<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does ASA 8.2 Support FTPS Without Clear Command Channel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/does-asa-8-2-support-ftps-without-clear-command-channel/m-p/2356503#M307693</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ASA cannot inspect SSL/TLS encrypted&amp;nbsp; traffic.&amp;nbsp; The breakdown occurs when the data channel is being built.&amp;nbsp;&amp;nbsp; Whether in active or passive mode, L3 (IP) and L4 (port) information&amp;nbsp; regarding the data channel are transferred in the FTP/FTPS control&amp;nbsp; channel.&amp;nbsp; With traditional FTP and the ASA's FTP inspection, this data&amp;nbsp; is "inspected" and "fixed" to match the public/outside/whatever&amp;nbsp; interface IP and the ASA dynamically adds a permit ACL to allow the data&amp;nbsp; channel traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With SSL/TLS (as part of FTPS) the ASA cannot see the necessary&amp;nbsp; control channel details to "inspect" or "fix" what is necessary to make&amp;nbsp; the data channel work.&amp;nbsp; As such, you will need to have some added&amp;nbsp; smarts/capability built into the FTPS server application you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capabilities include the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The ability to set the port range sent in the control channel to be&amp;nbsp; used for the data channel as used by passive mode (PASV) clients.&lt;/LI&gt;&lt;LI&gt;The ability to set the IP address sent in the control channel to be&amp;nbsp; used for the data channel as used by passive mode (PASV) clients.&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Lastly, in your firewall, permitting (via nat/static &lt;STRONG&gt;&lt;EM&gt;and&lt;/EM&gt;&lt;/STRONG&gt; ACL) the range configured in number 1.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In a Windows environment, Cerberus is a great FTP/FTPS/SFTP server that has the necessary features and functions.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say your FTPS server has an inside IP 192.168.1.10 and outside IP 1.1.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure your FTPS server software to use TCP/35000 to TCP/35999 as a range for passive clients.&lt;/LI&gt;&lt;LI&gt;Configure your FTPS server software to send 1.1.1.2 as the IP for&amp;nbsp; passive clients. &lt;/LI&gt;&lt;LI&gt;Configure your ASA to NAT (using static NAT or static PAT range) for TCP/35000 to TCP/35999 (plus TCP/21, TCP/990, etc.)&lt;/LI&gt;&lt;LI&gt;Configure your ASA to ACL permit TCP/35000 to TCP/35999 to the the FTPS server (plus TCP/21, TCP/990, etc.)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when clients connect in from the WAN using implicit or explicit&amp;nbsp; FTPS, the FTPS server will send back the correct WAN IP address (not its&amp;nbsp; private address) and a TCP port in a known range to be used in the data&amp;nbsp; channel.&amp;nbsp; Having specifically NAT'd and ACL permitted the TCP ports,&amp;nbsp; ASA inspection/fixup is not required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Dec 2013 17:00:27 GMT</pubDate>
    <dc:creator>gurpsin2</dc:creator>
    <dc:date>2013-12-05T17:00:27Z</dc:date>
    <item>
      <title>Does ASA 8.2 Support FTPS Without Clear Command Channel</title>
      <link>https://community.cisco.com/t5/network-security/does-asa-8-2-support-ftps-without-clear-command-channel/m-p/2356502#M307688</link>
      <description>&lt;P&gt;We are running a 5520 ASA @ Version 8.2. What needs to be done to configure it to support FTPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doug&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-asa-8-2-support-ftps-without-clear-command-channel/m-p/2356502#M307688</guid>
      <dc:creator>dohogue</dc:creator>
      <dc:date>2019-03-12T03:13:18Z</dc:date>
    </item>
    <item>
      <title>Does ASA 8.2 Support FTPS Without Clear Command Channel</title>
      <link>https://community.cisco.com/t5/network-security/does-asa-8-2-support-ftps-without-clear-command-channel/m-p/2356503#M307693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; ASA cannot inspect SSL/TLS encrypted&amp;nbsp; traffic.&amp;nbsp; The breakdown occurs when the data channel is being built.&amp;nbsp;&amp;nbsp; Whether in active or passive mode, L3 (IP) and L4 (port) information&amp;nbsp; regarding the data channel are transferred in the FTP/FTPS control&amp;nbsp; channel.&amp;nbsp; With traditional FTP and the ASA's FTP inspection, this data&amp;nbsp; is "inspected" and "fixed" to match the public/outside/whatever&amp;nbsp; interface IP and the ASA dynamically adds a permit ACL to allow the data&amp;nbsp; channel traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With SSL/TLS (as part of FTPS) the ASA cannot see the necessary&amp;nbsp; control channel details to "inspect" or "fix" what is necessary to make&amp;nbsp; the data channel work.&amp;nbsp; As such, you will need to have some added&amp;nbsp; smarts/capability built into the FTPS server application you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capabilities include the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The ability to set the port range sent in the control channel to be&amp;nbsp; used for the data channel as used by passive mode (PASV) clients.&lt;/LI&gt;&lt;LI&gt;The ability to set the IP address sent in the control channel to be&amp;nbsp; used for the data channel as used by passive mode (PASV) clients.&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Lastly, in your firewall, permitting (via nat/static &lt;STRONG&gt;&lt;EM&gt;and&lt;/EM&gt;&lt;/STRONG&gt; ACL) the range configured in number 1.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In a Windows environment, Cerberus is a great FTP/FTPS/SFTP server that has the necessary features and functions.&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say your FTPS server has an inside IP 192.168.1.10 and outside IP 1.1.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure your FTPS server software to use TCP/35000 to TCP/35999 as a range for passive clients.&lt;/LI&gt;&lt;LI&gt;Configure your FTPS server software to send 1.1.1.2 as the IP for&amp;nbsp; passive clients. &lt;/LI&gt;&lt;LI&gt;Configure your ASA to NAT (using static NAT or static PAT range) for TCP/35000 to TCP/35999 (plus TCP/21, TCP/990, etc.)&lt;/LI&gt;&lt;LI&gt;Configure your ASA to ACL permit TCP/35000 to TCP/35999 to the the FTPS server (plus TCP/21, TCP/990, etc.)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when clients connect in from the WAN using implicit or explicit&amp;nbsp; FTPS, the FTPS server will send back the correct WAN IP address (not its&amp;nbsp; private address) and a TCP port in a known range to be used in the data&amp;nbsp; channel.&amp;nbsp; Having specifically NAT'd and ACL permitted the TCP ports,&amp;nbsp; ASA inspection/fixup is not required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 17:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/does-asa-8-2-support-ftps-without-clear-command-channel/m-p/2356503#M307693</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2013-12-05T17:00:27Z</dc:date>
    </item>
  </channel>
</rss>

