<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic basic access rule for remote servers. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143611#M356753</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent had much problems with FTP connections through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the FTP inspection on the ASA handles the FTP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the following configuration on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect ftp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see any policy-map configuration in your above copy/pasted configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some thread on the Internet simply state to give "passive" command on the FTP CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Feb 2013 21:37:42 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-02-13T21:37:42Z</dc:date>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143603#M356742</link>
      <description>&lt;P&gt;on ASA 5505, I would like to allow all traffic for remote network(or servers)(harvesterFTP in a screenshot attached)&lt;/P&gt;&lt;P&gt;for some reason it is not working. it seems it is with implicit rule.&lt;/P&gt;&lt;P&gt;Could anyone give me some advice on this?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143603#M356742</guid>
      <dc:creator>peterpark421</dc:creator>
      <dc:date>2019-03-12T00:59:44Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143604#M356744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that you want to allow traffic to a server behind your ASA5505 from the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only guess that you have the ACL statements wrong somehow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly the ASDM picture doesnt tell us much since its just using names instead of actual IP address ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though the output seem abit wierd as you have on your "outside" ACL defined source address as "inside" network and the destination as the FTP server? Shouldnt the source either be "any" or the public source network from which the users are connecting to your server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest the CLI format of the configurations would be better in this case as we cant tell much from the names in the ASDM picture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can only tell that the rules you have configured are not getting "hit" or "matched".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 17:45:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143604#M356744</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-12T17:45:41Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143605#M356746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not quite sure what the software version you are using. I guess it must be 8.3 or newer since it refers to the Global ACL. (I dont use much ASDM myself)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basicly if you have configured NAT for one of your servers and want to open connections to it from the Internet you should use the Real IP address as the destination IP address in the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Your servers LAN IP is 192.168.10.10&lt;/LI&gt;&lt;LI&gt;Your servers Public IP is 1.2.3.4&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you create ACL rules with the 8.3 and above softwares you need to allow the traffic from "outside" to the LAN IP address of the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 17:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143605#M356746</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-12T17:51:29Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143606#M356748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your advise. Below I attached the running configuration. The thing I want to achieve here is to give remote servers(harvesterFTP) access to the internal network. Could you please take a look at the run-config and give me an advise?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(4)1 &lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 74.101.14.146 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network FTPserver1&lt;BR /&gt; host 64.147.106.92&lt;BR /&gt;object network FTPserver2&lt;BR /&gt; host 64.147.106.67&lt;BR /&gt;object network HarvesterFTP&lt;BR /&gt; subnet 64.147.106.0 255.255.255.0&lt;BR /&gt;object-group network Harvester&lt;BR /&gt; network-object object FTPserver1&lt;BR /&gt; network-object object FTPserver2&lt;BR /&gt;object-group network HarvesterNetwork&lt;BR /&gt; network-object object HarvesterFTP&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt; protocol-object ip&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host 64.147.106.67&lt;BR /&gt; network-object host 64.147.106.92&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt; network-object host 64.147.106.67&lt;BR /&gt; network-object host 64.147.106.92&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object object FTPserver1&lt;BR /&gt; network-object object FTPserver2&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 192.168.0.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_3 74.101.14.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside object-group DM_INLINE_TCP_1 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 74.101.14.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; crl configure&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.5 68.237.161.12&lt;BR /&gt;dhcpd update dns both &lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.0.15-192.168.0.132 inside&lt;BR /&gt;dhcpd dns 192.168.0.5 68.237.161.12 interface inside&lt;BR /&gt;dhcpd update dns both interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:31db376b3dc2ff56c0c43331f6a98293&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 14:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143606#M356748</guid>
      <dc:creator>peterpark421</dc:creator>
      <dc:date>2013-02-13T14:25:31Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143607#M356749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have servers on the LAN (or DMZ) that need to be reachable from the Internet&lt;/LI&gt;&lt;LI&gt;You have Public IP addresses for each of the local servers&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your servers to be reachable from the Internet you need to configure a Static NAT for each local server so that they have their own public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above is the case I would need following information to give you the configurations&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What are the local IP addresses of the servers and what are the public IP addresses you want to configure for them?&lt;/LI&gt;&lt;LI&gt;What are the source addresses/networks for which you want to open the connections to the local servers? (&lt;STRONG&gt;object network HarvesterFTP&lt;/STRONG&gt; ?)&lt;/LI&gt;&lt;LI&gt;What services (TCP/UDP) do you want to open from the Internet to those local servers?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above information I could give you the needed configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 14:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143607#M356749</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T14:40:19Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143608#M356750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Harvester server is remote servers that I want to give access to our network. I don't need to configure NAT for our internal servers here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically, I want allow all FTP traffic from external servers below to be able to get in our internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;64.147.106.92&lt;/P&gt;&lt;P&gt;64.147.106.67&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using those remote server to get certain files using FTP automatically but it stopped working since we changed the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 16:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143608#M356750</guid>
      <dc:creator>peterpark421</dc:creator>
      <dc:date>2013-02-13T16:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143609#M356751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not totally sure if we are speaking with different terms or what the actual setup is here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To clarify the situation on my part&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IF your LAN hosts or servers are initiating/opening a connection to a remote network/host they either need a public IP address themselves or need to use NAT Pool or PAT translation. In your case any host on the LAN should be able to initiate connection to anywhere on the Internet&lt;/LI&gt;&lt;LI&gt;IF some remote hosts on the Internet need to initiate/open a connection to servers/hosts on your LAN/DMZ then those said servers/hosts need their own public IP address, port forward configuration or possibly some VPN setup.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if some remote hosts from the Internet is currently attempting connection towards your network the above ASA configuration simply wont do the job. It cant work since there is no NAT configuration to make the connection initiation from the Internet possible. The existing PAT translation only works for the LAN hosts when they are initiating connection towards the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which leads me to believe that you have had some kind of NAT configurations on your old firewall and they are not configured on the ASA firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 16:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143609#M356751</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T16:41:06Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143610#M356752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jouni for your advice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;It seems it did not give enough explanation for what I really trying to achieve here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have software installed on a computer in our network and this one connects remote FTP servers which is not ours and just commercial FTP server accessible for everyone if you have access permission to retrieve files on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I tried to connect the remote ftp server from one of our computers in our network, it can successfully login but when I try "ls" command, I got errors below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;500 illegal PORT command&lt;/P&gt;&lt;P&gt;425 use PORT or PASV first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I talked to the company hosting this FTP servers and they say this might be with the firewall access rules and since I am looking into this. They said I will need to open FTP protocol for inbound and outbound traffic for their remote servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote servers do not need to be initiate connection first with a computer inside the network but a computer inside of our network should be able to access the remote ftp servers and retreive all data required for the software to run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect this ftp servers and do "ls" to retrieve all files from another network without any issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice would be appreciate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 21:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143610#M356752</guid>
      <dc:creator>peterpark421</dc:creator>
      <dc:date>2013-02-13T21:06:12Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143611#M356753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I havent had much problems with FTP connections through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the FTP inspection on the ASA handles the FTP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the following configuration on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect ftp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see any policy-map configuration in your above copy/pasted configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some thread on the Internet simply state to give "passive" command on the FTP CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Feb 2013 21:37:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143611#M356753</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-13T21:37:42Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143612#M356754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect. Creating inspection policy solved the issue. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 17:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143612#M356754</guid>
      <dc:creator>peterpark421</dc:creator>
      <dc:date>2013-02-14T17:27:38Z</dc:date>
    </item>
    <item>
      <title>basic access rule for remote servers.</title>
      <link>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143613#M356755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear that its working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Feb 2013 17:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-access-rule-for-remote-servers/m-p/2143613#M356755</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-14T17:29:42Z</dc:date>
    </item>
  </channel>
</rss>

