<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blocking ssh version 1, snmp version 1 and allow only passiv in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633300#M1026940</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again David. You've certainly got your work cut out for you. You should be able to do the SNMP inspection. Go into the global properties-&amp;gt;inspect maps-&amp;gt;snmp. click add. name the inspection map and click which versions you want to disallow. Now go into the security policy-&amp;gt;service policy rules.  Edit the default rule. In the rule actions, make sure SNMP is checked and click configure. select the map you created earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as FTP.  I'm strictly a PIX gui user at this point and I see no option for restricting the type to active or passive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Feb 2007 15:55:30 GMT</pubDate>
    <dc:creator>mhellman</dc:creator>
    <dc:date>2007-02-09T15:55:30Z</dc:date>
    <item>
      <title>blocking ssh version 1, snmp version 1 and allow only passive FTP on pix</title>
      <link>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633298#M1026938</link>
      <description>&lt;P&gt;I need to migrate some customers from Checkpoint over &lt;/P&gt;&lt;P&gt;Cisco Pix firewalls, NOT ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently in the checkpoint security policy, we only&lt;/P&gt;&lt;P&gt;allow snmp version 2 and version 3 to traverse the&lt;/P&gt;&lt;P&gt;firewalls.  Furthermore, we also allow only ssh &lt;/P&gt;&lt;P&gt;version 2 from traversing the firewalls.  In other&lt;/P&gt;&lt;P&gt;words, ssh version 1 and snmp version 1 are NOT &lt;/P&gt;&lt;P&gt;allowed and will be dropped by Checkpoint Smartdefense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this something that can be done with Cisco Pix&lt;/P&gt;&lt;P&gt;firewalls version 7.2(2)?  If so, how?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it also possible to allow ONLY passive ftp through&lt;/P&gt;&lt;P&gt;the pix firewall?  On the checkpoint firewall, I have&lt;/P&gt;&lt;P&gt;a static NAT of a private host IP of 192.168.1.1 to a&lt;/P&gt;&lt;P&gt;public IP address of 129.174.1.5.  I only allow passive&lt;/P&gt;&lt;P&gt;ftp from External this host, NO active FTP is allowed.&lt;/P&gt;&lt;P&gt;BTW, I understand well how passive and active ftp work.&lt;/P&gt;&lt;P&gt;It seems to me that if I have static NAT involved,&lt;/P&gt;&lt;P&gt;the Pix firewall can not allow ONLY passive ftp through&lt;/P&gt;&lt;P&gt;it.  Worse, I use "no fixup protocol ftp 21", both&lt;/P&gt;&lt;P&gt;passive and active ftp stops working with NAT.&lt;/P&gt;&lt;P&gt;If I disable NAT, then I can block active ftp on the &lt;/P&gt;&lt;P&gt;pix firewall by setting up properly ACL and "no fixup&lt;/P&gt;&lt;P&gt;protocol ftp 21".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to allow only passive FTP through the pix&lt;/P&gt;&lt;P&gt;firewall 7.2(2) with static NAT?  It doesn't seem to be&lt;/P&gt;&lt;P&gt;working for me in my testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633298#M1026938</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2019-03-11T09:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: blocking ssh version 1, snmp version 1 and allow only passiv</title>
      <link>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633299#M1026939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAT works with Domain Name Service (DNS), FTP and passive FTP, HTTP, mail, remote-procedure call (RPC), rshell, Telnet, URL filtering, and outbound traceroute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804708b4.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804708b4.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2007 14:31:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633299#M1026939</guid>
      <dc:creator />
      <dc:date>2007-02-09T14:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: blocking ssh version 1, snmp version 1 and allow only passiv</title>
      <link>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633300#M1026940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello again David. You've certainly got your work cut out for you. You should be able to do the SNMP inspection. Go into the global properties-&amp;gt;inspect maps-&amp;gt;snmp. click add. name the inspection map and click which versions you want to disallow. Now go into the security policy-&amp;gt;service policy rules.  Edit the default rule. In the rule actions, make sure SNMP is checked and click configure. select the map you created earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as FTP.  I'm strictly a PIX gui user at this point and I see no option for restricting the type to active or passive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2007 15:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-ssh-version-1-snmp-version-1-and-allow-only-passive-ftp/m-p/633300#M1026940</guid>
      <dc:creator>mhellman</dc:creator>
      <dc:date>2007-02-09T15:55:30Z</dc:date>
    </item>
  </channel>
</rss>

