure the Pix 7.x code to allow only "passive" ftp &lt;/P&gt;&lt;P&gt;through the firewall with static NAT?  It seems to me that the pix firewall is &lt;/P&gt;&lt;P&gt;incapable of doing this.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas anyone?  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650823#M1025005</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2019-03-11T09:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650824#M1025008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080640337.html#wp1234738" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080640337.html#wp1234738&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you disable FTP inspection engines with the no inspect ftp command, outbound users can start connections only in passive mode, and all inbound FTP is disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807ee585.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807ee585.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Feb 2007 13:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650824#M1025008</guid>
      <dc:creator>ROBERTO TACCON</dc:creator>
      <dc:date>2007-02-25T13:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650825#M1025010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi r.taccon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not interested in outbound ftp connections.&lt;/P&gt;&lt;P&gt;I am only interested in inbound ftp connections.  This FTP server accepts inbound&lt;/P&gt;&lt;P&gt;connections from other users over the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible with Pix 7.x or Pix in general&lt;/P&gt;&lt;P&gt;when static NAT is involved?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I come from Checkpoint and Juniper/Netscreen&lt;/P&gt;&lt;P&gt;environments and I take these things for granted&lt;/P&gt;&lt;P&gt;until I deal with Cisco Pix.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Feb 2007 14:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650825#M1025010</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-25T14:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650826#M1025011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem is that in order for the pix to nat the port OR passive command, the inspect/fixup for ftp has to be on.    &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;227 Entering Passive Mode (10,102,160,20,4,222) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the first 4 numbers there are the IP address it sees for the port command.  As you can see, it's the 10.x address, not the nat address needed to the communication can work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So turning on the inpect/fixup fixes that issue.  However, once the fixup is on, active ftp is allowed as well.  The only way to block  active ftp from the server would be to deny it's ability to initiate connections to anything greater than or equal to port 1024 (which seems to be what you've done in your DMZ access-list, though you may want to make it from all ports rather than just a source port of 20 to be absolutely certain, and change it to be gt 1023).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate this message if it helps solve some or all of your issue/question&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Feb 2007 18:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650826#M1025011</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2007-02-25T18:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650827#M1025012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On second thought, the ACL may not block it - the inspect may create an entry in the state table before the ACL is checked and allow active ftp through.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 00:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650827#M1025012</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2007-02-26T00:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing only Passive FTP through the Pix 7.x firewall</title>
      <link>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650828#M1025014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what is the solution?  I can not believe&lt;/P&gt;&lt;P&gt;I have an expensive Pix firewall that can not&lt;/P&gt;&lt;P&gt;do a simple task like this one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without static NAT in place, I can allow &lt;/P&gt;&lt;P&gt;only passive FTP through the pix firewall.  In&lt;/P&gt;&lt;P&gt;other words, if I just route traffics through&lt;/P&gt;&lt;P&gt;the firewall, it will work like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;access-list out permit icmp any any log&lt;/P&gt;&lt;P&gt;access-list out permit tcp any any eq 21 log&lt;/P&gt;&lt;P&gt;access-list out permit tcp any any gt 1024 log&lt;/P&gt;&lt;P&gt;access-list in permit icmp any any log&lt;/P&gt;&lt;P&gt;access-list in deny tcp any eq 20 any log&lt;/P&gt;&lt;P&gt;access-list in permit ip any any log&lt;/P&gt;&lt;P&gt;access-group out in interface outside&lt;/P&gt;&lt;P&gt;access-group in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, since I am static NAT the ftp server,&lt;/P&gt;&lt;P&gt;this configuration does not serve me any good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anymore ideas?  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 01:06:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-only-passive-ftp-through-the-pix-7-x-firewall/m-p/650828#M1025014</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-26T01:06:18Z</dc:date>
    </item>
  </channel>
</rss>

