<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Also, I've tried the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664713#M196260</link>
    <description>&lt;P&gt;Also, I've tried the equivalent in CLI, this yields the same results. It seems that the inside interface does not want to allow this traffic, even though I've opened it up via ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2015 00:22:37 GMT</pubDate>
    <dc:creator>csimpson78701</dc:creator>
    <dc:date>2015-03-11T00:22:37Z</dc:date>
    <item>
      <title>TFTP From INSIDE Interface (which is also being used as management)</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664708#M196248</link>
      <description>&lt;P&gt;I have&amp;nbsp;&lt;EM&gt;moderate&amp;nbsp;&lt;/EM&gt;skills with 5500 series ASAs, so please read what I have tried before spending the time to respond. The ASA that this is regarding is running 8.2(4), and I do not run ASDM. Also, I'm attempting to upgrade these dinosaurs to more modern code. We have a ton of customized WebVPN content that I need to export--and I don't want to spend days copying and pasting from putty.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The organization I'm with now implemented their ASAs with the "inside" interface (security level 100) also being used as the management interface. I am trying to&amp;nbsp;&lt;EM&gt;upload&amp;nbsp;&lt;/EM&gt;information from the&amp;nbsp;&lt;EM&gt;inside&amp;nbsp;&lt;/EM&gt;interface to various hosts (for management, etc), but get&lt;EM&gt; "%Error writing tftp://x.x.x.x/filename (Access violation)"&amp;nbsp;&lt;/EM&gt;message every time. I've tried writable HTTP/FTP/TFTP and all result in the same error.I have absolutely verified that this is not an HTTP/FTP/TFTP server problem! This is a policy violation problem from the ASA itself.&lt;/P&gt;&lt;P&gt;I have created an access list similar to the following:&lt;/P&gt;&lt;P&gt;ASA-01(config)# &lt;EM&gt;access-list asa-to-inside extended permit ip host &amp;lt;inside interface IP&amp;gt; any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Also, have done the&amp;nbsp;&lt;EM&gt;management-access inside&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me figure out what I'm doing wrong? The bureaucracy around here prevents me from having a proper management cable run and connected to a security level 0 management interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664708#M196248</guid>
      <dc:creator>csimpson78701</dc:creator>
      <dc:date>2019-03-12T05:37:18Z</dc:date>
    </item>
    <item>
      <title>On 7.1 there is a option in</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664709#M196251</link>
      <description>&lt;P&gt;On 7.1 there is a option in the asdm, where TFTP access is controlled. i.e. where a TFTP server can be configured. Device management&amp;gt;Management Access&amp;gt;TFTP client. have you configured this?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2015 21:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664709#M196251</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2015-03-10T21:57:36Z</dc:date>
    </item>
    <item>
      <title>I'm on 8.2(4) and not using</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664710#M196253</link>
      <description>&lt;P&gt;I'm on 8.2(4) and not using ASDM.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 00:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664710#M196253</guid>
      <dc:creator>csimpson78701</dc:creator>
      <dc:date>2015-03-11T00:18:00Z</dc:date>
    </item>
    <item>
      <title>Also, I've tried the</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664711#M196256</link>
      <description>&lt;P&gt;Also, I've tried the equivalent in CLI, this yields the same results. It seems that the inside interface does not want to allow this traffic, even though I've opened it up via ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 00:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664711#M196256</guid>
      <dc:creator>csimpson78701</dc:creator>
      <dc:date>2015-03-11T00:21:58Z</dc:date>
    </item>
    <item>
      <title>Also, I've tried the</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664712#M196259</link>
      <description>&lt;P&gt;Also, I've tried the equivalent in CLI, this yields the same results. It seems that the inside interface does not want to allow this traffic, even though I've opened it up via ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 00:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664712#M196259</guid>
      <dc:creator>csimpson78701</dc:creator>
      <dc:date>2015-03-11T00:22:17Z</dc:date>
    </item>
    <item>
      <title>Also, I've tried the</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664713#M196260</link>
      <description>&lt;P&gt;Also, I've tried the equivalent in CLI, this yields the same results. It seems that the inside interface does not want to allow this traffic, even though I've opened it up via ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 00:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664713#M196260</guid>
      <dc:creator>csimpson78701</dc:creator>
      <dc:date>2015-03-11T00:22:37Z</dc:date>
    </item>
    <item>
      <title>Please don't bite my head off</title>
      <link>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664714#M196262</link>
      <description>&lt;P&gt;Please don't bite my head off but are you absolutely sure that the TFTP server is okay.&lt;/P&gt;&lt;P&gt;As far as I know the ASA doesn't care where you tftp from and you certainly don't need an acl because that only controls traffic through the ASA not from it.&lt;/P&gt;&lt;P&gt;Have you tried creating the filename on the TFTP server and making sure the permissions are correct ?&lt;/P&gt;&lt;P&gt;Like I say, I appreciate what you are saying but I can't think of anything on the ASA you have to modify to get this working.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 01:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-from-inside-interface-which-is-also-being-used-as/m-p/2664714#M196262</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-11T01:47:57Z</dc:date>
    </item>
  </channel>
</rss>

