<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is it possible that Server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008749#M147052</link>
    <description>&lt;P&gt;Is it possible that Server 2008 R2 has security policy that restricts access to the directory where the file is?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In tftpd64 if you click on the list option do you see your asdm image listed?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
    <pubDate>Wed, 01 Feb 2017 16:12:33 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2017-02-01T16:12:33Z</dc:date>
    <item>
      <title>Cisco ASA 5505 TFTP (Access Violation)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008748#M147051</link>
      <description>&lt;P&gt;I am trying to send a new asdm image to my cisco asa 5505 firewall. I have tftpd64 installed on Server 2008 R2 and the file I'm trying to send is in the same directory as the tftpd64; so it is accessible. The tftpd64 shows the IP of the server, security is set to none, and is set to tftp server (in settings under GLOBAL tab)&lt;/P&gt;
&lt;P&gt;On the cisco asa 5505 I have performed the following command to give access to the tftp server and copy the file&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cisco(config)#&lt;/STRONG&gt; tftp-server inside 10.4.1.3 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cisco(config)#&lt;/STRONG&gt; copy tftp disk0:&lt;/P&gt;
&lt;P&gt;Address or name of remote host [10.4.1.3]?&lt;/P&gt;
&lt;P&gt;Source filename [255.255.255.0]? asdm-771.bin&lt;/P&gt;
&lt;P&gt;Destination filename [asdm-771.bin]?&lt;/P&gt;
&lt;P&gt;Accessing tftp://10.4.1.3/asdm-771.bin;int=inside... %Error reading tftp://10.4.1.3/asdm-771.bin;int=inside (Access violation.)&lt;/P&gt;
&lt;P&gt;I am not sure why I'm getting access violation. I was able to transfer the file from a remote machine through a VPN connection but the speeds are so slow it timed out at around 15%. This is why I decided to move the file to the remote server and then do a tftp transfer of the image file.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008748#M147051</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2019-03-12T08:51:55Z</dc:date>
    </item>
    <item>
      <title>Is it possible that Server</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008749#M147052</link>
      <description>&lt;P&gt;Is it possible that Server 2008 R2 has security policy that restricts access to the directory where the file is?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In tftpd64 if you click on the list option do you see your asdm image listed?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:12:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008749#M147052</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2017-02-01T16:12:33Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008750#M147053</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I think the file needs to exist in the directory, and you need to have authorization to overwrite it. Can you try to create the file with the exact file name in the destination directory ?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008750#M147053</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-01T16:24:03Z</dc:date>
    </item>
    <item>
      <title>In tftpd64 I click on Show</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008751#M147054</link>
      <description>&lt;P&gt;In tftpd64 I click on Show Dir; I see the file, yes.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are also no group policies in effect, and the windows firewall is off on the server 2008 R2&lt;/P&gt;
&lt;P&gt;The file is located in C:\tftpd64\asdm-771.bin&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008751#M147054</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T16:24:37Z</dc:date>
    </item>
    <item>
      <title>cisco# mkdir disk0:/asdm-771</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008752#M147055</link>
      <description>&lt;P&gt;cisco# mkdir disk0:/asdm-771.bin&lt;/P&gt;
&lt;P&gt;Create directory filename [asdm-771.bin]?&lt;/P&gt;
&lt;P&gt;Created dir disk0:/asdm-771.bin&lt;BR /&gt;cisco# sho flash&lt;BR /&gt;--#-- --length-- -----date/time------ path&lt;BR /&gt; 151 2048 Feb 01 2017 10:26:47 asdm-771.bin&lt;BR /&gt; 21 2048 Dec 30 2011 06:10:58 coredumpinfo&lt;BR /&gt; 22 59 Mar 19 2015 15:01:48 coredumpinfo/coredump.cfg&lt;BR /&gt; 10 2048 Dec 30 2011 06:40:08 log&lt;BR /&gt; 20 2048 May 29 2012 07:15:04 crypto_archive&lt;BR /&gt; 147 394148 May 17 2012 07:06:40 crypto_archive/crypto_eng0_arch_1.bin&lt;BR /&gt; 148 394148 May 29 2012 07:15:04 crypto_archive/crypto_eng0_arch_2.bin&lt;BR /&gt; 135 12105313 Dec 30 2011 06:42:50 csd_3.5.841-k9.pkg&lt;BR /&gt; 136 2048 Dec 30 2011 06:42:52 sdesktop&lt;BR /&gt; 150 1462 Dec 30 2011 06:42:52 sdesktop/data.xml&lt;BR /&gt; 137 2857568 Dec 30 2011 06:42:52 anyconnect-wince-ARMv4I-2.4.1012-k9.pkg&lt;BR /&gt; 138 38367184 Aug 01 2016 17:40:50 anyconnect-win-3.1.09013-k9.pkg&lt;BR /&gt; 139 12370 Mar 19 2015 15:01:24 8_2_5_0_startup_cfg.sav&lt;BR /&gt; 140 30486528 May 07 2015 18:52:42 asa923-4-k8.bin&lt;/P&gt;
&lt;P&gt;128573440 bytes total (41824256 bytes free)&lt;BR /&gt;cisco# conf t&lt;BR /&gt;cisco(config)# copy tftp disk0:&lt;/P&gt;
&lt;P&gt;Address or name of remote host [10.4.1.3]?&lt;/P&gt;
&lt;P&gt;Source filename [255.255.255.0]? asdm-771.bin&lt;/P&gt;
&lt;P&gt;Destination filename [asdm-771.bin]?&lt;/P&gt;
&lt;P&gt;%Warning:There is a file already existing with this name&lt;BR /&gt;Do you want to over write? [confirm]&lt;/P&gt;
&lt;P&gt;Accessing tftp://10.4.1.3/asdm-771.bin;int=inside...&lt;BR /&gt;%Error reading tftp://10.4.1.3/asdm-771.bin;int=inside (Access violation.)&lt;BR /&gt;cisco(config)#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Still unsuccessful&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008752#M147055</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T16:34:46Z</dc:date>
    </item>
    <item>
      <title>Hello Matt,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008753#M147056</link>
      <description>&lt;P&gt;Hello Matt,&lt;/P&gt;
&lt;P&gt;do you have 'managment-access inside' configured ? Can you post the config of the ASA ?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 16:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008753#M147056</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-01T16:57:26Z</dc:date>
    </item>
    <item>
      <title>I do have management-access</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008754#M147057</link>
      <description>&lt;P&gt;I do have management-access-inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I attached configurations in .txt&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 17:18:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008754#M147057</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T17:18:20Z</dc:date>
    </item>
    <item>
      <title>Hello Matt,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008755#M147058</link>
      <description>&lt;P&gt;Hello Matt,&lt;/P&gt;
&lt;P&gt;I am not sure about the 'allow-scc-mgmt' command on your Vlan1 interface, as this would require the configuration line in &lt;STRONG&gt;bold&lt;/STRONG&gt; as well (where 10.4.1.2/24 is an unused address from the Vlan 1 range, yours might be different)&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; allow-ssc-mgmt&lt;BR /&gt; management-only&lt;BR /&gt; ip address 10.4.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;hw-module module 1 ip 10.4.1.2 255.255.255.0 10.4.1.1&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 19:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008755#M147058</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-01T19:50:27Z</dc:date>
    </item>
    <item>
      <title>This is most likely a</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008756#M147059</link>
      <description>&lt;P&gt;This is most likely a permissions issue on the Server. &amp;nbsp;Any chance of trying to copy the file from a PC?&lt;/P&gt;
&lt;P&gt;What does the log in tftpd64 say?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008756#M147059</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-01T21:31:44Z</dc:date>
    </item>
    <item>
      <title>Thanks for confirming that</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008757#M147060</link>
      <description>&lt;P&gt;Thanks for confirming that the file is in the directory where tftpd64 is looking and confirming that there are no security policies on the server which would impact your copying the file.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I notice that all of your logging levels are set to critical. I would suggest changing (temporarily) to informational and then checking the logs as you attempt the file copy and see if there are any log messages that shed light on the problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008757#M147060</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2017-02-01T21:31:51Z</dc:date>
    </item>
    <item>
      <title>This is all the information</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008758#M147061</link>
      <description>&lt;P&gt;This is all the information the logs on the tftpd provide:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Connection received from 10.4.1.1 on port 51958 [31/01 16:46:35.054]&lt;BR /&gt;Read request for file &amp;lt;asdm-771.bin&amp;gt;. Mode octet [31/01 16:46:35.054]&lt;BR /&gt;Using local port 56989 [31/01 16:46:35.161]&lt;BR /&gt;Peer returns ERROR &amp;lt;&amp;gt; -&amp;gt; aborting transfer [31/01 16:46:35.559]&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I will try to transfer from a PC and see if the results change.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008758#M147061</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T21:36:08Z</dc:date>
    </item>
    <item>
      <title>I am not sure where the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008759#M147062</link>
      <description>&lt;P&gt;I am not sure where the config command management-only comes from (I do not see it in the config copy that I saw in the thread) and I am concerned about it. It would not allow data traffic to use this interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008759#M147062</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2017-02-01T21:37:50Z</dc:date>
    </item>
    <item>
      <title>Georg - </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008760#M147063</link>
      <description>&lt;P&gt;Georg -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your reply -&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could provide a little more detail as to what you mean? Doesn't the command you provided have to do with accessing the IDS module?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 21:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008760#M147063</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T21:38:58Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008761#M147064</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;as far as I remember, the 'allow ssc-mgmt' command is used to provide access to an SSC (Security Services Card), which does not have any external interfaces. The corresponding 'hw-module' command is needed to provide access to the card through the IP address specified. I assume you have an SCC installed ?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 22:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008761#M147064</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-01T22:04:56Z</dc:date>
    </item>
    <item>
      <title>Sure enough, as soon as I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008762#M147065</link>
      <description>&lt;P&gt;Sure enough, as soon as I tried on PC, worked like a champ. Should have tried this hours ago.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any idea where or what permission would cause the access violation on a server as opposed to a workstation?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 22:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008762#M147065</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-01T22:21:59Z</dc:date>
    </item>
    <item>
      <title>Hello Matt,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008763#M147066</link>
      <description>&lt;P&gt;Hello Matt,&lt;/P&gt;
&lt;P&gt;is the IP address of the PC in the same subnet as that of the server, 10.4.1.0/24 ?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2017 23:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008763#M147066</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-02-01T23:30:25Z</dc:date>
    </item>
    <item>
      <title>I haven't worked with servers</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008764#M147067</link>
      <description>&lt;P&gt;I haven't worked with servers in quite a while now, but remembering back to when I did work with them, I remember that the 2008 R2 had some really strict and (in my opinion) strange security setting. &amp;nbsp;for example, I was trying to pre-stage a server 2008 R2 for a client but I was unable to do so unless the server detected another device on the local network.&lt;/P&gt;
&lt;P&gt;So I do not know which security settings it would be that need to be changed. &amp;nbsp;Perhaps someone else here knows..&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 09:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008764#M147067</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-02T09:36:32Z</dc:date>
    </item>
    <item>
      <title>Yes, the PC is 10.4.1.101,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008765#M147068</link>
      <description>&lt;P&gt;Yes, the PC is 10.4.1.101, server was 10.4.1.3, and asa was 10.4.1.1&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 12:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3008765#M147068</guid>
      <dc:creator>Matt S</dc:creator>
      <dc:date>2017-02-02T12:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 TFTP (Access Violation)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3333414#M147070</link>
      <description>&lt;P&gt;One cause for this is if the server you are trying to run tftpd on is already running the windows deployment services server (WDSS), which includes a tftp service and that will own udp port 69 on the platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case tftpd will run without warnings but when tftp'ing to the platform you are talking to WDSS and not tftpd&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;netstat -a -b will show if port 69 already listening and which process owns it&lt;/P&gt;
&lt;P&gt;If WDSS running, temp disable it while you run tftpd&lt;/P&gt;
&lt;P&gt;(the WDSS tftp service itself is not great)&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 08:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3333414#M147070</guid>
      <dc:creator>chris-goulder</dc:creator>
      <dc:date>2018-02-19T08:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5505 TFTP (Access Violation)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3758072#M147073</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Had ran into the same problem issue was i was running tftpd32 with a standard windows account, make sure you run it as admin.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Dec 2018 09:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-tftp-access-violation/m-p/3758072#M147073</guid>
      <dc:creator>godfrey_mungora</dc:creator>
      <dc:date>2018-12-05T09:09:57Z</dc:date>
    </item>
  </channel>
</rss>

