<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help to Allow SFTP through ASA Firewall to External Server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237791#M1118283</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77921"&gt;@bavingtonm&lt;/a&gt; no, you can only have one ACL applied to an interface in the same direction. As I mentioned, you need to modify your existing ACL that is applied to the inside interface on the "in" direction.&lt;/P&gt;</description>
    <pubDate>Tue, 17 Dec 2024 07:24:04 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-12-17T07:24:04Z</dc:date>
    <item>
      <title>Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237626#M1118277</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Please could someone assist me with how to configure SFTP client traffic through an ASA FW to an external server address.&lt;/P&gt;&lt;P&gt;I have inherited the issue and its been a while since I performed similar tasks and all commands on the appliance seem to have changed since I last worked on Cisco Pix FW.&lt;/P&gt;&lt;P&gt;Requirements:&lt;/P&gt;&lt;P&gt;I need a specific internal server SFTP client (10.125.120.0/24 network) to upload to an external server (10.200.10.0 network).&lt;/P&gt;&lt;P&gt;Can someone please help me and assist me with the correct command to enter?&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.8 (1)&lt;/P&gt;&lt;P&gt;All suggestions welcomed and many thanks in advance.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237626#M1118277</guid>
      <dc:creator>bavingtonm</dc:creator>
      <dc:date>2024-12-16T20:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237637#M1118278</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77921"&gt;@bavingtonm&lt;/a&gt; I assume you have an ACL applied inbound on your inside interface that is restricting egress traffic?&lt;/P&gt;
&lt;P&gt;As below, create objects to represents your internal and external subnet. Then you need to find out the name of your ACL applied inbound on the inside interface and create a rule similar to below, just replace &amp;lt;&amp;lt;YOUR ACL NAME&amp;gt;&amp;gt; with the name of your ACL.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;object network SFTP-Clients&lt;BR /&gt; subnet 10.125.120.0 255.255.255.0&lt;BR /&gt;object network SFTP-Servers&lt;BR /&gt; subnet 10.200.10.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list &amp;lt;&amp;lt;YOUR ACL NAME&amp;gt;&amp;gt; permit tcp object SFTP-Clients object SFTP-Servers eq 22&lt;/PRE&gt;
&lt;P&gt;You can find the name of the ACL by using the command "show run | i access-group" and look for the ACL applied on the "in" direction of the inside interface.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237637#M1118278</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-16T20:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237638#M1118279</link>
      <description>&lt;P&gt;From Cisco doc.&lt;/P&gt;
&lt;H3&gt;&lt;A name="ftp" target="_blank"&gt;&lt;/A&gt;Unable to Run FTPS (FTP Over SSL) across ASA&lt;/H3&gt;
&lt;P&gt;FTP with TLS/SSL (SFTP / FTPS) is not supported through the Security Appliance. FTP connection is encrypted, so there is no way that the firewall is able to decrypt the packet. Refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_qanda_item09186a00805b87d8.shtml#q13" data-config-metrics-group="dest_pg_body" data-config-metrics-title="dest_pg_body_links" target="_blank"&gt;PIX/ASA: Security Appliance FAQ&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for more information.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 20:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237638#M1118279</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-16T20:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237678#M1118280</link>
      <description>&lt;P&gt;Presumably I can create this ACL with a new ACL NAME eg. "sftp-access" and apply alongside the other ACLs that are already configured?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 22:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237678#M1118280</guid>
      <dc:creator>bavingtonm</dc:creator>
      <dc:date>2024-12-16T22:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237791#M1118283</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/77921"&gt;@bavingtonm&lt;/a&gt; no, you can only have one ACL applied to an interface in the same direction. As I mentioned, you need to modify your existing ACL that is applied to the inside interface on the "in" direction.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 07:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237791#M1118283</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-12-17T07:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237849#M1118288</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;suggested, adding a new access list entry with destination port 22/tcp to your existing access list will do the trick because SFTP uses port 22/tcp by default. The place where you add this new entry depends on how the existing access list&amp;nbsp; is configured. For instance if you have an explicit deny rule that would include the subnet 10.125.120.0/24 going to anywhere then the new entry should be placed above that explicit deny rule. In that case you can use the line number alongside the new entry. Here is an example of how to use the line number:&lt;/P&gt;
&lt;P&gt;access-list &amp;lt;&amp;lt;YOUR ACL NAME&amp;gt;&amp;gt; &lt;STRONG&gt;line 15&lt;/STRONG&gt; extended permit&amp;nbsp;tcp object SFTP-Clients object SFTP-Servers eq 22&lt;/P&gt;
&lt;P&gt;To check the access lists entries line number, you can use the command "sh access-list&amp;nbsp;&amp;lt;&amp;lt;YOUR ACL NAME&amp;gt;&amp;gt;".&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 09:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237849#M1118288</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2024-12-17T09:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237943#M1118298</link>
      <description>&lt;P&gt;Thank you all for the comments and assistance, all now working as expected!&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 13:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237943#M1118298</guid>
      <dc:creator>bavingtonm</dc:creator>
      <dc:date>2024-12-17T13:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Help to Allow SFTP through ASA Firewall to External Server</title>
      <link>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237968#M1118299</link>
      <description>&lt;P&gt;do you pass the inspection ?&lt;/P&gt;
&lt;P&gt;can I see how you bypass inspection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2024 14:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-to-allow-sftp-through-asa-firewall-to-external-server/m-p/5237968#M1118299</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-12-17T14:21:42Z</dc:date>
    </item>
  </channel>
</rss>

