<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Maykol, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819578#M174597</link>
    <description>&lt;P&gt;Hi Maykol,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I am trying to emulate is traffic coming from the outside interface (Vodafonetrunk) from a public Ip address (8.8.8.8) to the Vlan configured on my Lan (192.168.10.9) on port 21 on both ends, when traffic hits the firewall the public IP gets translated to an internal IP, as you can see from the show run.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please let me knwo what can I try and I will put it in place.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;H&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Nov 2015 18:53:17 GMT</pubDate>
    <dc:creator>Hugo Rosado</dc:creator>
    <dc:date>2015-11-24T18:53:17Z</dc:date>
    <item>
      <title>FTP ALLOWED</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819574#M174590</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Im trying to allow FTP traffic into my Synology FTP server from the WAN into the LAN, when I simulate this on Packet tracer it says traffic is allowed but this is not true when I test it, I have ios 9.1(5), when I have a look at Syslog I cannot see any FTP traffic coming trough my firewall, neither can see FTP traffic when I do a capture,the ISO says FTP traffic is allowed but I canno see any traces of it touching the firewall, this is driving me mad&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;[[{"type":"media","fid":"1221681","view_mode":"default","link_text":null,"attributes":{"alt":"Packet tracer","title":"Packet tracer","height":"656","width":"1065","class":"image-style-none media-element file-default"}}]]&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819574#M174590</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2019-03-12T06:56:38Z</dc:date>
    </item>
    <item>
      <title>Hi Hugo,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819575#M174592</link>
      <description>&lt;P&gt;Hi Hugo,&lt;/P&gt;
&lt;P&gt;I would suggest you to check if ftp inspection is enabled or not. In case you are using passive ftp to connect to the server behind ASA and you are using NAT then enable ftp inspection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You have also mentioned that you not receiving any traffic. So do you mean that you do not even see SYN packet in captures? If this is the case then check upstreams devices and configure proper routing to route traffic to ASA.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 16px;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 16px;"&gt;Rishabh Seth&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 16px;"&gt;PS: Rate if it helps&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 18:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819575#M174592</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-24T18:21:44Z</dc:date>
    </item>
    <item>
      <title>HI Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819576#M174593</link>
      <description>&lt;P&gt;HI Rishabh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your answer, I have tried both ways, FTP inspection and without FTP being inspected, regarding the SYN packets I cannot see any of them when I build a filter for port 21.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The firewall is facing the Internet directly and is has a trunk beteween an ONT (fibre) and one of the firewall ports, could that have any influence on the way traffic comes in?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outbound connections work fine.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 18:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819576#M174593</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-24T18:27:47Z</dc:date>
    </item>
    <item>
      <title>If it comes from the WAN, I</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819577#M174596</link>
      <description>&lt;P&gt;If it comes from the WAN, I assume that it comes from the internet, is this correct?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now if this is true, the 192.168.10.9 should be translated to something public. That being said, the IP address on the packet tracer is wrong. It should be the public IP address of 192.168.10.9.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do the packet tracer again using the public. If you were using the sniffers (captures) using the same IP 192.168.10.9, that would be the reason why you were not seeing any traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anything that hits the public interface, will contain a public IP no matter if we changed to this new method (post NAT acl) the packets will still arrive with a public destination IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know how it goes.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 18:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819577#M174596</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-11-24T18:46:16Z</dc:date>
    </item>
    <item>
      <title>Hi Maykol,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819578#M174597</link>
      <description>&lt;P&gt;Hi Maykol,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I am trying to emulate is traffic coming from the outside interface (Vodafonetrunk) from a public Ip address (8.8.8.8) to the Vlan configured on my Lan (192.168.10.9) on port 21 on both ends, when traffic hits the firewall the public IP gets translated to an internal IP, as you can see from the show run.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please let me knwo what can I try and I will put it in place.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;H&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 18:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819578#M174597</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-24T18:53:17Z</dc:date>
    </item>
    <item>
      <title>On that packet tracer I can</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819579#M174598</link>
      <description>&lt;P&gt;On that packet tracer I can see a NAT phase.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order to even simulate the traffic coming from 8.8.8.8, you should translate that host 192.168.10.9 to a public IP to be accesible or redirect the ports when it hits a public IP on the Vodafone interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Mike.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 19:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819579#M174598</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2015-11-24T19:13:23Z</dc:date>
    </item>
    <item>
      <title>HI Maykol,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819580#M174599</link>
      <description>&lt;P&gt;HI Maykol,&lt;/P&gt;
&lt;P&gt;Thank you for your response&lt;/P&gt;
&lt;P&gt;I think that is what I am doing at the moment with the following commands:&lt;/P&gt;
&lt;P&gt;object network Incoming_traffic&lt;BR /&gt; host 192.168.10.8&lt;/P&gt;
&lt;P&gt;nat (VodafoneTrunk,VoipIt_Production) source dynamic any Incoming_traffic destination static Synology Synology service FTP FTP&lt;/P&gt;
&lt;P&gt;When it hits the vodafone trunk interface it translates it to an internal ip&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 22:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819580#M174599</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-24T22:23:10Z</dc:date>
    </item>
    <item>
      <title>Hi Hugo,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819581#M174600</link>
      <description>&lt;P&gt;Hi Hugo,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If your server is listening on port 21 behind Vodafone trunk interface and traffic will be hitting Voiplt_Production and you want to translate traffic on public IP to private generated by any host then you can create following NAT:&lt;/P&gt;
&lt;P&gt;object network Incoming_traffic&lt;BR /&gt;host 192.168.10.8&lt;/P&gt;
&lt;P&gt;nat (VodafoneTrunk,VoipIt_Production) static &amp;lt;public IP&amp;gt; service TCP 21 21&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you are creating NAT for specific users who will be accessing ftp server then you can write a manual NAT.&lt;/P&gt;
&lt;P&gt;NAT (vodavoip) &amp;nbsp;source static &amp;lt;real-ip-of-ftp-server&amp;gt; &amp;lt;mapped&amp;nbsp;&lt;SPAN&gt;-ip-of-ftp-server&amp;gt; service ftp ftp destination static &amp;lt;object-forspecific-user&amp;gt;&amp;nbsp;&amp;lt;object-forspecific-user&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope it helps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 05:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819581#M174600</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T05:00:11Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819582#M174601</link>
      <description>&lt;P&gt;Hi Rishabh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Once again thanks for your response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I applied the commands recommended,I left the ACL's in place, the ACL's say that any traffic hiting the VodafoneTrunk interface on port 21 will be forward to the FTP server (192.168.10.9).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The commands did not work unfortunatelly:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network Incoming_traffic&lt;BR /&gt;host 192.168.10.9 - FTP server&lt;/P&gt;
&lt;P&gt;nat (VodafoneTrunk,VoipIt_Production) static &amp;lt;public IP&amp;gt; service TCP 21 21&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do I need an ACL at the end of this statement?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 10:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819582#M174601</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T10:48:38Z</dc:date>
    </item>
    <item>
      <title>Hi Hugo,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819583#M174602</link>
      <description>&lt;P&gt;Hi Hugo,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you replace &amp;lt;publicIp&amp;gt; with actual public IP of the FTP server?&lt;/P&gt;
&lt;P&gt;If you did replace it, then what do you see in the packet-tracer?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network Incoming_traffic&lt;BR /&gt;host 192.168.10.9 - FTP server&lt;/P&gt;
&lt;P&gt;nat (VodafoneTrunk,VoipIt_Production) static &amp;lt;public IP&amp;gt; service TCP FTP FTP &amp;lt;&amp;lt; replace &amp;lt;pulic IP&amp;gt; with public IP of the server,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rishabh Seth&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 11:09:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819583#M174602</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T11:09:31Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819584#M174603</link>
      <description>&lt;P&gt;Hi Rishabh,&lt;/P&gt;
&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;Let's say my current public IP is 1.1.1.1 and my FTP server is 192.168.10.9:&lt;/P&gt;
&lt;P&gt;object network Incoming_traffic&lt;BR /&gt;host 192.168.10.9&lt;/P&gt;
&lt;P&gt;nat (VodafoneTrunk,VoipIt_Production) static 1.1.1.1 service TCP 21 21&lt;/P&gt;
&lt;P&gt;With these commands I cannot access my FTP server from outside.&lt;/P&gt;
&lt;P&gt;These are the command I used on the firewall, will I need to apply any ACL's into it?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 11:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819584#M174603</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T11:20:59Z</dc:date>
    </item>
    <item>
      <title>Hi Hugo,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819585#M174604</link>
      <description>&lt;P&gt;Hi Hugo,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You will require ACL to permit traffic for 192.168.10.9 on port 21 from outside interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also check the packet-tracer output and see if this NAT rule getting evaluated or not. Check if you have any manual nat rule that might shadow this rule.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rishabh Seth&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 11:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819585#M174604</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T11:54:13Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819586#M174606</link>
      <description>&lt;P&gt;Hi Rishabh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your response, this is the commands I have applied o the asa:&lt;/P&gt;
&lt;P&gt;1.1.1.1 = My external IP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;object network Synology&lt;BR /&gt; host 192.168.10.9&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nat (VodafoneTrunk,VoipIt_Production) static 1.1.1.1&amp;nbsp;service TCP 21 21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-list 100 extended permit tcp any host 192.168.10.9 eq ftp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;access-group 100 in interface vodafonetrunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p2"&gt;This is not doing the job, also shouldn't the NAT rule be the other way arround like:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nat (&lt;STRONG&gt;VoipIt_Production,VodafoneTrunk)&lt;/STRONG&gt; static 1.1.1.1 service TCP 21 21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;I am on IOS 9.1(5)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;Regards&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 12:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819586#M174606</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T12:59:15Z</dc:date>
    </item>
    <item>
      <title>Is the Vodafone Trunk</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819587#M174608</link>
      <description>&lt;P&gt;Is the Vodafone Trunk interface public facing? If yes then NAT should look like:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (&lt;/SPAN&gt;&lt;STRONG&gt;VoipIt_Production,VodafoneTrunk)&lt;/STRONG&gt;&lt;SPAN&gt; static 93.38.108.10 service TCP 21 21&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I assumed that VodafoneTrunk is internal interface. Correct me if my understanding is wrong.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 12:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819587#M174608</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T12:59:16Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819588#M174609</link>
      <description>&lt;P&gt;Hi Rishabh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;By putting that command I am sayng that only the external IP 93.38.108.10 can FTP in, should I not put:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (&lt;/SPAN&gt;&lt;STRONG&gt;VoipIt_Production,VodafoneTrunk)&lt;/STRONG&gt;&lt;SPAN&gt; static 93.38.108.10 service TCP 21 21, and also when I do the packet tracer this is the output:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/captura_de_ecra_2015-11-25_as_13.52.46.png" class="migrated-markup-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/captura_de_ecra_2015-11-25_as_14.07.10.png" class="migrated-markup-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is drivng me mad now &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 14:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819588#M174609</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T14:08:53Z</dc:date>
    </item>
    <item>
      <title>Hi Hugo, </title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819589#M174611</link>
      <description>&lt;P&gt;Hi Hugo,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I know this is a small config and there have been many comments on this discussion, just to ensure we are on same page please provide following details:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Name of the interface behind which your FTP server is placed.&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Name of the interface from where traffic will enter firewall.&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt;&amp;nbsp;Is the Public IP of FTP server is same as Public IP configured on ASA interface?&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; What is the IP address of the internal host?&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Do you want to permit access to this FTP server to specific hosts or any hosts?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want to test packet tracer for source IP as 8.8.8.8 and destination IP as FTP server's Public IP then use:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Source IP as &amp;lt;IP of source&amp;gt; destination IP as &amp;lt;Public IP of FTP server.&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 14:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819589#M174611</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T14:17:21Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819590#M174612</link>
      <description>&lt;P&gt;Hi Rishabh,&lt;/P&gt;
&lt;P&gt;Thanks for all your helpfull answers:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Name of the interface behind which your FTP server is placed - &lt;STRONG&gt;VoipIt_Production, network 192.168.10.0 range&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Name of the interface from where traffic will enter firewall - &lt;STRONG&gt;VodafoneTrunk&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt;&amp;nbsp;Is the Public IP of FTP server is same as Public IP configured on ASA interface?&lt;STRONG&gt; According to the nat rules yes&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; What is the IP address of the internal host? - &lt;STRONG&gt;192.168.10.9&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Do you want to permit access to this FTP server to specific hosts or any hosts?&amp;nbsp;&lt;STRONG&gt;Any hosts&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 15:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819590#M174612</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T15:11:47Z</dc:date>
    </item>
    <item>
      <title>VoipIt# packet-tracer input</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819591#M174614</link>
      <description>&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;VoipIt# packet-tracer input vodafoneTrunk tcp 8.8.8.8 21 192.168.10.9 21 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Implicit Rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: input&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;in &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.168.10.0&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;255.255.255.0 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;VoipIt_Production&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: input&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;in &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.0.0.0 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;0.0.0.0 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;VodafoneTrunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-group 100 in interface VodafoneTrunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;access-list 100 extended permit tcp any host 192.168.10.9 eq ftp &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: per-session&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: &lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Phase: 7 &lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;nat (VoipIt_Production,VodafoneTrunk) source dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&lt;SPAN class="s1"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-interface: VodafoneTrunk&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-interface: VoipIt_Production&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Action: drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 15:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819591#M174614</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T15:15:27Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819592#M174616</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can try following manual NAT rule:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object service ftp&lt;BR /&gt; service tcp source eq ftp&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network Synology&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;host 192.168.10.9&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (&lt;STRONG&gt;VoipIt_Production,VodafoneTrunk&lt;/STRONG&gt;) &amp;nbsp;1 source static Synology interface service ftp ftp&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope it helps!!!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 16:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819592#M174616</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-11-25T16:14:12Z</dc:date>
    </item>
    <item>
      <title>Rishabh you are the man, many</title>
      <link>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819593#M174617</link>
      <description>&lt;P&gt;Rishabh you are the man, many thanks this worked perfectly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 17:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-allowed/m-p/2819593#M174617</guid>
      <dc:creator>Hugo Rosado</dc:creator>
      <dc:date>2015-11-25T17:40:06Z</dc:date>
    </item>
  </channel>
</rss>

