<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ZBF and non-standart FTP port at the IOS-EX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833876#M173756</link>
    <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a problem with connection to a FTP server by non-standart port via a router with IOS-EX. Here is what I have at the ZBF rules:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;parameter-map type inspect GLOBAL&lt;BR /&gt;&amp;nbsp;tcp finwait-time 10&lt;BR /&gt;&amp;nbsp;tcp synwait-time 20 &lt;BR /&gt;&amp;nbsp;tcp max-incomplete host 300 block-time 1&lt;BR /&gt;&amp;nbsp;log dropped-packets&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any INSPECT_PROTOCOLS&lt;BR /&gt;&amp;nbsp; description ---- Global protocols to inspect via ZBF ----&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol sip&lt;BR /&gt;&amp;nbsp;match protocol sip-tls&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp; description ---- Traffic match for Access to Internet ----&lt;BR /&gt;&amp;nbsp;match class-map INSPECT_PROTOCOLS&lt;BR /&gt;&amp;nbsp;match access-group name ACL_PROHOBITED_ACTIVITY&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp; description ---- Traffic match for Access from Internet ----&lt;BR /&gt;&amp;nbsp;match access-group name ACL_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp;match class-map INSPECT_PROTOCOLS&lt;/P&gt;
&lt;P&gt;policy-map type inspect P_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;description ---- ZBF for Access to Internet ----&lt;BR /&gt;&amp;nbsp;class type inspect C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp; inspect GLOBAL&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map type inspect P_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp;description ---- ZBF for Access from Internet ----&lt;BR /&gt;&amp;nbsp;class type inspect C_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp; inspect GLOBAL&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;#sh access-lists ACL_PROHOBITED_ACTIVITY&lt;BR /&gt;Extended IP access list ACL_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip object-group Banned_2_Inet any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any&lt;/P&gt;
&lt;P&gt;ip nat inside source list 110 interface Port-channel1 overload&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Because of the non standart FTP port I used a command "ip port-map ftp port tcp 2021". But my host still can't transer data to/from a FTP server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i68.tinypic.com/29lfxop.png" alt="Connection to FTP server from a host" height="110" width="402" /&gt;&lt;/P&gt;
&lt;P&gt;But there is no problem if I'm using a standart 21 port. Here is log from a fail connections:&lt;/P&gt;
&lt;P&gt;sh policy-map type inspect zone-pair sessions | s &amp;lt;local host&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105DEF (&amp;lt;local host&amp;gt;:2335)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:10:55, Last heard 00:10:36&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105CE0 (&amp;lt;local host&amp;gt;:2055)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:14:05, Last heard 00:13:46&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [83:333]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106290 (&amp;lt;local host&amp;gt;:3005)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:04, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [86:333]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105E46 (&amp;lt;local host&amp;gt;:2405)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:09:44, Last heard 00:09:22&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [78:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106198 (&amp;lt;local host&amp;gt;:2819)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:02:29, Last heard 00:02:04&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105AD2 (&amp;lt;local host&amp;gt;:1603)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:19:56, Last heard 00:19:31&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105C79 (&amp;lt;local host&amp;gt;:1999)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:15:12, Last heard 00:14:42&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [78:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106291 (&amp;lt;remote FTP (Internet)&amp;gt;:0)=&amp;gt;(&amp;lt;local host&amp;gt;:3006) ftp-data SIS_PREGEN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:03, Last heard 00:00:03&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [0:0]&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;sh ip nat tran | i &amp;lt;local host&amp;gt;&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5190&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:3005&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5152&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2819&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5154&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2055&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5157&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:1999&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5155&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:1603&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5124&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2335&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5126&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2405&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also tryed to do this:&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;no match class-map INSPECT_PROTOCOLS&lt;/P&gt;
&lt;P&gt;But still no resaults.&lt;/P&gt;
&lt;P&gt;So what else I can do to to make it work?&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:04:42 GMT</pubDate>
    <dc:creator>AllertGen</dc:creator>
    <dc:date>2019-03-12T07:04:42Z</dc:date>
    <item>
      <title>ZBF and non-standart FTP port at the IOS-EX</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833876#M173756</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a problem with connection to a FTP server by non-standart port via a router with IOS-EX. Here is what I have at the ZBF rules:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;parameter-map type inspect GLOBAL&lt;BR /&gt;&amp;nbsp;tcp finwait-time 10&lt;BR /&gt;&amp;nbsp;tcp synwait-time 20 &lt;BR /&gt;&amp;nbsp;tcp max-incomplete host 300 block-time 1&lt;BR /&gt;&amp;nbsp;log dropped-packets&lt;/P&gt;
&lt;P&gt;class-map type inspect match-any INSPECT_PROTOCOLS&lt;BR /&gt;&amp;nbsp; description ---- Global protocols to inspect via ZBF ----&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol sip&lt;BR /&gt;&amp;nbsp;match protocol sip-tls&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp; description ---- Traffic match for Access to Internet ----&lt;BR /&gt;&amp;nbsp;match class-map INSPECT_PROTOCOLS&lt;BR /&gt;&amp;nbsp;match access-group name ACL_PROHOBITED_ACTIVITY&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp; description ---- Traffic match for Access from Internet ----&lt;BR /&gt;&amp;nbsp;match access-group name ACL_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp;match class-map INSPECT_PROTOCOLS&lt;/P&gt;
&lt;P&gt;policy-map type inspect P_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;description ---- ZBF for Access to Internet ----&lt;BR /&gt;&amp;nbsp;class type inspect C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp; inspect GLOBAL&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;policy-map type inspect P_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp;description ---- ZBF for Access from Internet ----&lt;BR /&gt;&amp;nbsp;class type inspect C_From_Inet_to_Internal&lt;BR /&gt;&amp;nbsp; inspect GLOBAL&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;/P&gt;
&lt;P&gt;#sh access-lists ACL_PROHOBITED_ACTIVITY&lt;BR /&gt;Extended IP access list ACL_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip object-group Banned_2_Inet any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip any any&lt;/P&gt;
&lt;P&gt;ip nat inside source list 110 interface Port-channel1 overload&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Because of the non standart FTP port I used a command "ip port-map ftp port tcp 2021". But my host still can't transer data to/from a FTP server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="http://i68.tinypic.com/29lfxop.png" alt="Connection to FTP server from a host" height="110" width="402" /&gt;&lt;/P&gt;
&lt;P&gt;But there is no problem if I'm using a standart 21 port. Here is log from a fail connections:&lt;/P&gt;
&lt;P&gt;sh policy-map type inspect zone-pair sessions | s &amp;lt;local host&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105DEF (&amp;lt;local host&amp;gt;:2335)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:10:55, Last heard 00:10:36&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105CE0 (&amp;lt;local host&amp;gt;:2055)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:14:05, Last heard 00:13:46&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [83:333]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106290 (&amp;lt;local host&amp;gt;:3005)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:04, Last heard 00:00:02&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [86:333]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105E46 (&amp;lt;local host&amp;gt;:2405)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:09:44, Last heard 00:09:22&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [78:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106198 (&amp;lt;local host&amp;gt;:2819)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:02:29, Last heard 00:02:04&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105AD2 (&amp;lt;local host&amp;gt;:1603)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:19:56, Last heard 00:19:31&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [77:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00105C79 (&amp;lt;local host&amp;gt;:1999)=&amp;gt;(&amp;lt;remote FTP (Internet)&amp;gt;:2021) ftp SIS_OPEN&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:15:12, Last heard 00:14:42&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [78:290]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session ID 0x00106291 (&amp;lt;remote FTP (Internet)&amp;gt;:0)=&amp;gt;(&amp;lt;local host&amp;gt;:3006) ftp-data SIS_PREGEN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Created 00:00:03, Last heard 00:00:03&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes sent (initiator:responder) [0:0]&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;sh ip nat tran | i &amp;lt;local host&amp;gt;&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5190&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:3005&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5152&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2819&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5154&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2055&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5157&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:1999&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5155&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:1603&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5124&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2335&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;BR /&gt;tcp&amp;nbsp; &amp;lt;external router IP&amp;gt;:5126&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;local host&amp;gt;:2405&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;remote FTP (Internet)&amp;gt;:2021&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also tryed to do this:&lt;/P&gt;
&lt;P&gt;class-map type inspect match-all C_PROHOBITED_ACTIVITY&lt;BR /&gt;&amp;nbsp;no match class-map INSPECT_PROTOCOLS&lt;/P&gt;
&lt;P&gt;But still no resaults.&lt;/P&gt;
&lt;P&gt;So what else I can do to to make it work?&lt;/P&gt;
&lt;P&gt;Best Regards.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833876#M173756</guid>
      <dc:creator>AllertGen</dc:creator>
      <dc:date>2019-03-12T07:04:42Z</dc:date>
    </item>
    <item>
      <title>Hello; </title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833877#M173759</link>
      <description>&lt;P&gt;Hello;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is it possible for you to do the following?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Create an access-list matching tcp any any eq 2021&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Create a class-map with match all, matching FTP and access-list (match-all)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Put to inspect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Make sure the class is the first one on the policy it should hit.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I remember the ip port mapping capability but I have never used it before other than for CBAC inspection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let us know.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2016 20:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833877#M173759</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2016-01-04T20:34:53Z</dc:date>
    </item>
    <item>
      <title>Hello, Maykol Rojas.</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833878#M173762</link>
      <description>&lt;P&gt;Hello, &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/mayrojas" title="View user profile." class="username" lang="" about="/users/mayrojas" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Maykol Rojas.&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Thank you very much for your interest to my case. In fact I already solved a problem.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Port-map works well. There was a problem at the end side (at the FTP server). Our FTP holder lied to me about FTP server working at the passive mode.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;Best Regards.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 14:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833878#M173762</guid>
      <dc:creator>AllertGen</dc:creator>
      <dc:date>2016-01-29T14:45:55Z</dc:date>
    </item>
    <item>
      <title>That happens too.</title>
      <link>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833879#M173763</link>
      <description>&lt;P&gt;That happens too.&lt;/P&gt;
&lt;P&gt;Thanks for answering back, that would definitely help for me and other ppl in the community.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 20:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zbf-and-non-standart-ftp-port-at-the-ios-ex/m-p/2833879#M173763</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2016-01-29T20:29:25Z</dc:date>
    </item>
  </channel>
</rss>

