<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTPS on cisco asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494068#M237120</link>
    <description>&lt;P&gt;I have an ASA 5505 code version 9.0(3) and FTPS seems to be working with some but not others. The ones who can transfer files have full ip completely, but the ones who can't are able to authenticate but cannot transfer files. This led me to believe that this was an ACL issue, but then I looked at the logs and I am getting this error for the user that cannot connect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;tcp flow from outside:x.x.x.x/56721 to inside:x.x.x.x/21 terminated by inspection engine, reason - inspector drop reset.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know why they would be getting this error?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:23:25 GMT</pubDate>
    <dc:creator>Benjamin Saito</dc:creator>
    <dc:date>2019-03-12T04:23:25Z</dc:date>
    <item>
      <title>FTPS on cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494068#M237120</link>
      <description>&lt;P&gt;I have an ASA 5505 code version 9.0(3) and FTPS seems to be working with some but not others. The ones who can transfer files have full ip completely, but the ones who can't are able to authenticate but cannot transfer files. This led me to believe that this was an ACL issue, but then I looked at the logs and I am getting this error for the user that cannot connect:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;tcp flow from outside:x.x.x.x/56721 to inside:x.x.x.x/21 terminated by inspection engine, reason - inspector drop reset.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know why they would be getting this error?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494068#M237120</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2019-03-12T04:23:25Z</dc:date>
    </item>
    <item>
      <title>The inspection engine is</title>
      <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494069#M237122</link>
      <description>&lt;P&gt;The inspection engine is looking at the ftp protocol and finding something objectionable in that user's sessions. Exactly what is hard to say without debugging or capturing a live failing session.&lt;/P&gt;&lt;P&gt;You can disable ftp inspection as follows (in global configuration mode of course):&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp;no inspect ftp&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;That won't tell you what was making it break but it should fix the immediate issue for that user.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jun 2014 21:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494069#M237122</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-06-26T21:33:21Z</dc:date>
    </item>
    <item>
      <title>This is a really bad advice</title>
      <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494070#M237126</link>
      <description>&lt;P&gt;This is a really bad advice and I will tell you why.&lt;/P&gt;&lt;P&gt;By disabling inspect ftp, you will break a lot of FTP connections.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jun 2014 21:35:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494070#M237126</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2014-06-28T21:35:45Z</dc:date>
    </item>
    <item>
      <title>It's not universal but I've</title>
      <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494071#M237129</link>
      <description>&lt;P&gt;It's not universal but I've seen it fix non-working ftp (and non-working smtp and non-working sccp for their respective protocols).&lt;/P&gt;&lt;P&gt;What alternative do you advise the OP pursue to address his issue?&lt;/P&gt;</description>
      <pubDate>Sat, 28 Jun 2014 23:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494071#M237129</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-06-28T23:43:10Z</dc:date>
    </item>
    <item>
      <title>I will tell you why:Let say</title>
      <link>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494072#M237131</link>
      <description>&lt;P&gt;I will tell you why:&lt;/P&gt;&lt;P&gt;Let say when you allow ftp from external to internal, normally your ACL will look like this:&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 1.1.1.1 eq 21 log&lt;/P&gt;&lt;P&gt;access-list outside deny ip any any log&lt;/P&gt;&lt;P&gt;Now when host 2.2.2.2 want to connect to 1.1.1.1 on ftp, the firewall knows that connect is ftp so it will allow inspect ftp to handle the data connection properly.&lt;/P&gt;&lt;P&gt;Now let say if you disable inspect ftp, when the client 2.2.2.2 connect to host 1.1.1.1 via ftp and let say he issues an "passive" to enter passive mode.&amp;nbsp; Without inspect ftp, you would have to to allow:&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 1.1.1.1 gt 1024&lt;/P&gt;&lt;P&gt;because passive allows the client to connect to the server on tcp high-ports, nature of FTP.&amp;nbsp; By disabling inspect ftp, this is no longer possible thus breaking ftp connection, unless you implement the ACL above, which I don't think your security department will approve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The alternative is to use SecureFTP or sFTP which will a perfectly secure protocol.&amp;nbsp; This is 2014, not 1999.&amp;nbsp; FTP and FTPs should be banned.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jun 2014 02:32:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftps-on-cisco-asa/m-p/2494072#M237131</guid>
      <dc:creator>cciesec2011</dc:creator>
      <dc:date>2014-06-29T02:32:34Z</dc:date>
    </item>
  </channel>
</rss>

