<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Removing FTP from Global service policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207650#M348644</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a lot to talk when we referred to FTP and firewalls as this traffic (as many other) relies on opening dynamically Pinholes/data channel for the data traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to be brief on this one but here is an example of how it matters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Imagine the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Client----ASA----Outside server running on Active FTP mode:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside client will connect to the outside server (From In to Out. Traffic will be allowed) for the managment connection &lt;/P&gt;&lt;P&gt;Then the client will let the Server on which port to connect, so they can start the data exchange (data channel). The connection will be innitiated from the &lt;STRONG&gt;server side (From out to in)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;If the ASA is not able to inspect the FTP session , how is it supposed to open the secondary channel? &lt;STRONG&gt;So inspection NEEDED&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP SERVER ACTIVE---ASA--OUTSIDE CLIENT&lt;/P&gt;&lt;P&gt;If the FTP server it's on the inside interface running active FTP mode, you will be fine as long as you permit from out-in TCP traffic to port 21 to the server, the server will then innitiate the connection to the outside( &lt;STRONG&gt;From in to outside allowed by default&lt;/STRONG&gt;)&amp;nbsp; &lt;STRONG&gt;No inspection needed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if we talked about Passive FTP: (Where the client innitiate both connections to the server,)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Client-ASA--Outside Server on passive FTP mode&lt;/P&gt;&lt;P&gt;A beauty &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; for a firewall as the client will innitiate both connections. &lt;STRONG&gt;NO inspection Needed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Server running passive mode--ASA---Outside Client&lt;/P&gt;&lt;P&gt;In this scenario, the client will innitiate both connections, we will allow on the ACL only traffic from the client to the server on port 21..The secondary channel will use a random port, that will be open dynamically.. If we do not have an inspection how is the firewall going to allow the communication.. &lt;STRONG&gt;So Inspection Needed,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if we talked about SFTP or FTPS the discussion would keep going &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you have a better idea now,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Jun 2013 04:05:04 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-06-05T04:05:04Z</dc:date>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207648#M348642</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed FTP&amp;nbsp; from global service policy.&lt;/P&gt;&lt;P&gt;I have no ACL that permits or deny FTP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But my understanding was if we remove some inspect from global service policy it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i am still able to access FTP websites?&lt;/P&gt;&lt;P&gt;Is this default behaviour with global policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207648#M348642</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:53:07Z</dc:date>
    </item>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207649#M348643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess if it has an effect on your FTP connections depends on the type of FTP connection used, &lt;STRONG&gt;Active or Passive&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt; mainly helps with the &lt;STRONG&gt;Active FTP&lt;/STRONG&gt; where the Client first connects to the FTP server with &lt;STRONG&gt;Control port TCP/21&lt;/STRONG&gt; and then the server open the Data connection to the Client with the source &lt;STRONG&gt;Data port of TCP/20&lt;/STRONG&gt;. So in this case the firewall has to first allow the FTP Control connection (TCP/21) from the Client to the Server. This is usually allowed by your normal ACL rules or if you are using &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; configurations only it should also be allowed like any other TCP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the Server starts to open the Data connection with a source port TCP/20 towards the destination port that the Client told the server over the Control connection we might then run into problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So essentially the firewall will be seing an connection attempt coming from the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; with the source port TCP/20 and with a destination port TCP/xxxxx. Without &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt; to my understanding this should be blocked like any other TCP connection you have not allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt; configurations purpose is to dynamically allow the FTP Data connection through the firewall when this Data connection is being built from the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why your FTP connection keeps working even after removing the &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt; is probably because you are using &lt;STRONG&gt;Passive FTP&lt;/STRONG&gt;. In Passive FTP and Client opens both Control and Data connection to the server so there usually isnt anything on the firewall blocking the Client from opening both of these connections. Also we dont need anything on the firewall telling about the Data connections ports because they are being opened from the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; of the firewall so the firewall doesnt have to allow any connection initiation from the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;like with Active FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is one site explaining the 2 FTP types:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://slacksite.com/other/ftp.html"&gt;http://slacksite.com/other/ftp.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the ASA Command Reference section explaining the use of &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1744171"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1744171&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is also some more information related to it&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1234738"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1234738&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 03:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207649#M348643</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T03:51:20Z</dc:date>
    </item>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207650#M348644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a lot to talk when we referred to FTP and firewalls as this traffic (as many other) relies on opening dynamically Pinholes/data channel for the data traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to be brief on this one but here is an example of how it matters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Imagine the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Client----ASA----Outside server running on Active FTP mode:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside client will connect to the outside server (From In to Out. Traffic will be allowed) for the managment connection &lt;/P&gt;&lt;P&gt;Then the client will let the Server on which port to connect, so they can start the data exchange (data channel). The connection will be innitiated from the &lt;STRONG&gt;server side (From out to in)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;If the ASA is not able to inspect the FTP session , how is it supposed to open the secondary channel? &lt;STRONG&gt;So inspection NEEDED&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP SERVER ACTIVE---ASA--OUTSIDE CLIENT&lt;/P&gt;&lt;P&gt;If the FTP server it's on the inside interface running active FTP mode, you will be fine as long as you permit from out-in TCP traffic to port 21 to the server, the server will then innitiate the connection to the outside( &lt;STRONG&gt;From in to outside allowed by default&lt;/STRONG&gt;)&amp;nbsp; &lt;STRONG&gt;No inspection needed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if we talked about Passive FTP: (Where the client innitiate both connections to the server,)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Client-ASA--Outside Server on passive FTP mode&lt;/P&gt;&lt;P&gt;A beauty &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; for a firewall as the client will innitiate both connections. &lt;STRONG&gt;NO inspection Needed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside Server running passive mode--ASA---Outside Client&lt;/P&gt;&lt;P&gt;In this scenario, the client will innitiate both connections, we will allow on the ACL only traffic from the client to the server on port 21..The secondary channel will use a random port, that will be open dynamically.. If we do not have an inspection how is the firewall going to allow the communication.. &lt;STRONG&gt;So Inspection Needed,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if we talked about SFTP or FTPS the discussion would keep going &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you have a better idea now,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 04:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207650#M348644</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-05T04:05:04Z</dc:date>
    </item>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207651#M348645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;jcarvaja wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;Inside Client-ASA--Outside Server on passive FTP mode&lt;P&gt;A beauty &lt;SPAN __jive_emoticon_name="grin"&gt;&lt;/SPAN&gt; for a firewall as the client will innitiate both connections. &lt;STRONG&gt;NO inspection Needed&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Isn't that a "security risk"?&amp;nbsp; best practice is to apply ACL on the "inside" interface as well.&amp;nbsp; Otherwise, let say a host on the "inside" interface is compromised/hacked and it will send sensitive information over the Internet to hackers.&amp;nbsp; So this is NOT recommended&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Inside Server running passive mode--ASA---Outside Client&lt;P&gt;In this scenario, the client will innitiate both connections, we will allow on the ACL only traffic from the client to the server on port 21..The secondary channel will use a random port, that will be open dynamically.. If we do not have an inspection how is the firewall going to allow the communication.. &lt;STRONG&gt;So Inspection Needed,&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or in this scenario, you can allow inbound tcp high-port (1024-65535) to the destination FTP server if you do not have ftp inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, FTP inspection should be enabled because even with the workaround, without FTP inspection, you will run into especially when FTP client starts using EPSV (enhanced passive mode).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 12:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207651#M348645</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2013-06-05T12:20:39Z</dc:date>
    </item>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207652#M348646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Isn't that a "security risk"?&amp;nbsp; best practice is to apply ACL on the "inside" interface as well.&amp;nbsp; Otherwise, let say a host on the "inside" interface is compromised/hacked and it will send sensitive information over the Internet to hackers.&amp;nbsp; So this is NOT recommended&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course.... If your network has more access-control policies is going to be more secure,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are talking here about why the inspection is needed or not needed, this discussion is not related about what is more secure....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 15:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207652#M348646</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-06-05T15:22:29Z</dc:date>
    </item>
    <item>
      <title>Removing FTP from Global service policy</title>
      <link>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207653#M348647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to all of you for answering the question.&lt;/P&gt;&lt;P&gt;Its lot of info about FTP and i will go through it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 19:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/removing-ftp-from-global-service-policy/m-p/2207653#M348647</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-06-05T19:39:07Z</dc:date>
    </item>
  </channel>
</rss>

