<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot access external websites that use FTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108228#M393719</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im having trouble with that. I think I my need to adjust my filtering options in wireshark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Dec 2012 20:23:07 GMT</pubDate>
    <dc:creator>joescott4t</dc:creator>
    <dc:date>2012-12-27T20:23:07Z</dc:date>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108217#M393661</link>
      <description>&lt;P&gt;hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am having an issue where I cannot access certain files on websites. It looks as though the files are accessed via ftp. Could my router be blocking it. I have a Cisco 2801 router acting as a firewall. If you need more information please let me know what to post. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108217#M393661</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2019-03-12T00:41:30Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108218#M393665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 16:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108218#M393665</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T16:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108219#M393670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 12313 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;service timestamps debug datetime localtime&lt;/P&gt;&lt;P&gt;service timestamps log datetime localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname -2801&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging message-counter syslog&lt;/P&gt;&lt;P&gt;logging buffered 4096&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login userauthen group radius local&lt;/P&gt;&lt;P&gt;aaa authorization network groupauthor local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone est -5&lt;/P&gt;&lt;P&gt;clock summer-time zone recurring last Sun Mar 2:00 1 Sun Nov 2:00&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 172.19.3.129 172.19.3.149&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 172.19.10.1 172.19.10.253&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 172.19.3.140&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 172.19.3.133&lt;/P&gt;&lt;P&gt;ip dhcp ping timeout 900&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool DHCP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 172.19.3.128 255.255.255.128&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 172.19.3.129 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; domain-name domain.local&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; netbios-name-server 172.19.3.7 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; option 66 ascii 172.19.3.225&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 172.19.3.140 208.67.220.220 208.67.222.222 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool VoiceDHCP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 172.19.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 172.19.10.1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 208.67.220.220 8.8.8.8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; option 66 ascii 172.19.10.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; lease 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW cuseeme&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW dns&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW ftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW h323&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW https&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW icmp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW imap&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW pop3&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW netshow&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW rcmd&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW realaudio&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW rtsp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW esmtp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW sqlnet&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW streamworks&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW tftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW tcp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW udp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_LOW vdolive&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip domain name domain.local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;key chain key1&lt;/P&gt;&lt;P&gt; key 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; key-string 7 06040033484B1B484557&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-3448656681&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-3448656681&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-3448656681&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin privilege 15 password&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidekeys&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key xxxxx address XXXXXXX&lt;/P&gt;&lt;P&gt;crypto isakmp key XXXXXXX address XXXXXXX&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 40 5&lt;/P&gt;&lt;P&gt;crypto isakmp nat keepalive 20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group VPN&lt;/P&gt;&lt;P&gt; key XXXXXXX&lt;/P&gt;&lt;P&gt; dns 172.19.3.140&lt;/P&gt;&lt;P&gt; wins 172.19.3.140&lt;/P&gt;&lt;P&gt; domain domain.local&lt;/P&gt;&lt;P&gt; pool VPN_Pool&lt;/P&gt;&lt;P&gt; acl 198&lt;/P&gt;&lt;P&gt;crypto isakmp profile VPNClient&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; description VPN clients profile&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match identity group VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client authentication list userauthen&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; isakmp authorization list groupauthor&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto dynamic-map Dynamic 5&lt;/P&gt;&lt;P&gt; set transform-set myset &lt;/P&gt;&lt;P&gt; set isakmp-profile VPNClient&lt;/P&gt;&lt;P&gt; qos pre-classify&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map VPN 10 ipsec-isakmp &lt;/P&gt;&lt;P&gt; set peer XXXXXXX&lt;/P&gt;&lt;P&gt; set transform-set myset &lt;/P&gt;&lt;P&gt; match address 101&lt;/P&gt;&lt;P&gt; qos pre-classify&lt;/P&gt;&lt;P&gt;crypto map VPN 20 ipsec-isakmp &lt;/P&gt;&lt;P&gt; ! Incomplete&lt;/P&gt;&lt;P&gt; set peer XXXXXXX&lt;/P&gt;&lt;P&gt; set transform-set myset &lt;/P&gt;&lt;P&gt; match address 103&lt;/P&gt;&lt;P&gt;crypto map VPN 65535 ipsec-isakmp dynamic Dynamic &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 123 ip sla 1 reachability&lt;/P&gt;&lt;P&gt; delay down 15 up 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map match-any VoiceTraffic&lt;/P&gt;&lt;P&gt; match protocol rtp audio &lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol rtcp&lt;/P&gt;&lt;P&gt; match access-group name VOIP&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt;class-map match-any RDP&lt;/P&gt;&lt;P&gt; match access-group 199&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map QOS&lt;/P&gt;&lt;P&gt; class VoiceTraffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bandwidth 512&lt;/P&gt;&lt;P&gt; class RDP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bandwidth 768&lt;/P&gt;&lt;P&gt;policy-map MainQOS&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; shape average 1500000&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy QOS&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-FE 0$$FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 172.19.3.129 255.255.255.128&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW in&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0.10&lt;/P&gt;&lt;P&gt; description $ETH-VoiceVLAN$$&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 10&lt;/P&gt;&lt;P&gt; ip address 172.19.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW in&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description "Comcast"&lt;/P&gt;&lt;P&gt; ip address Public IP 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 102 in&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW out&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map VPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/1/0&lt;/P&gt;&lt;P&gt; description "Verizon LEC Site ID"&lt;/P&gt;&lt;P&gt; bandwidth 1536&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; encapsulation frame-relay IETF&lt;/P&gt;&lt;P&gt; frame-relay lmi-type ansi&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/1/0.1 point-to-point&lt;/P&gt;&lt;P&gt; bandwidth 1536&lt;/P&gt;&lt;P&gt; ip address XXXXXXX 255.255.255.252&lt;/P&gt;&lt;P&gt; ip access-group 102 in&lt;/P&gt;&lt;P&gt; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW out&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; frame-relay interface-dlci 500 IETF&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; crypto map VPN&lt;/P&gt;&lt;P&gt; service-policy output MainQOS&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/2/0&lt;/P&gt;&lt;P&gt; description "Verizon ID) "&lt;/P&gt;&lt;P&gt; ip address XXXXXXX 255.255.255.252&lt;/P&gt;&lt;P&gt; ip access-group 102 in&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW out&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; encapsulation ppp&lt;/P&gt;&lt;P&gt; crypto map VPN&lt;/P&gt;&lt;P&gt; service-policy output MainQOS&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 172.20.3.130 172.20.3.254&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 XXXXXXX track 123&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 XXXXXXX 254&lt;/P&gt;&lt;P&gt;ip route 107.0.197.20 255.255.255.255 XXXXXXX&lt;/P&gt;&lt;P&gt;ip route 208.67.220.220 255.255.255.255 XXXXXXX&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip flow-top-talkers&lt;/P&gt;&lt;P&gt; top 20&lt;/P&gt;&lt;P&gt; sort-by bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat inside source route-map COMCAST interface FastEthernet0/1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source route-map PAE interface Serial0/2/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source route-map VERIZON interface Serial0/1/0.1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static 172.19.3.133 12.12.12.12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended VOIP&lt;/P&gt;&lt;P&gt; permit ip 172.20.3.0 0.0.0.127 host 172.19.3.190&lt;/P&gt;&lt;P&gt; permit ip host 172.19.3.190 172.20.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface FastEthernet0/0 &lt;/P&gt;&lt;P&gt;ip sla 1&lt;/P&gt;&lt;P&gt; icmp-echo 208.67.220.220 source-interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; timeout 10000&lt;/P&gt;&lt;P&gt; frequency 15&lt;/P&gt;&lt;P&gt;ip sla schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;access-list 23 permit 172.19.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 23 permit 172.19.3.128 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 23 permit 173.189.251.192 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 23 permit 107.0.197.0 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 23 permit 173.163.157.32 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 23 permit 72.55.33.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 23 permit 172.19.5.0 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 100 remark "Outgoing Traffic"&lt;/P&gt;&lt;P&gt;access-list 100 remark CCP_ACL Category=17&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 67.128.87.156 0.0.0.3 any&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.3.190 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp host 172.19.3.137 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 66.251.35.131 eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any host 173.201.193.101 eq smtp&lt;/P&gt;&lt;P&gt;access-list 100 permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.19.3.128 0.0.0.127 172.19.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.20.3.128 0.0.0.127 172.19.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.19.3.128 0.0.0.127 host 172.19.250.10&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.19.3.128 0.0.0.127 host 172.19.250.11&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.19.3.128 0.0.0.127 host 172.19.5.64&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 172.19.3.128 0.0.0.127 172.19.5.64 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 102 remark CCP_ACL Category=17&lt;/P&gt;&lt;P&gt;access-list 102 permit ip any host 12.12.12.12&lt;/P&gt;&lt;P&gt;access-list 102 remark "Inbound Access"&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host XXXXXXX eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host XXXXXXX eq isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit esp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 permit ahp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host XXXXXXX eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit esp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 permit ahp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host Public IP eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host Public IP eq isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit esp any host Public IP&lt;/P&gt;&lt;P&gt;access-list 102 permit ahp any host Public IP&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 72.55.33.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 107.0.197.0 0.0.0.63 any&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 any&lt;/P&gt;&lt;P&gt;access-list 102 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 102 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 102 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 102 remark ftp&lt;/P&gt;&lt;P&gt;access-list 102 permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list 102 remark FTP Data&lt;/P&gt;&lt;P&gt;access-list 102 permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;access-list 102 permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host XXXXXXX eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit udp any host XXXXXXX eq isakmp&lt;/P&gt;&lt;P&gt;access-list 102 permit esp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 permit ahp any host XXXXXXX&lt;/P&gt;&lt;P&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 172.19.5.0 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 172.19.5.64 0.0.0.63&lt;/P&gt;&lt;P&gt;access-list 110 remark "Outbound NAT Rule"&lt;/P&gt;&lt;P&gt;access-list 110 remark "Deny VPN Traffic NAT"&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 172.19.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 172.19.10.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.10.0 0.0.0.255 172.19.3.128 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.20.3.128 0.0.0.127 172.19.3.0 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 172.20.3.128 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 host 172.19.250.11&lt;/P&gt;&lt;P&gt;access-list 110 deny&amp;nbsp;&amp;nbsp; ip 172.19.3.128 0.0.0.127 host 172.19.250.10&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.19.3.128 0.0.0.127 any&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 172.19.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 198 remark "Networks for VPN Client"&lt;/P&gt;&lt;P&gt;access-list 198 permit ip 172.19.3.0 0.0.0.127 172.20.3.128 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 198 permit ip 172.19.3.128 0.0.0.127 172.20.3.128 0.0.0.127&lt;/P&gt;&lt;P&gt;access-list 199 permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map PAE permit 10&lt;/P&gt;&lt;P&gt; match ip address 110&lt;/P&gt;&lt;P&gt; match interface Serial0/2/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map COMCAST permit 10&lt;/P&gt;&lt;P&gt; match ip address 110&lt;/P&gt;&lt;P&gt; match interface FastEthernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map VERIZON permit 10&lt;/P&gt;&lt;P&gt; match ip address 110&lt;/P&gt;&lt;P&gt; match interface Serial0/1/0.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;snmp-server community RO&lt;/P&gt;&lt;P&gt;radius-server host 172.19.3.7 auth-port 1645 acct-port 1646 key 7 060506324F411F090B464058&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 23 in&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; access-class 23 in&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler allocate 20000 1000&lt;/P&gt;&lt;P&gt;ntp server 128.118.25.3&lt;/P&gt;&lt;P&gt;ntp server 217.150.242.8&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-2801#exit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 17:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108219#M393670</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T17:13:54Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108220#M393675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, you do are inspecting FTP ( that is good)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config te &lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to download those files and after you get the error inmediatly do the following&lt;BR /&gt;show logging | include x.x.x.x&lt;/P&gt;&lt;P&gt;Where the x.x.x.x is the ip address of the website you are trying to access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will let us know if the firewall is dropping those connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 17:51:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108220#M393675</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T17:51:03Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108221#M393682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well i tried that but the show logging | clude returned nothing. I thought that firewall was already configured to allow ftp connections.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 18:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108221#M393682</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T18:03:35Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108222#M393688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the point,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall is already configured to allow that so it looks something else is denying the connection as the firewall is not retrieving anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove the access-group and the inspect rules in order to test it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 18:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108222#M393688</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T18:07:54Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108223#M393695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The router is live and I dont want mess anything up my cisco skills are are green. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 18:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108223#M393695</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T18:15:26Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108224#M393700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got it but right now based on what you have asked and provided I can tell you does not look like a CBAC issue ( to be sure we should take it out but as you cannot do that&amp;nbsp; this ends right there &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My other suggestion is from an internal PC can you run wireshark while trying to donwload those files and show us what you see on the capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 18:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108224#M393700</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T18:19:58Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108225#M393706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can do the wireshark and report back&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 18:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108225#M393706</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T18:25:23Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108226#M393711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok i was able to remove all the access-group lists, and try but its still not working this is very strange.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 20:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108226#M393711</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T20:11:46Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108227#M393714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, Looks like something else is blocking this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you get the wireshark capture&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 20:14:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108227#M393714</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T20:14:51Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108228#M393719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im having trouble with that. I think I my need to adjust my filtering options in wireshark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 20:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108228#M393719</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2012-12-27T20:23:07Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108229#M393721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tcp.port==21&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2012 20:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108229#M393721</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-27T20:27:12Z</dc:date>
    </item>
    <item>
      <title>Cannot access external websites that use FTP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108230#M393727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still not finding anything. Its something withing the router but I just cant figure out what it is. I looked through wireshark and saw no errors.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 17:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-websites-that-use-ftp/m-p/2108230#M393727</guid>
      <dc:creator>joescott4t</dc:creator>
      <dc:date>2013-01-11T17:40:11Z</dc:date>
    </item>
  </channel>
</rss>

