<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTP from router based VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467748#M1056253</link>
    <description>&lt;P&gt;I have a VPN tunnel setup between a Cisco Concentrator and Cisco 1712 which is working well. Users behind the Cisco 1712 are trying to FTP to Symantec.com to update their antivirus which is not working at all. All other aspects are working well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can anyone help&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:08:55 GMT</pubDate>
    <dc:creator>RVirdi</dc:creator>
    <dc:date>2020-02-21T08:08:55Z</dc:date>
    <item>
      <title>FTP from router based VPN</title>
      <link>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467748#M1056253</link>
      <description>&lt;P&gt;I have a VPN tunnel setup between a Cisco Concentrator and Cisco 1712 which is working well. Users behind the Cisco 1712 are trying to FTP to Symantec.com to update their antivirus which is not working at all. All other aspects are working well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please can anyone help&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467748#M1056253</guid>
      <dc:creator>RVirdi</dc:creator>
      <dc:date>2020-02-21T08:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTP from router based VPN</title>
      <link>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467749#M1056258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not clear from your description whether the users can be successful with FTP to other sites and fail to the Symantec site or if they have problems with FTP to other sites. Can you clarify?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My first guess is that you may have an issue with MTU. File transfers will attempt the largest frame size that they think works. If Path MTU Discovery does not work (because some firewall is denying the ICMP messages that indicate fragmentation required but DF set) then the FTP will use 1500 frames but with the added headers for IPSec the frame is too large.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest that you try the command:&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss&lt;/P&gt;&lt;P&gt;if your version of IOS supports it which will set the max segment size to a lower value (for testing purposes I would suggest 1360). If your IOS does not support that then I suggest that you work with one of the user machines to specify a smaller frame size.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 May 2005 17:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467749#M1056258</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2005-05-18T17:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTP from router based VPN</title>
      <link>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467750#M1056260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is generic FTP they cannot FTP to anywhere at all, please find below part of the router config     &lt;/P&gt;&lt;P&gt;      &lt;/P&gt;&lt;P&gt; crypto isakmp policy 5                      &lt;/P&gt;&lt;P&gt; encr 3des          &lt;/P&gt;&lt;P&gt; hash md5         &lt;/P&gt;&lt;P&gt; authentication pre-share                         &lt;/P&gt;&lt;P&gt; group 2        &lt;/P&gt;&lt;P&gt;crypto isakmp key xxx address 195.x.x.119 255.255.255.240                                                                         &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set LOC-SET esp-3des esp-md5-hmac                                                        &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;crypto map MY-MAP 10 ipsec-isakmp                                 &lt;/P&gt;&lt;P&gt; set peer 195.x.x.119                        &lt;/P&gt;&lt;P&gt; set transform-set LOC-SET                          &lt;/P&gt;&lt;P&gt; match address INTERESTING-TRAFFIC                                  &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet0                       &lt;/P&gt;&lt;P&gt; description outside link to ADSL rtr                                     &lt;/P&gt;&lt;P&gt; ip address 218.x.x.226 255.255.255.248                                          &lt;/P&gt;&lt;P&gt; ip access-group OUT-IN-ACL in                              &lt;/P&gt;&lt;P&gt; no ip redirects                &lt;/P&gt;&lt;P&gt; no ip unreachables                   &lt;/P&gt;&lt;P&gt; no ip proxy-arp                &lt;/P&gt;&lt;P&gt; duplex auto            &lt;/P&gt;&lt;P&gt; speed auto           &lt;/P&gt;&lt;P&gt; fair-queu        &lt;/P&gt;&lt;P&gt; no cdp enable              &lt;/P&gt;&lt;P&gt; crypto map MY-MAP                  &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet1                       &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt; no cdp enable              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet2                       &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt; no cdp enable              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet3                       &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt; shutdown         &lt;/P&gt;&lt;P&gt; no cdp enable              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface FastEthernet4                       &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt; no cdp enable              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Vlan1               &lt;/P&gt;&lt;P&gt; description Shanghai LAN INT                             &lt;/P&gt;&lt;P&gt; ip address 172.18.1.254 255.255.255.0                                      &lt;/P&gt;&lt;P&gt; ip helper-address 172.29.48.14                               &lt;/P&gt;&lt;P&gt; ip helper-address 172.29.2.4                             &lt;/P&gt;&lt;P&gt; ip helper-address 172.29.48.15                               &lt;/P&gt;&lt;P&gt; no ip proxy-arp                &lt;/P&gt;&lt;P&gt; no ip route-cache cef                      &lt;/P&gt;&lt;P&gt; no ip route-cache                  &lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1360                 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Async1                &lt;/P&gt;&lt;P&gt; no ip address              &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip classless            &lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 218.x.x.225                                       &lt;/P&gt;&lt;P&gt;ip tacacs source-interface Vlan1                                &lt;/P&gt;&lt;P&gt;no ip http server                 &lt;/P&gt;&lt;P&gt;ip http authentication local                            &lt;/P&gt;&lt;P&gt;no ip http secure-server                        &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ip access-list extended INTERESTING-TRAFFIC                                           &lt;/P&gt;&lt;P&gt; permit ip 172.18.1.0 0.0.0.255 172.16.0.0 0.15.255.255                                                       &lt;/P&gt;&lt;P&gt;ip access-list extended OUT-IN-ACL                                                                                       &lt;/P&gt;&lt;P&gt; permit esp any host 218.x.x.226                                   &lt;/P&gt;&lt;P&gt; permit udp any host 218.x.x.226 eq isakmp                                             &lt;/P&gt;&lt;P&gt; permit icmp any any                    &lt;/P&gt;&lt;P&gt; deny   ip any any log                      &lt;/P&gt;&lt;P&gt;ip access-list extended nonat                             &lt;/P&gt;&lt;P&gt; deny   ip 172.x.x.x.0.0.255 172.16.0.0 0.15.255.255                                                       &lt;/P&gt;&lt;P&gt; permit ip any any                                             &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2005 08:30:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467750#M1056260</guid>
      <dc:creator>RVirdi</dc:creator>
      <dc:date>2005-05-19T08:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTP from router based VPN</title>
      <link>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467751#M1056262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my experience the ip tcp adjust-mss has taken care of MTU issues. If you are still having problems with the adjust-mss in the config then I believe it must not have been MTU and we need to look into other possibilities. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume from looking at the config that the FTP traffic is not going through the IPSec tunnel since the FTP destination address is not in 172.16.0.0 0.15.255.255. So the FTP traffic would go out the default route which is through interface FastEthernet0. I see that this interface has an inbound access list. This access list permits esp, isakmp, icmp, and denies everything else - which would include your FTP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that the access list does log the denied traffic. If you look in the logs do you see your FTP traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2005 13:01:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-from-router-based-vpn/m-p/467751#M1056262</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2005-05-19T13:01:22Z</dc:date>
    </item>
  </channel>
</rss>

