<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Look like FTP inspection is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624931#M196176</link>
    <description>&lt;P&gt;Look like FTP inspection is NOT enabled your ASA because your own ASA is blocking your traffics.&amp;nbsp; Can you share the output of the command "sh run policy-map global_policy"?&lt;/P&gt;</description>
    <pubDate>Thu, 12 Mar 2015 17:59:34 GMT</pubDate>
    <dc:creator>cciesec2011</dc:creator>
    <dc:date>2015-03-12T17:59:34Z</dc:date>
    <item>
      <title>Allowing Passive  SFTP traffic via Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624927#M196172</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to allow passive FTP traffic via ASA.&lt;/P&gt;&lt;P&gt;Client PC is inside out network and Server is outside our network.&lt;/P&gt;&lt;P&gt;As FTP data channel uses random ports for data transfer.&lt;/P&gt;&lt;P&gt;Should i need to open additional ports on ASA in addition to port 21 to make this work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624927#M196172</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T05:37:59Z</dc:date>
    </item>
    <item>
      <title>some clarifications here: FTP</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624928#M196173</link>
      <description>&lt;P&gt;some clarifications here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FTP uses port 21 for command &amp;amp; control and random port for data transfer.&amp;nbsp; In your case, since you're using passive FTP, the client will initiate both command &amp;amp; control and data transfer.&amp;nbsp; FTP server does NOTHING.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sFTP (aka, scp) uses tcp port 22 (or whatever port you specifiy in the sshd_config).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By design, inside hosts can access hosts on the outside you just need to enable "fix-up protocol ftp 21" and that will take care of both Active &amp;amp; Passive FTP from hosts on the inside to outside network.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 15:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624928#M196173</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2015-03-12T15:31:44Z</dc:date>
    </item>
    <item>
      <title> FTP inspection is enabled on</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624929#M196174</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FTP inspection is enabled on the ASA.&lt;/P&gt;&lt;P&gt;I will ask the user to test the connection and will update you if it works without opening up additional&lt;/P&gt;&lt;P&gt;ports for data channel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 16:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624929#M196174</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-03-12T16:28:21Z</dc:date>
    </item>
    <item>
      <title>We tested with user PC and he</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624930#M196175</link>
      <description>&lt;P&gt;We tested with user PC and he is not able to connect.&lt;/P&gt;&lt;P&gt;Check the firewall log it shows&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Mar 12 2015 16:11:26: %ASA-4-106023: Deny tcp src Internal:192.168.50.21/58840 dst outside:205.x.x.x/50009 by access-group "Inside_access_in" [0x4e3d0ed5, 0x0].&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems it is trying to connect on port 50009.&lt;/P&gt;&lt;P&gt;I asked vendor to send us list of Data channel ports which they have assigned to server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 17:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624930#M196175</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-03-12T17:13:05Z</dc:date>
    </item>
    <item>
      <title>Look like FTP inspection is</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624931#M196176</link>
      <description>&lt;P&gt;Look like FTP inspection is NOT enabled your ASA because your own ASA is blocking your traffics.&amp;nbsp; Can you share the output of the command "sh run policy-map global_policy"?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 17:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624931#M196176</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2015-03-12T17:59:34Z</dc:date>
    </item>
    <item>
      <title>FTP inspection is enabled sh</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624932#M196177</link>
      <description>&lt;P&gt;FTP inspection is enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh run&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map&amp;nbsp;&amp;nbsp; global_policy&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 18:06:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624932#M196177</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-03-12T18:06:57Z</dc:date>
    </item>
    <item>
      <title>try this: 1)  no fixup</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624933#M196178</link>
      <description>&lt;P&gt;try this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then try the connection again&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 18:42:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624933#M196178</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2015-03-12T18:42:09Z</dc:date>
    </item>
    <item>
      <title> Tried the connection as you</title>
      <link>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624934#M196179</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tried the connection as you said.&lt;/P&gt;&lt;P&gt;Same thing.&lt;/P&gt;&lt;P&gt;Also i got port range from vendor then i open up data ports from 50000 50010&lt;/P&gt;&lt;P&gt;After that user was able to connect fine.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Normally we do not need to open Data ports if FTP inspection is enabled right?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So does it mean the ASA OS i am using can have bug?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 20:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-passive-sftp-traffic-via-cisco-asa/m-p/2624934#M196179</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-03-12T20:46:37Z</dc:date>
    </item>
  </channel>
</rss>

