<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftp in dmz in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684131#M1029682</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my understanding is that on the asa, ver 7.0 you no longer used the fixup command.  that it was replaced with the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;jwalker, can you please give me an example of the correct global/nat or static as i do not have egress filtering.  i thought i understood this, but apparently i do not!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;r&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Jan 2007 17:05:50 GMT</pubDate>
    <dc:creator>rhltechie</dc:creator>
    <dc:date>2007-01-05T17:05:50Z</dc:date>
    <item>
      <title>ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684126#M1029677</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am fairly certain this is something that happens all the time and a very easy thing to do for most.  I have never set up a dmz and am not the best at pix.  I have an asa 5510 and I am trying to setup a ftp server in the dmz that i can reach from inside and outside.  I have done the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;public ip&amp;gt; eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ1_access_in extended permit tcp host 192.168.60.15 192.168.9.0 255.255.255.0 eq ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ1,outside) &amp;lt;public ip&amp;gt; 192.168.60.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ1,inside) 192.168.60.10 192.168.60.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ1,inside) 192.168.60.15 192.168.60.15 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ1,outside) &amp;lt;public ip&amp;gt; 192.168.60.15 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,DMZ1) 192.168.9.0 192.168.9.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ1_access_in in interface DMZ1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ftp host private ip in the dmz is 192.168.60.15.  Private hosts inside reside on 192.168.9.0.  I have also allowed port 3389 to this server for testing, and this works fine.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I view the live log, I do not see any errors, just the following when i attempt a connection from the inside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|Jan 05 2007 09:53:39|302014: Teardown TCP connection 67046549 for DMZ1:192.168.60.15/21 to inside:192.168.9.75/1420 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6|Jan 05 2007 09:53:30|302013: Built outbound TCP connection 67046634 for DMZ1:192.168.60.15/21 (192.168.60.15/21) to inside:192.168.9.75/1421 (192.168.9.75/1421)&lt;/P&gt;&lt;P&gt;6|Jan 05 2007 09:53:08|302013: Built outbound TCP connection 67046549 for DMZ1:192.168.60.15/21 (192.168.60.15/21) to inside:192.168.9.75/1420 (192.168.9.75/1420)&lt;/P&gt;&lt;P&gt;6|Jan 05 2007 09:53:08|302014: Teardown TCP connection 67046336 for DMZ1:192.168.60.15/21 to inside:192.168.9.75/1419 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684126#M1029677</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2019-03-11T09:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684127#M1029678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have an ACL on your inside interface? Please post it. The DMZ1_access_in ACL is applied to the DMZ interface inbound to the ASA. That means you're allowing 192.168.60.15 to FTP to the internal network! I'm betting the inside ACL is blocking FTP to the DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 14:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684127#M1029678</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-01-05T14:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684128#M1029679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you for your reply.  the only other acl i have applied is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 14:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684128#M1029679</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-05T14:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684129#M1029680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you running FTP in passive mode? Try entering:&lt;/P&gt;&lt;P&gt;'fixup protocol ftp'&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 16:57:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684129#M1029680</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-01-05T16:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684130#M1029681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First off, these two commands are unnecessary..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ1,inside) 192.168.60.10 192.168.60.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ1,inside) 192.168.60.15 192.168.60.15 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second, if you have an access list on your inside interface, you need to allow traffic from the inside to the FTP server.  If you do not do any egress filtering, then you should be able to hit the DMZ FTP server.  Oh one other thing.. make sure you have the appropriate nat/global or static to allow the internal traffic to access the DMZ network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls rate if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 16:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684130#M1029681</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2007-01-05T16:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684131#M1029682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my understanding is that on the asa, ver 7.0 you no longer used the fixup command.  that it was replaced with the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is this wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;jwalker, can you please give me an example of the correct global/nat or static as i do not have egress filtering.  i thought i understood this, but apparently i do not!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;r&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 17:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684131#M1029682</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-05T17:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684132#M1029683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The fixup command creates the policy for you. Your static for inside users going to DMZ is correct and you are not doing any egress filtering (ie an ACL applied to the inside interface).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 17:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684132#M1029683</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-01-05T17:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684133#M1029684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you for your reply but the fixup protcol made no difference for me.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 17:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684133#M1029684</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-05T17:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684134#M1029685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post a complete (but sanitized) config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 20:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684134#M1029685</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-01-05T20:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684135#M1029686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not sure what your internal ranges are so to make a static but for a nat/global you would need..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is a static example though that translates an inside range to itself on the dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 20:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684135#M1029686</guid>
      <dc:creator>jwalker</dc:creator>
      <dc:date>2007-01-05T20:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684136#M1029687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here ya go!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2007 21:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684136#M1029687</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-05T21:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684137#M1029688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the command: ftp mode active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also take this one baby step at a time, allowing ip any any. Then try ping, if this works, then is a protocol/server issue (the command above might solve it).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Jan 2007 20:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684137#M1029688</guid>
      <dc:creator>5220</dc:creator>
      <dc:date>2007-01-06T20:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684138#M1029689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried returning to ftp active mode, with no success.  I allowed ping through and i can indeed ping the server.  I am unsure of what else this could be.  i know the service is running as I can ftp to the localhost if i am on the localhost.  any other ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 13:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684138#M1029689</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-08T13:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684139#M1029690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok guys, I figured it out.  I feel like such an idiot!!  I had the ftp server on an XP machine, and guess what was on...yes, the xp firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for all the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 13:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684139#M1029690</guid>
      <dc:creator>rhltechie</dc:creator>
      <dc:date>2007-01-08T13:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: ftp in dmz</title>
      <link>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684140#M1029691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;:)))))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No worries, it's good now it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2007 18:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-in-dmz/m-p/684140#M1029691</guid>
      <dc:creator>5220</dc:creator>
      <dc:date>2007-01-09T18:43:57Z</dc:date>
    </item>
  </channel>
</rss>

