<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing FTP from ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246564#M348726</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You explained very well but here i have to work according to the current setup here.&lt;/P&gt;&lt;P&gt;I will test this on my home lab by config ACL towards the in ward&amp;nbsp; direction of outside interface of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Jun 2013 17:13:08 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2013-06-04T17:13:08Z</dc:date>
    <item>
      <title>Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246559#M348711</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to allow FTP to particular website&amp;nbsp; in the Internet.&lt;/P&gt;&lt;P&gt;ASA has already object group network to allow FTP out towards the Internet sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i can simply add the network-object host&amp;nbsp; 200.x.x.x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This i can add to outside interface of ASA&amp;nbsp; under outgoing rules&amp;nbsp; right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do i also need to put any rule in Outside interface in incoming direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:52:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246559#M348711</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T01:52:29Z</dc:date>
    </item>
    <item>
      <title>Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246560#M348713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allowing FTP traffic from INSIDE to OUTSIDE depends completely on your current setup. We would need more information about this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this another lab setup or a production environment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general I would have to say that you almost always configure ACLs only in the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt;. An ACL on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface which is attached to the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; controls the outbound traffic from the&lt;STRONG&gt; "inside"&lt;/STRONG&gt; to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. So you usually use this ACL when you want to allow traffic from the LAN to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And ACL on the&lt;STRONG&gt; "outside"&lt;/STRONG&gt; interface which is attached to the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; controls the inbound traffic from the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt;. This ACL is usually used to open connections from Internet to your servers which have been configured with Static NAT or Static PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a situation where you have a very basic ASA with only &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; configured with &lt;STRONG&gt;"outside"&lt;/STRONG&gt; being &lt;STRONG&gt;"0"&lt;/STRONG&gt; and &lt;STRONG&gt;"inside"&lt;/STRONG&gt; being &lt;STRONG&gt;"100"&lt;/STRONG&gt; then you dont need to configure any ACL as the connections from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; are allowed by default because of the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value. Naturally as soon as you attach an ACL to the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface you will need to allow the traffic you need&amp;nbsp; as the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; looses its meaning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the case if you have an existing ACL and want to make sure that one hosts FTP connections to the public network are allowed then you can insert the new rule to the top of the existing ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if you have an ACL named &lt;STRONG&gt;INSIDE-IN&lt;/STRONG&gt; attached to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface with the command &lt;STRONG&gt;"access-group INSIDE-IN in interface inside"&lt;/STRONG&gt; Then you could add the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 1 remark Allow FTP for a host&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-IN line 2 permit tcp host &lt;LOCAL hosts="" ip=""&gt; host &lt;REMOTE internet="" host=""&gt; eq ftp&lt;/REMOTE&gt;&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats about it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said, we would need more information about the current setup to give any kind of specific answer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would advice against configuring ACLs in the direction &lt;STRONG&gt;"out"&lt;/STRONG&gt; on an&amp;nbsp; ASA (with the access-group command). It just creates complicated setups to manage. Also, you dont need to allow the traffic in both directions as you only have to allow the connection from the host to the Internet. You dont have to allow the connection from the remote host to the local host. The &lt;STRONG&gt;"inspect ftp"&lt;/STRONG&gt; will automatically allow the Data connections of the FTP if they are opened from the FTP servers direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I made any sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 13:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246560#M348713</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-03T13:24:24Z</dc:date>
    </item>
    <item>
      <title>Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246561#M348716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its for Production Network and i have to use the existing setup here.&lt;/P&gt;&lt;P&gt;you explained the concept very well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If on ASA outside interface i used source as any and ASA&amp;nbsp; has say 10 other interfaces.&lt;/P&gt;&lt;P&gt;And&amp;nbsp; if user is behind any of those interfaces then he can talk to FTP server which is&amp;nbsp; outside right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246561#M348716</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-06-03T16:24:30Z</dc:date>
    </item>
    <item>
      <title>Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246562#M348719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It depends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have no ACLs in the interfaces behind which the host attempting the FTP connection to Internet resides THEN the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value dictates if the connection is allowed. Though usually any interface other than the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;is higher than &lt;STRONG&gt;"security-level 0"&lt;/STRONG&gt; so usually the connection would be allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you should do next is determine behind which interface the host attempting the FTP connection is. This can naturally be done with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show&amp;nbsp; route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you should confirm if this interface has an ACL attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the listing shows an ACL attached to that interface then you should determine if you need an ACL rule to allow the traffic. For this you naturally use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface="" name=""&gt; tcp &lt;SOURCE host="" ip=""&gt; 12345 &lt;DESTINATION server="" ip=""&gt; 21&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above you naturally replace the &lt;STRONG&gt;&lt;SOURCE interface="" name=""&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt; with the actual name of the ASA interface behind which the host is located. The &lt;STRONG&gt;&lt;SOURCE host="" ip=""&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt; will naturally be replaced with the IP address of the host. And finally the &lt;STRONG&gt;&lt;DESTINATION server="" ip=""&gt;&lt;/DESTINATION&gt;&lt;/STRONG&gt; will be replaced with the destination FTP servers IP address. That is, if you are trying to allow FTP to only certain destination IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source port is I used is just an example and is not important in this case. The destination port is 21 which is the FTP port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246562#M348719</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-03T16:32:48Z</dc:date>
    </item>
    <item>
      <title>Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246563#M348722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And to further clarify the how the interface ACLs should be configured in my opinion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets use an ASA5505 as an example and lets say it has the following interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 192.168.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 1.1.1.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you wanted to allow ALL traffic from behind the LAN and DMZ interfaces then you could configure the following simple ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN-IN remark Allow all traffic from the LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list LAN-IN permit ip 10.10.10.0 255.255.255.0 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group LAN-IN in interface LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN remark Allow all traffic from the LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-IN permit ip 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group DMZ-IN in interface DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that we attach both the interface ACLs in the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; in the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command. This will mean that the ACL controls traffic coming from behind that interface. After we have allowed the traffic we wanted in the ACL, we dont need to allow it in any other ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets take an example of allowing traffic from the Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You for example configure a Static NAT (software level 8.2 and below format) for a DMZ server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You first configure Static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,WAN) 1.1.1.2 192.168.10.2 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since we dont have any ACL attached to the &lt;STRONG&gt;"WAN"&lt;/STRONG&gt; interface yet we need to create a new ACL and attach it in the direction &lt;STRONG&gt;"in" &lt;/STRONG&gt;in the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command since we want to control traffic entering through the &lt;STRONG&gt;"WAN"&lt;/STRONG&gt; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WAN-IN remark Allow HTTP traffic to DMZ server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WAN-IN permit tcp any host 1.1.1.2 eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group WAN-IN in interface WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see we always control the traffic entering the interface. In other words we are controlling traffic entering some ASA interface while its heading out to some network behind another interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I made sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 16:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246563#M348722</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-03T16:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing FTP from ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246564#M348726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You explained very well but here i have to work according to the current setup here.&lt;/P&gt;&lt;P&gt;I will test this on my home lab by config ACL towards the in ward&amp;nbsp; direction of outside interface of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 17:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-ftp-from-asa/m-p/2246564#M348726</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-06-04T17:13:08Z</dc:date>
    </item>
  </channel>
</rss>

