<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 - Active FTP will not pass through in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338511#M310923</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config attached and removed any public IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5505&lt;BR /&gt;domain-name cloud.local&lt;BR /&gt;enable password xxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.0.73 Metalfab-IT&lt;BR /&gt;name 192.168.0.5 W01DC01&lt;BR /&gt;name 192.168.0.9 vWorkspace-Broker&lt;BR /&gt;name 192.168.0.12 W07DC02&lt;BR /&gt;name 192.168.1.18 CMVDI&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 85.13.xxx.xxx 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.0.1&lt;BR /&gt; name-server 8.8.8.8&lt;BR /&gt; name-server 4.4.2.2&lt;BR /&gt; name-server 4.2.2.2&lt;BR /&gt; name-server 4.2.2.3&lt;BR /&gt; domain-name cloud.local&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 8080&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3390&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3391&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3399&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.0.0&lt;BR /&gt;access-list Split_Tunnel standard permit 192.168.0.0 255.255.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool IPsecVPN 192.168.0.40-192.168.0.45 mask 255.255.0.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface https vWorkspace-Broker https netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface www vWorkspace-Broker www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 444 vWorkspace-Broker 444 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 8080 vWorkspace-Broker 8080 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3389 Metalfab-IT 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3390 W01DC01 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3391 W07DC02 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3399 CMVDI 3389 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 85.13.xxx.xxx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; default-domain value cloud.local&lt;BR /&gt;group-policy admin internal&lt;BR /&gt;group-policy admin attributes&lt;BR /&gt; dns-server value 192.168.0.5 192.168.0.12&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel&lt;BR /&gt; default-domain value cloud.local&lt;BR /&gt; vlan none&lt;BR /&gt; vpn-group-policy admin&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; authentication-server-group (inside) LOCAL&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt;tunnel-group admin type remote-access&lt;BR /&gt;tunnel-group admin general-attributes&lt;BR /&gt; address-pool IPsecVPN&lt;BR /&gt; default-group-policy admin&lt;BR /&gt;tunnel-group admin ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map in&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:192e2f08647ded2722c23e69cd68ab23&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 Oct 2013 14:10:00 GMT</pubDate>
    <dc:creator>Kenzie6964</dc:creator>
    <dc:date>2013-10-15T14:10:00Z</dc:date>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338504#M310916</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please be gentle with me as I'm still learning Cisco&lt;/P&gt;&lt;P&gt;I'm trying to configure our Cisco ASA 5505 to allow Active mode FTP connections through. We have a user that uses some bespoke software that connects to a client via FTP in active mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using the packet tracer. The packets fail by the DENY implicit incoming Rule (please see below). This rule looks as though it cannot be editted although as seen in my screen shot there are 2 rules very similiar?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inspect FTP is enabled and always has been enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/2/0/162022-1.png" alt="1.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/0/5/0/162050-2.png" alt="2.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338504#M310916</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2019-03-12T02:52:13Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338505#M310917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems according to the above picture that your might be entering wrong information to the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt;. The Output/Input interface both should NOT be &lt;STRONG&gt;"inside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we were to believe the output then it would mean that both the user and the destination server was behind the same interface on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a chance to see your firewall configuration in CLI format wihtout any public IP addresses or other sensitive information? This would be the best way for me personally atleast to check any problems with the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 11:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338505#M310917</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T11:59:20Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338506#M310918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the reply. Could you confirm the best command to run to confirm this? Show running-config would display all my infomation so is there something that would be better suited?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 12:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338506#M310918</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T12:22:13Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338507#M310919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;A class="mceButton mceButtonEnabled mce_jivevideo" href="https://community.cisco.com/" id="wysiwygtext_jivevideo" onclick="" onmousedown="" title="Insert Video"&gt;&lt;SPAN class="mceIcon mce_jivevideo"&gt; &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Sorry just to confirm with the packet tracer. I am trying to connect to a FTP server that is external to my network. The mode that the external FTP server connects through is 'Active' and that seems to be where we are having issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just retried the packet tracer with same results?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/5/0/162052-3.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 12:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338507#M310919</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T12:31:00Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338508#M310920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are testing outbound FTP connection from your LAN then you should use the following information&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Interface:&lt;/STRONG&gt; inside&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Source IP address:&lt;/STRONG&gt; 192.168.1.3&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Destination IP address:&lt;/STRONG&gt; &lt;PUBLIC destination="" ip=""&gt;&lt;/PUBLIC&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because the connection initiation for the FTP Control connection (TCP/21) will naturally come from the LAN which is behind the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. And the source IP address is naturally the local IP address and the destination IP address the public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ports you can leave as they are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 12:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338508#M310920</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T12:47:30Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338509#M310921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, results below say that is sucesfully connected. However, the issue still persists&lt;/P&gt;&lt;P&gt;whats the best command to show my firewall config?&lt;/P&gt;&lt;P&gt;Thanks for your help &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/5/0/162056-4.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 13:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338509#M310921</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T13:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338510#M310922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just testing a through filezilla i am getting this error message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;P&gt;Status: Connection established, waiting for welcome message...&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 550 No connections allowed from your IP&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 8pt; color: #ff0000;"&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;SPAN style="font-size: 8pt; color: #ff0000;"&gt;&lt;P&gt;Error: Critical error&lt;/P&gt;&lt;P&gt;Error: Could not connect to server&lt;/P&gt;&lt;SPAN style="font-size: 8pt; color: #ff0000;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/SPAN&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where as through windows explorer it acts as though my credentials are incorrect (although i know they arent as i have tested in a different enviroment)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="overflow: hidden; height: 1px; position: absolute; left: -10000px; top: 0px; width: 1px;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 13:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338510#M310922</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T13:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338511#M310923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config attached and removed any public IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5505&lt;BR /&gt;domain-name cloud.local&lt;BR /&gt;enable password xxxxxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.0.73 Metalfab-IT&lt;BR /&gt;name 192.168.0.5 W01DC01&lt;BR /&gt;name 192.168.0.9 vWorkspace-Broker&lt;BR /&gt;name 192.168.0.12 W07DC02&lt;BR /&gt;name 192.168.1.18 CMVDI&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 85.13.xxx.xxx 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.0.1&lt;BR /&gt; name-server 8.8.8.8&lt;BR /&gt; name-server 4.4.2.2&lt;BR /&gt; name-server 4.2.2.2&lt;BR /&gt; name-server 4.2.2.3&lt;BR /&gt; domain-name cloud.local&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 8080&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3389&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3390&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3391&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 85.13.xxx.xxx eq 3399&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.0.0 255.255.0.0&lt;BR /&gt;access-list Split_Tunnel standard permit 192.168.0.0 255.255.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool IPsecVPN 192.168.0.40-192.168.0.45 mask 255.255.0.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.0.0 255.255.0.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface https vWorkspace-Broker https netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface www vWorkspace-Broker www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 444 vWorkspace-Broker 444 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 8080 vWorkspace-Broker 8080 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3389 Metalfab-IT 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3390 W01DC01 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3391 W07DC02 3389 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3399 CMVDI 3389 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 85.13.xxx.xxx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; default-domain value cloud.local&lt;BR /&gt;group-policy admin internal&lt;BR /&gt;group-policy admin attributes&lt;BR /&gt; dns-server value 192.168.0.5 192.168.0.12&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel&lt;BR /&gt; default-domain value cloud.local&lt;BR /&gt; vlan none&lt;BR /&gt; vpn-group-policy admin&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt; authentication-server-group (inside) LOCAL&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt;tunnel-group admin type remote-access&lt;BR /&gt;tunnel-group admin general-attributes&lt;BR /&gt; address-pool IPsecVPN&lt;BR /&gt; default-group-policy admin&lt;BR /&gt;tunnel-group admin ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map in&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:192e2f08647ded2722c23e69cd68ab23&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 14:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338511#M310923</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T14:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338512#M310924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest if the "packet-tracer" that the intial control connection for the FTP goes through and gets translated and you have FTP Inspection enabled then that should be it for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would consider that the actual problem is on the remote end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the above connection messages seem to indicate that the FTP connection (TCP/21) is formed but the server ends up rejecting it because of some local setting/rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would seem to me to be more of a problem on the server side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe the connections formed to this FTP server are limited according to the source IP address? Perhaps the remote end that manages the server have not done something they should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally as a "final" step you can always capture all traffic from a single connection attempt and those should show you exactly what is exchanged between the client and the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 14:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338512#M310924</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T14:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338513#M310925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks very much.&lt;/P&gt;&lt;P&gt;I did suspect this to start with however I wanted to explorer every other avenue before contacting the remote end. I will check with wireshark to get a definitive answer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 15:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338513#M310925</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T15:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338514#M310926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also take a capture on the ASA. I guess that is easy to do on the ASDM side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally when your on the actual host its probably easier just to take the capture there &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the capture on the ASA might be usefull in situation where you dont have access to an actual host on the site and are not at the site and want to remotely take the capture from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you want an example configuration/commands to capture on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tend to use it a lot and I can easily copy the files to my local computer and open them with wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 15:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338514#M310926</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T15:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338515#M310927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That would be great if you could send me a example. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 15:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338515#M310927</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-15T15:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338516#M310928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well in this case since we have a single destination host and can define a specific internal host for the connection also we could just configure the ASA to capture all TCP traffic between the hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First we configure an ACL that tells the ASA what traffic should be captured &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list FTP-CAP permit tcp host &lt;INTERNAL ip=""&gt; host &lt;SERVER public="" ip=""&gt;&lt;/SERVER&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list FTP-CAP permit tcp host &lt;SERVER public="" ip=""&gt; host &lt;INTERNAL ip=""&gt;&lt;/INTERNAL&gt;&lt;/SERVER&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We define the ACL so that it defines both direction of the traffic. Option would be to copy 2 captures. One for each direction. This might be usefull if there is going to be a large amount of traffic as the ASA per capture buffer is capped near 35MB.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we use the actual &lt;STRONG&gt;"capture"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture FTP-CAP access-list FTP-CAP interface inside buffer 3350000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above comamnd we define the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Capture name is FTP-CAP&lt;/LI&gt;&lt;LI&gt;Access-list that defines the captured traffic is named FTP-CAP (ACL and Capture name dont have to match, I just find it simple to do it that way)&lt;/LI&gt;&lt;LI&gt;Interface where we take the capture is &lt;STRONG&gt;"inside"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;The buffer memory size for this capture is around 33,5MB (almost the maximum for a single capture) You can set this to a lot lower though since we probably wont see that many KB of traffic.&lt;/LI&gt;&lt;LI&gt;We define Circular Buffer which essentially means that when the ASA reaches the maximum buffer size then it start overwriting the old information. This is good for situation when you have to leave the capture on for a long time (and the traffic matching the capture is light) and are more concerned about the latest information captured (waiting for some problems situation happen again for example when troubleshooting)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The capture configuration above wont show up in the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important thing to consider when configuring the ACL is that depending on which interface you take the capture you might have to change the IP address. In this case since we use the local interface the ASA will see the original host IP address. If you were to take the capture from the external interface of the ASA you would have to change the local IP address to the hosts public NAT IP address. And if that NAT IP address is a shared PAT IP it would potentially capture a lot of traffic from others hosts (this is why I used the internal interface/ip in this example)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view all the captures and if they have captured any data with command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can view the contents of a particular capture by adding the capture name to the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture FTP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont use this much except for simple captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To copy the capture a host with TFTP use the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:FTP-CAP t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/FTP-CAP.pcap" rel="nofollow"&gt;ftp://x.x.x.x/FTP-CAP.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To remove the capture and its data use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture FTP-CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to remove the ACL separately&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know when you hear back from the remote end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 15:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338516#M310928</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T15:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338517#M310929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;BR /&gt;&lt;BR /&gt;Awesome command/trick you've got!&lt;BR /&gt;&lt;BR /&gt;Do you happen to create a CSC doc for this? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 15:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338517#M310929</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-10-15T15:52:47Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338518#M310930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is one older document made here on CSC regarding captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though naturally that doesnt stop from making my own.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still have a lot to add my NAT document on the CSC but just can't seem to find the correct time/moment to go into that. Maybe its because I work all day and then go home and start replying to posts on the CSC &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; I must be mad &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 16:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338518#M310930</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-15T16:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338519#M310931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah saw that one earlier and I understand what you mean. Look at me still checking CSC on my iphone &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;It would be cool though if you can create one coz your line of thought is much better.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Oct 2013 16:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338519#M310931</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-10-15T16:17:35Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338520#M310932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;it seems that there was a connection issue between our client and the Remote FTP server. This has been resolved now however active mode still will not connect through.&lt;/P&gt;&lt;P&gt;If I was to strip out some logs and PM to you would you be able to cast your eye over them? I'm not entirely sure what I am looking for? I'm still convinced that there is a issue at the remote server side; however I need to be 100% sure before i can hand it back to them&lt;/P&gt;&lt;P&gt;Thanks for your help with this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338520#M310932</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-16T17:03:44Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338521#M310933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure, you can send the logs. Though generally I troubleshoot FTP related issues with traffic captures. And even in those situations there is usually different people that work with the actual clients and servers when I provide the information on what I see in the logs and captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338521#M310933</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T17:24:04Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338522#M310934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;I've just found a configuration fault within the software being used. I'm just waiting on someone to test the changes I have made. Should hopefully the resolve the issue.&lt;BR /&gt;I will keep you updated. I'll be furious if this resolves things after everything we've gone through!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338522#M310934</guid>
      <dc:creator>Kenzie6964</dc:creator>
      <dc:date>2013-10-16T17:26:45Z</dc:date>
    </item>
    <item>
      <title>ASA5505 - Active FTP will not pass through</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338523#M310935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully it corrects the problem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Oct 2013 17:35:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-active-ftp-will-not-pass-through/m-p/2338523#M310935</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-16T17:35:02Z</dc:date>
    </item>
  </channel>
</rss>

