<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ftp traffic from dmz to outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114514#M394556</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a site to site VPN tunnel between the Network that let's the traffic from VLAN 192.168.3.x from Head office to remote office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT info&lt;/P&gt;&lt;P class="MsoNormal" style="line-height: normal; margin: 0cm 0cm 0pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;object network ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;&lt;SPAN style="mso-spacerun: yes;"&gt; &lt;/SPAN&gt;nat (dmz,outside1) static interface service tcp ftp ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;Should I be adding ftp-data to this NAT?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Dec 2012 20:33:38 GMT</pubDate>
    <dc:creator>apptionadmin</dc:creator>
    <dc:date>2012-12-06T20:33:38Z</dc:date>
    <item>
      <title>ftp traffic from dmz to outside</title>
      <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114510#M394544</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to ftp from my Head Office to my test machine at the remote location but I can't get the other way around to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error message from the Syslog &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny tcp src 192.168.50.5/1825 dst 208.124.202.44/21 by access-group "dmz_access_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try a couple of ways to fix it but no luck. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;l would appreciate some help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A partial config of my ASA 5505&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_cryptomap extended permit ip object LAN object HeadOffice-VLAN3 &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list inside_access_in extended permit ip interface inside interface outside1 &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit ip any interface outside1 &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 interface outside1 eq https &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit tcp any host 192.168.50.5 eq www &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit tcp any host 192.168.50.5 eq https &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 host 192.168.50.5 object-group RDP &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside1_access_in extended permit tcp object-group DM_INLINE_NETWORK_3 host 192.168.50.5 eq ftp &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list dmz_access_in extended permit tcp any object Server2 eq www &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list dmz_access_in extended permit tcp any host 192.168.50.5 eq www &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list outside_access extended permit object http any object Server2 &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list extended extended permit tcp any host 192.168.50.5 eq ftp &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-list extended extended permit tcp any host 192.168.50.5 eq ftp-data &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-group outside_access in interface outside&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-group outside1_access_in in interface outside1 per-user-override&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;access-group dmz_access_in in interface dmz per-user-override&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;object network Server2&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;nat (dmz,outside1) static interface service tcp www www &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;object network Server3&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;nat (dmz,outside1) static interface service tcp https https &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;object network RDP2&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;nat (dmz,outside1) static interface service tcp 3389 3389 &lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;object network ftp&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;nat (dmz,outside1) static interface service tcp ftp ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="line-height: normal; margin-bottom: 0pt;"&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114510#M394544</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2019-03-12T00:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: ftp traffic from dmz to outside</title>
      <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114511#M394547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the log message the connection is blocked by the access-list &lt;STRONG&gt;"dmz_access_in"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the configuration the mentioned ACL is attached to the direction &lt;STRONG&gt;"in"&lt;/STRONG&gt; on the interface &lt;STRONG&gt;"dmz"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the actual list it seems to me that you have not made a rule that allows the host behind &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface to initiate a FTP Control connection (TCP/21).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt this just be corrected with issuing the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list dmz_access_in permit tcp host &lt;HOST attempting="" the="" connection=""&gt; host &lt;DESTINATION host=""&gt; eq 21&lt;/DESTINATION&gt;&lt;/HOST&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 19:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114511#M394547</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-06T19:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: ftp traffic from dmz to outside</title>
      <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114512#M394550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That help with moving the traffic out. The problem now is the FTP Server is giving this error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIR&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;P&gt;000012) 12/6/2012 14:52:18 PM - (not logged in) (192.168.50.5)&amp;gt; Connected, sending welcome message...&lt;/P&gt;&lt;P&gt;(000012) 12/6/2012 14:52:18 PM - (not logged in) (192.168.50.5)&amp;gt; could not send reply, disconnected.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; "&gt;Stange thing is the Server is login the local IP of the test machine at the remote office should that be the External IP of the ASA firewall...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; "&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/DIR&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 20:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114512#M394550</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2012-12-06T20:01:20Z</dc:date>
    </item>
    <item>
      <title>ftp traffic from dmz to outside</title>
      <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114513#M394552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just seems to me that the host 192.168.50.5 is initiating a connection from behind interface "dmz" and its getting blocked by the "dmz" interfaces access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem to me that the connection the mentioned host is trying to form and that is getting blocked is the actual Control connection of the FTP. So I'm not sure what situation the FTP servers log messages refer to when the firewall log says it has even blocked the initial connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is some L2L VPN between the sites involved here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the a more complete firewall configuration and specific source and destination IP address information for the attempted connection would make it easier to check what the problem might be. For example I don't know how you have configured NAT for the log messages source host 192.168.50.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 20:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114513#M394552</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-06T20:10:43Z</dc:date>
    </item>
    <item>
      <title>ftp traffic from dmz to outside</title>
      <link>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114514#M394556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a site to site VPN tunnel between the Network that let's the traffic from VLAN 192.168.3.x from Head office to remote office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT info&lt;/P&gt;&lt;P class="MsoNormal" style="line-height: normal; margin: 0cm 0cm 0pt; tab-stops: 45.8pt 91.6pt 137.4pt 183.2pt 229.0pt 274.8pt 320.6pt 366.4pt 412.2pt 458.0pt 503.8pt 549.6pt 595.4pt 641.2pt 687.0pt 732.8pt;"&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;object network ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;&lt;SPAN style="mso-spacerun: yes;"&gt; &lt;/SPAN&gt;nat (dmz,outside1) static interface service tcp ftp ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;Should I be adding ftp-data to this NAT?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-fareast-language: EN-CA; mso-bidi-language: AR-SA; line-height: 115%; Courier New&amp;quot;: ; color: #000000; font-size: 10pt; mso-ansi-language: EN-CA; font-family: &amp;quot; mso-fareast-font-family: 'Times New Roman'; "&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 20:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-traffic-from-dmz-to-outside/m-p/2114514#M394556</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2012-12-06T20:33:38Z</dc:date>
    </item>
  </channel>
</rss>

