<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TFTP files via dynamic VPN tunnel not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4103793#M1071052</link>
    <description>&lt;P&gt;I'm trying to tftp files from a ASA 5506 (dynamic side) via a dynamic-to-static IKEv1/IPsec tunnel to a 5515X ASA (static side) to back up the running config or send an updated version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel is up and I have full reach-ability to all the networks accross the tunnel via the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is I cannot get tftp (or ftp for that matter) working across the tunnel. I've tried to get a packet capture of the the interesting traffic using an ACL to identify the interesting traffic on the dynamic side, but the capture isn't matching any of the traffic on either the inside or outside interfaces of the remote ASA, but I have tested and captured packets with this same acl configuration on the local asa capturing the tftp traffic to the server via the inside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was having the same issue with my site-to-site vpn until i added the following command;&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.X.X C:/&lt;/P&gt;&lt;P&gt;But when I issued that same command on the dynamic asa of the dynamic-to-static VPN it didn't resolve the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;And yes I have my turned off the firewall on this pc running the tftp/ftp server&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jun 2020 21:21:52 GMT</pubDate>
    <dc:creator>AFlack20</dc:creator>
    <dc:date>2020-06-16T21:21:52Z</dc:date>
    <item>
      <title>TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4103793#M1071052</link>
      <description>&lt;P&gt;I'm trying to tftp files from a ASA 5506 (dynamic side) via a dynamic-to-static IKEv1/IPsec tunnel to a 5515X ASA (static side) to back up the running config or send an updated version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel is up and I have full reach-ability to all the networks accross the tunnel via the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is I cannot get tftp (or ftp for that matter) working across the tunnel. I've tried to get a packet capture of the the interesting traffic using an ACL to identify the interesting traffic on the dynamic side, but the capture isn't matching any of the traffic on either the inside or outside interfaces of the remote ASA, but I have tested and captured packets with this same acl configuration on the local asa capturing the tftp traffic to the server via the inside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was having the same issue with my site-to-site vpn until i added the following command;&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.X.X C:/&lt;/P&gt;&lt;P&gt;But when I issued that same command on the dynamic asa of the dynamic-to-static VPN it didn't resolve the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&lt;/P&gt;&lt;P&gt;And yes I have my turned off the firewall on this pc running the tftp/ftp server&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 21:21:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4103793#M1071052</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2020-06-16T21:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4104564#M1071115</link>
      <description>&lt;P&gt;The following is my configuration of my access list for capture on the remote asa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list CAPTURE extended permit tcp any4 host 192.168.252.249 eq ftp&lt;/P&gt;&lt;P&gt;capture FTP_CAPTURE access-list CAPTURE interface INSIDE&lt;/P&gt;&lt;P&gt;But the capture doesn't contain any data and so just for kicks I then changed the capture, to capture from the outside and still didn't capture any data.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no&amp;nbsp;capture FTP_CAPTURE&lt;/P&gt;&lt;P&gt;capture FTP_CAPTURE access-list CAPTURE interface OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't expect to see anything sourced from the outside interface as ftp, because it should be encapsulated in the VPN tunnel by that point.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote-ASA(config)# copy run ftp://******:*********@192.168.252.249/&lt;/P&gt;&lt;P&gt;Source filename [running-config]?&lt;/P&gt;&lt;P&gt;Address or name of remote host [192.168.252.249]?&lt;/P&gt;&lt;P&gt;Destination username [******]?&lt;/P&gt;&lt;P&gt;Destination password [*********]?&lt;/P&gt;&lt;P&gt;Destination filename [running-config]?&lt;BR /&gt;Cryptochecksum: 5d1a31f3 b58bed00 41196ed9 a9742361&lt;/P&gt;&lt;P&gt;%Error opening ftp://******:*********@192.168.252.249/running-config (Permission denied)&lt;BR /&gt;Remote-ASA(config)# show capture&lt;BR /&gt;capture FTP_CAPTURE type raw-data access-list CAPTURE interface OUTSIDE [Capturing - 0 bytes]&lt;BR /&gt;Remote-ASA(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 03:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4104564#M1071115</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2020-06-17T03:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4105310#M1071167</link>
      <description>&lt;P&gt;Found this old post&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/upgrade-asa-over-vpn-via-inside-interface/td-p/2085072" target="_blank"&gt;https://community.cisco.com/t5/network-security/upgrade-asa-over-vpn-via-inside-interface/td-p/2085072&lt;/A&gt;&lt;/P&gt;&lt;P&gt;suggesting the following command&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;copy tftp://1.1.1.1/filename.bin&lt;/SPAN&gt;&lt;STRONG&gt;;int=inside&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;flash:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but as you can see below this didn't work either.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote-ASAS# copy tftp://192.168.252.206/asa984-22-lfbff-k8.SPA;int=inside flash:&lt;/P&gt;&lt;P&gt;Address or name of remote host [192.168.252.206]?&lt;/P&gt;&lt;P&gt;Source filename [asa984-22-lfbff-k8.SPA]?&lt;/P&gt;&lt;P&gt;Destination filename [asa984-22-lfbff-k8.SPA]?&lt;/P&gt;&lt;P&gt;Accessing tftp://192.168.252.206/asa984-22-lfbff-k8.SPA;int=inside...Unable to reach server 192.168.252.206&lt;BR /&gt;%Error opening tftp://192.168.252.206/asa984-22-lfbff-k8.SPA;int=inside (Network is unreachable)&lt;BR /&gt;Remote-ASA# ping inside 192.168.252.206&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.252.206, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 10/18/20 ms&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 02:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4105310#M1071167</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2020-06-18T02:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4105752#M1071202</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You had configured ACL for the FTP traffic, not for the TFTP. TFTP server is using port 69 UDP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I can see the permission denied means you don't have read &amp;amp; write access.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 16:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4105752#M1071202</guid>
      <dc:creator>Deepak Kumar</dc:creator>
      <dc:date>2020-06-18T16:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4106026#M1071219</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/83314"&gt;@Deepak Kumar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My apologies, I should have mentioned that at that point I was only trying to capture the FTP traffic. The output below shows the modified access-list which is intended to capture both the TFTP and FTP traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote-ASA(config)# show access-list CAPTURE&lt;BR /&gt;access-list CAPTURE; 2 elements; name hash: 0x8f8d404f&lt;BR /&gt;access-list CAPTURE line 1 extended permit udp any4 host 192.168.252.206 eq tftp (hitcnt=0) 0x428bc282&lt;BR /&gt;access-list CAPTURE line 2 extended permit tcp any4 host 192.168.252.206 eq ftp (hitcnt=0) 0x558922fe&lt;BR /&gt;Remote-ASA(config)# show capture&lt;BR /&gt;capture FTP_CAPTURE type raw-data access-list CAPTURE interface OUTSIDE [Capturing - 0 bytes]&lt;BR /&gt;Remote-ASA(config)# copy run ftp://******:*********@192.168.252.206/&lt;/P&gt;&lt;P&gt;Source filename [running-config]?&lt;/P&gt;&lt;P&gt;Address or name of remote host [192.168.252.206]?&lt;/P&gt;&lt;P&gt;Destination username [******]?&lt;/P&gt;&lt;P&gt;Destination password [*********]?&lt;/P&gt;&lt;P&gt;Destination filename [running-config]?&lt;BR /&gt;Cryptochecksum: 72a19c2d bbf87f52 ea63761c 523f4a88&lt;/P&gt;&lt;P&gt;%Error opening ftp://******:*********@192.168.252.206/running-config (Permission denied)&lt;BR /&gt;Remote-ASA(config)# copy run tftp://192.168.252.206/;int=INSIDE&lt;/P&gt;&lt;P&gt;Source filename [running-config]?&lt;/P&gt;&lt;P&gt;Address or name of remote host [192.168.252.206]?&lt;/P&gt;&lt;P&gt;Destination filename []? running-config&lt;BR /&gt;Cryptochecksum: 72a19c2d bbf87f52 ea63761c 523f4a88&lt;/P&gt;&lt;P&gt;%Error writing tftp://192.168.252.206/running-config;int=INSIDE (Timed out attempting to connect)&lt;/P&gt;&lt;P&gt;Remote-ASA(config)# show capture&lt;BR /&gt;capture FTP_CAPTURE type raw-data access-list CAPTURE interface OUTSIDE [Capturing - 0 bytes]&lt;/P&gt;&lt;P&gt;Remote-ASA(config)# ping INSIDE 192.168.252.206&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.252.206, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/4/10 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the following output you can see that I am able to copy to the FTP server from the local asa, and I've included is a screen shot showing that I have enabled read + write access on the FTP server (BTW I'm using the FileZilla as my FTP server).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Local-ASA# copy run ftp://******:*********@192.168.252.206/&lt;/P&gt;&lt;P&gt;Source filename [running-config]?&lt;/P&gt;&lt;P&gt;Address or name of remote host [192.168.252.206]?&lt;/P&gt;&lt;P&gt;Destination username [******]?&lt;/P&gt;&lt;P&gt;Destination password [*********]?&lt;/P&gt;&lt;P&gt;Destination filename [running-config]?&lt;BR /&gt;Cryptochecksum: e35432ca 380fba0b 4d4e8b23 3a0d0222&lt;/P&gt;&lt;P&gt;16925 bytes copied in 0.820 secs&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 424px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/77158i36BEFB1A97421D58/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jun 2020 00:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4106026#M1071219</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2020-06-19T00:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: TFTP files via dynamic VPN tunnel not working</title>
      <link>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4114297#M1071769</link>
      <description>&lt;P&gt;To anyone who may be looking to resolve a similar issue, I've come to an acceptable solution with the help of Cisco TAC. According to TAC TFTP/FTP to a remote firewall over a dynamic tunnel is not possible. Nowhere was this clearly stated in any Cisco ASA documentation that I've come across.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Irregardless I still needed a way to update these remote ASA's to the latest iOS and Asdm images. Apparently there is a tool within the Asdm that will allow this to happen. Under the tools menu in asdm, there is the option to "Upgrade Software from Local Computer..." Once you launch the wizard it's pretty straight forward from there.&lt;/P&gt;&lt;P&gt;The caveat to this is you do need to have compatible versions of the iOS and Asdm running in-order for this to work. Check the compatibility matrix here&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/compatibility/asamatrx.html&lt;/A&gt;&amp;nbsp;to see if your current config will support this. Otherwise you will either need physical access to the device or walk the remote user through the procedure of upgrading to compatible versions, as I had to.&lt;/P&gt;&lt;P&gt;I just wish that this information was more publicly available from Cisco, and that the next person with this problem finds this post early on, to avoid the headaches of trying to get TFTP/FTP working over a remote tunnel. One last rhetorical question is why is this only possible to do with the Asdm, &lt;U&gt;what would be the cli command line equivalent be?!?&lt;/U&gt; For those of us who were taught (whether it be right or wrong), to never use the GUI...&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 01:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-files-via-dynamic-vpn-tunnel-not-working/m-p/4114297#M1071769</guid>
      <dc:creator>AFlack20</dc:creator>
      <dc:date>2020-07-07T01:46:10Z</dc:date>
    </item>
  </channel>
</rss>

