<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Opening Port Range ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197894#M359361</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, your explanation was easy to understand. I double checked the settings and confirmed it's running in passive-mode. I copied the output of the packet tracer command and I hope I did it correctly. Prior to installing the ASA I was able to use the FTP server without an issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRV_FTP&lt;BR /&gt; host 192.168.0.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRV_FTP&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 1125 ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp x.x.x.x ftp 192.168.0.6 ftp detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb4bc2d0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=103874, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any any eq ftp&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb508bb0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xc9619000, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=21, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb4c01c8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1497, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-ftp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcbd7b4e8, priority=70, domain=inspect-ftp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xcbd7ade8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=21, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcbf93b18, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=17, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb49c078, priority=0, domain=host-limit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network 0.0.0.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbf83a58, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xcb5055a8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Mar 2013 19:37:57 GMT</pubDate>
    <dc:creator>grockin50</dc:creator>
    <dc:date>2013-03-27T19:37:57Z</dc:date>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197890#M359357</link>
      <description>&lt;P&gt;Hello all! I just bought a Cisco ASA5505 and I'm a bit of a newbie. I'm trying to opening a port range through CLI, but it doesn't seem to be working. Any feedback would be appreciated &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Background:&lt;BR /&gt;I have an FTP Server running behind the firewall and need to allow port ranges 30000-30100 for data connections.&amp;nbsp; I have been using FTP through the command prompt and its working. However, I cannot use it through the FileZilla client as it fails to query the directories.&amp;nbsp; I have the ASA forwarding to port 1125 from 21 in passive mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-List:&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In line 3 extended permit tcp any any eq ftp-data (hitcnt=0) 0xfa8ed43d&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In line 4 extended permit tcp any any eq ftp (hitcnt=17) 0x56ee42e8&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In line 5 extended permit tcp any any eq 1125 (hitcnt=31) 0xe5b36f5d&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In line 6 extended permit tcp any object Eric_PC range 30000 31000 (hitcnt=0) 0x0210a864&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list Outside_Access_In line 6 extended permit tcp any host 192.168.0.6 range 30000 31000 (hitcnt=1) 0x0210a864&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Objects:&lt;/P&gt;&lt;P&gt;object service FTP_DATA_CONNECTIONS&lt;/P&gt;&lt;P&gt;service tcp source range 30000 30100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Troubleshooting:&lt;BR /&gt;I did a packet trace and it seems to fail at the NAT phase. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static any any&amp;nbsp;&amp;nbsp; destination static interface Eric_PC service FTP_DATA_CONNECTIONS FTP_DATA_CONNECTIONS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 (inside) to (outside) source static SRV_FTP interface&amp;nbsp;&amp;nbsp; service tcp 1125 ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 31&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197890#M359357</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2019-03-12T01:20:39Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197891#M359358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should not need to open those ports so the data connections start to work, that is the whole purpose of a deep packet inspection firewall as the ASA &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the show run policy-map ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you will need to allow is the control channel connection from out to in, do you undestand me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 18:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197891#M359358</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T18:59:40Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197892#M359359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Julio. I'm still a bit lost on the control channel connection. Here's the policy map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 19:04:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197892#M359359</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-27T19:04:33Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197893#M359360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Erick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okey let me explain you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;policy-map global_policy&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;class inspection_default&lt;/P&gt;&lt;P&gt; inspect ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already have that so , what is that saying???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is basically saying if you receive a FTP packet ( Control-channel packet) inspect that connection if it's allowed by the ASA security checks ( ACLs,NAT,RFP,etc,etc,etc) so you can open the required port ranges without you being forced to create an ACL.&lt;/P&gt;&lt;P&gt;Dinamically,, Do you see the magic now &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in order for us to fix this, here is the information I will need:&lt;/P&gt;&lt;P&gt;1) Are u 100% sure you are running FTP on passive mode?&lt;/P&gt;&lt;P&gt;2) Can you share the NAT rule you did for the FTP server private IP address and Public IP address&lt;/P&gt;&lt;P&gt;3) Can you share the entire packet-tracer result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 19:09:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197893#M359360</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T19:09:48Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197894#M359361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, your explanation was easy to understand. I double checked the settings and confirmed it's running in passive-mode. I copied the output of the packet tracer command and I hope I did it correctly. Prior to installing the ASA I was able to use the FTP server without an issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRV_FTP&lt;BR /&gt; host 192.168.0.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRV_FTP&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 1125 ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp x.x.x.x ftp 192.168.0.6 ftp detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb4bc2d0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=103874, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any any eq ftp&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb508bb0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0xc9619000, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=21, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb4c01c8, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1497, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-ftp&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcbd7b4e8, priority=70, domain=inspect-ftp, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xcbd7ade8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=21, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcbf93b18, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=17, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xcb49c078, priority=0, domain=host-limit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network 0.0.0.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xcbf83a58, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xcb5055a8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 19:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197894#M359361</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-27T19:37:57Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197895#M359362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; packet-tracer input outside tcp x.x.x.x&amp;nbsp; ftp-data 192.168.0.6 ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any any eq ftp-data&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network 0.0.0.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 19:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197895#M359362</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-27T19:44:09Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197896#M359363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network SRV_FTP&lt;BR /&gt;host 192.168.0.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network SRV_FTP&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside,outside) static interface service tcp 1125 ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, SRV_FTP is the internal IP address of the FTP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is that 1125 service used on the NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do the following:&lt;/P&gt;&lt;P&gt;object service ftp_1&lt;/P&gt;&lt;P&gt;service tcp source eq 21&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static SRV_FTP interface service ftp_1 ftp_1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then give it a try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 1025 Outside_ASA_IP_ADDRESS 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 20:05:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197896#M359363</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T20:05:40Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197897#M359364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I have the FTP server running on port 1125. So essentially I'm forwarding port 21 to 1125. After adding the nat (inside,outside) 1 source static SRV_FTP interface service ftp_1 ftp_1 statement the FTP wouldn't connect anymore. After removing the statement I was able to connect. Here is also the log from the FTP client. Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;P&gt;Status: Connection established, waiting for welcome message...&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 220 Eric's File Server&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: USER eric&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 331 Password required for eric.&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: PASS *******&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 230 User Eric logged in.&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;P&gt;Status: Server does not support non-ASCII characters.&lt;/P&gt;&lt;P&gt;Status: Connected&lt;/P&gt;&lt;P&gt;Status: Retrieving directory listing...&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: PWD&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 257 "/" is current directory.&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: TYPE I&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 200 Type set to I.&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: PASV&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #008000; font-size: 8pt; "&gt;&lt;P&gt;Response: 227 Entering Passive Mode (108,27,79,125,117,88)&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000080; font-size: 8pt; "&gt;&lt;P&gt;Command: LIST&lt;/P&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #ff0000; font-size: 8pt;"&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;DIR&gt;&lt;SPAN style="color: #ff0000; font-size: 8pt;"&gt;&lt;P&gt;Error: Connection timed out&lt;/P&gt;&lt;P&gt;Error: Failed to retrieve directory listing&lt;/P&gt;&lt;/SPAN&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/SPAN&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;/DIR&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 4.2.2.2 1025 192.168.1.9 21&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network SRV_FTP&lt;BR /&gt; nat (inside,outside) static interface service tcp 1125 ftp&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 192.168.1.9/21 to 192.168.0.6/1125&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_Access_In in interface outside&lt;BR /&gt;access-list Outside_Access_In extended permit tcp any any eq 1125&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network SRV_FTP&lt;BR /&gt; nat (inside,outside) static interface service tcp 1125 ftp&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3210, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 20:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197897#M359364</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-27T20:15:25Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197898#M359365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port 1025,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the nat you had there &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; as that is what you need ( Did not read you were using port 1025)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is it working now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 20:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197898#M359365</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T20:23:17Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197899#M359366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's still failing on listing &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Surprisely, listing, uploading, and downloading work through command prompt. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 20:45:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197899#M359366</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-27T20:45:54Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197900#M359368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So everything works except the listing... Uploading and downloading works just fine...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see that the inspection is there, the NAT is properly setup, ACL's are good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we will need to run captures to see what happens when you do&amp;nbsp; a list request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080a9edd6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you create a capture on both inside and outside interface&amp;nbsp; matching this traffic ( as specific as possible) so we can see what happens here,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 21:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197900#M359368</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T21:10:30Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197901#M359370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry if I wasn't clear on the issue. With the FTP client, it doesn't work because the first thing it tries to do is list the directory contents upon connecting and it disconnects after the list command fails. Doing FTP through command prompt results in no issues which is odd. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 00:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197901#M359370</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-28T00:54:12Z</dc:date>
    </item>
    <item>
      <title>Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197902#M359375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it could be an application problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do the captures first with the FTP client..?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 00:56:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197902#M359375</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-28T00:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197903#M359376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The FTP server worked before putting the ASA in. I took logs from the bulletproof server unfortunately they are not in-depth and also I tried a different FTP client and got a little more information on the port it's trying to connect to. Also, is this normal for the FTP policy map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show run policy-map type inspect ftp&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From BulletProof FTP server application:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - INFO: ftp-client connection made from IP:192.168.0.6&lt;BR /&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - INFO: sending welcome message to client (MOTD).&lt;BR /&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - 220 Eric's File Server&lt;BR /&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - USER eric&lt;BR /&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - 331 Password required for eric.&lt;BR /&gt;2013-03-28 09:06:33 - (not logged in) [000043] [outside IP] - PASS ********&lt;BR /&gt;2013-03-28 09:06:33 - Eric [000043] [outside IP] - INFO: logged in.&lt;BR /&gt;2013-03-28 09:06:33 - Eric [000043] [outside IP] - 230 User Eric logged in.&lt;BR /&gt;2013-03-28 09:06:33 - Eric [000043] [outside IP] - SYST &lt;BR /&gt;2013-03-28 09:06:33 - Eric [000043] [outside IP] - 215 UNIX Type: L8&lt;BR /&gt;2013-03-28 09:06:34 - Eric [000043] [outside IP] - PWD &lt;BR /&gt;2013-03-28 09:06:34 - Eric [000043] [outside IP] - 257 "/" is current directory.&lt;BR /&gt;2013-03-28 09:06:34 - Eric [000043] [outside IP] - PASV &lt;P&gt;&lt;/P&gt;&lt;P&gt;2013-03-28 09:06:34 - Eric [000043] [outside IP] - 227 Entering Passive Mode (x,x,x,x,117,144)&lt;/P&gt;&lt;P&gt;2013-03-28 09:06:34 - Eric [000043] [outside IP] - LIST &lt;/P&gt;&lt;P&gt;2013-03-28 09:07:05 - Eric [000043] [outside IP] - ABOR &lt;/P&gt;&lt;P&gt;2013-03-28 09:07:05 - Eric [000043] [outside IP] - 426 Cannot retrieve. Failed. Aborting&lt;/P&gt;&lt;P&gt;2013-03-28 09:07:05 - Eric [000043] [outside IP] - 226 ABOR command successful.&lt;/P&gt;&lt;P&gt;2013-03-28 09:07:09 - Eric [000043] [outside IP] - QUIT &lt;/P&gt;&lt;P&gt;2013-03-28 09:07:09 - Eric [000043] [outside IP] - 221 Goodbye.&lt;/P&gt;&lt;P&gt;2013-03-28 09:07:09 - Eric [000043] [outside IP] - INFO: user disconnected gracefully. (00:00:36)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From CoreFTP client:&lt;BR /&gt;Connect socket #924 to x.x.x.x, port 21...&lt;BR /&gt;220 Eric's File Server&amp;nbsp; &lt;BR /&gt;331 Password required for eric. &lt;BR /&gt;230 User Eric logged in. &lt;BR /&gt;215 UNIX Type: L8 &lt;BR /&gt;Keep alive off...&lt;BR /&gt;257 "/" is current directory. &lt;BR /&gt;227 Entering Passive Mode (x,x,x,x,117,144) &lt;BR /&gt;LIST&amp;nbsp; &lt;BR /&gt;Connect socket #964 to x.x.x.x, port 30096...&lt;BR /&gt;timeout&lt;BR /&gt;426 Cannot retrieve. Failed. Aborting&amp;nbsp; &lt;BR /&gt;226 ABOR command successful.&amp;nbsp; &lt;BR /&gt;221 Goodbye. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 13:12:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197903#M359376</guid>
      <dc:creator>grockin50</dc:creator>
      <dc:date>2013-03-28T13:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Opening Port Range ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197904#M359379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eric,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to proceed with this we will need the captures I have requested,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will let us know what is going on&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 16:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-port-range-asa5505/m-p/2197904#M359379</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-28T16:25:59Z</dc:date>
    </item>
  </channel>
</rss>

