<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to allow ftp traffic pass through ASA firewall? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116611#M393211</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This basically means that the ASA firewalls seens the SYN of the initial FTP connection attempt from the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But on the other hand it tells that ASA doesnt see any reply from the actual FTP server behind it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would seem the problem is somewhere behind the ASA since the connection has come through the Router and ASA just fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 09 Jan 2013 08:28:20 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-09T08:28:20Z</dc:date>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116603#M393203</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Our structure is internet---Router----ASA-----TMG----FTP server, I try to publish ftp service to public, I did nat in router and created access-list in both router and ASA to allow ftp traffic pass through, and I configured inspect ftp in ASA, but I can't see traffic reach TMG, any one can help is appreciated!&lt;/P&gt;&lt;P&gt;Router configuration for ftp:&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.xxx.xx 20 xxx.xxx.xxx.xxx 20 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.xxx.xx 21 xxx.xxx.xxx.xxx 21 extendable&lt;/P&gt;&lt;P&gt;ASA configuration for ftp:&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt;port-object eq ftp&lt;/P&gt;&lt;P&gt;port-object eq ftp-data&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 192.168.xxx.xx object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgs!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Zhentian&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116603#M393203</guid>
      <dc:creator>zhentian1979</dc:creator>
      <dc:date>2019-03-12T00:44:49Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116604#M393204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably the problem is that in ftp passive mode it's random port used for data channel, not tcp port 20. I think the range is 30000-35000/tcp. So you should modify your nat and access rules on router accrodingly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 07:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116604#M393204</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-01-09T07:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116605#M393205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command "ftp mode passive" only relates to how the ASA operates when you use FTP to transfer files with ASA. It doesnt affect the FTP connections going through it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you say you dont see anything of the FTP Connection on the TMG I would suggest going through the Router and ASA configurations through once more and check ASA logs while someone is attempting FTP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 07:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116605#M393205</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T07:20:53Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116606#M393206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I can see the counter increased when I try ftp fron outside:&lt;/P&gt;&lt;P&gt;ASA# sh service-policy inspect ftp&lt;/P&gt;&lt;P&gt;Global policy: &lt;BR /&gt;&amp;nbsp; Service-policy: global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: ftp, packet 3385, lock fail 0, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;any other command can be used to get usful output info? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 07:33:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116606#M393206</guid>
      <dc:creator>zhentian1979</dc:creator>
      <dc:date>2013-01-09T07:33:12Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116607#M393207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But would be better to get the actual log messages of the connection you are attempting as the above output could be about any other FTP connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also issue "packet-tracer" command on the ASA to see what would happen to the FTP connection regarding firewall rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input &lt;OUTSIDE interface="" name=""&gt; tcp &lt;SOURCE ip=""&gt; &lt;RANDOM source="" port=""&gt; &lt;DESTINATION ip=""&gt; 21&lt;/DESTINATION&gt;&lt;/RANDOM&gt;&lt;/SOURCE&gt;&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 07:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116607#M393207</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T07:36:39Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116608#M393208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jouni!&lt;/P&gt;&lt;P&gt;I tested it with packet tracer in asdm, it show both outside and inside interface allow packet password through.&lt;/P&gt;&lt;P&gt;here is output from packet-tracer command:&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input outside tcp 125.177.177.222 5915 XXX.XXX.XXX.XX 21&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; XXX.XXX.XXX.XX&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.254.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group 102 in interface outside&lt;BR /&gt;access-list 102 extended permit tcp any host XXX.XXX.XXX.XX object-group DM_INLINE_TCP_1 &lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: INSPECT &lt;BR /&gt;Subtype: inspect-ftp&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: VPN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1330160, packet dispatched to next module&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 07:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116608#M393208</guid>
      <dc:creator>zhentian1979</dc:creator>
      <dc:date>2013-01-09T07:46:22Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116609#M393209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So seems to me the firewall rules are fine regarding the FTP Control connection (TCP/21)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next would be good to monitor a connection attempt through the ADSM Monitor/Logging. (Logging level atleast informational)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look for the "Built" and "Teardown" messages of a single FTP connection attempt and see if you could copy paste the "Teardown" log message for the TCP connection attempt here on the forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided you see the connection attempt on the ASA logs ofcourse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 08:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116609#M393209</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T08:14:54Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116610#M393210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I can see log from asdm like below:&lt;/P&gt;&lt;P&gt;6 Jan 09 2013 09:19:17&amp;nbsp; 125.177.177.222 1978 XXX.XXX.XXX.XX 21 Teardown TCP connection 1343807 for outside:125.177.177.222/1978 to inside:XXX.XXX.XXX.XX/21 duration 0:00:30 bytes 0 SYN Timeout&lt;/P&gt;&lt;P&gt;6 Jan 09 2013 09:19:13&amp;nbsp; 125.77.177.222 1980 XXX.XXX.XXX.XX 21 Built inbound TCP connection 1344013 for outside:125.177.177.222/1980 (125.177.177.222/1980) to inside:XXX.XXX.XXX.XX/21 (XXX.XXX.XXX.XX/21)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 08:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116610#M393210</guid>
      <dc:creator>zhentian1979</dc:creator>
      <dc:date>2013-01-09T08:25:42Z</dc:date>
    </item>
    <item>
      <title>How to allow ftp traffic pass through ASA firewall?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116611#M393211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This basically means that the ASA firewalls seens the SYN of the initial FTP connection attempt from the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But on the other hand it tells that ASA doesnt see any reply from the actual FTP server behind it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would seem the problem is somewhere behind the ASA since the connection has come through the Router and ASA just fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 08:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116611#M393211</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T08:28:20Z</dc:date>
    </item>
    <item>
      <title>How to lock down the ports</title>
      <link>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116612#M393212</link>
      <description>&lt;P&gt;&amp;lt;deleted&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 20:42:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-allow-ftp-traffic-pass-through-asa-firewall/m-p/2116612#M393212</guid>
      <dc:creator>ryannexsen</dc:creator>
      <dc:date>2016-06-09T20:42:29Z</dc:date>
    </item>
  </channel>
</rss>

