<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cut through Proxy ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cut-through-proxy-asa/m-p/1924519#M457635</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've only configured HTTP/HTTPS connection cut through proxy for some virtual ASA FWs that only handle customers own guest networks traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding something similiar could be done to FTP in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CUT-THROUGH-PROXY-FTP permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication match CUT-THROUGH-PROXY-FTP &lt;INTERFACE&gt; LOCAL (or AAA servergroup)&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using "show run timeout" will show what the timeout value for the authenticated user is, for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# show run timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 9:00:00&lt;/P&gt;&lt;P&gt;timeout conn 8:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 8:00:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to set the "uauth" value to something desirable for your situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the authentication itself works that you give both the ASA LOCAL/SERVER-GROUP and FTP -server username/password in the format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;ASA-USERNAME&gt;@&lt;FTP-USERNAME&gt;&lt;/FTP-USERNAME&gt;&lt;/ASA-USERNAME&gt;&lt;/P&gt;&lt;P&gt;&lt;ASA-PASSWORD&gt;@&lt;FTP-PASSWORD&gt;&lt;/FTP-PASSWORD&gt;&lt;/ASA-PASSWORD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to find some tips on the ASA configuration manual and command reference applicable to your ASAs software. There might have been some changes in the format between the older software and 8.4 atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Mar 2012 07:08:04 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2012-03-29T07:08:04Z</dc:date>
    <item>
      <title>Cut through Proxy ASA</title>
      <link>https://community.cisco.com/t5/network-security/cut-through-proxy-asa/m-p/1924518#M457632</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope someone can help. I want to enable a cut through proxy solution on my firewall, in a way that internal users get authenticated to the firewall and are allowed access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have users connecting on FTP and i understand ASA is capable of direct FTP auth. In this scenario, internal user will require cuthrough to internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User --------- int INTF [A S A] ext INTF--------DMZ------- [EXT Firewall]---------------Internet FTP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want user authenticate to ASA and then allow FTP connection out to the FTP server, please note FTP server has its own authentication [un/pass]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone implemented this sort of design, or what would be the best approach to have this solution implemented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate any help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;AP&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cut-through-proxy-asa/m-p/1924518#M457632</guid>
      <dc:creator>amar_5664</dc:creator>
      <dc:date>2019-03-11T22:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cut through Proxy ASA</title>
      <link>https://community.cisco.com/t5/network-security/cut-through-proxy-asa/m-p/1924519#M457635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've only configured HTTP/HTTPS connection cut through proxy for some virtual ASA FWs that only handle customers own guest networks traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding something similiar could be done to FTP in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CUT-THROUGH-PROXY-FTP permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication match CUT-THROUGH-PROXY-FTP &lt;INTERFACE&gt; LOCAL (or AAA servergroup)&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using "show run timeout" will show what the timeout value for the authenticated user is, for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# show run timeout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 9:00:00&lt;/P&gt;&lt;P&gt;timeout conn 8:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 8:00:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to set the "uauth" value to something desirable for your situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the authentication itself works that you give both the ASA LOCAL/SERVER-GROUP and FTP -server username/password in the format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;ASA-USERNAME&gt;@&lt;FTP-USERNAME&gt;&lt;/FTP-USERNAME&gt;&lt;/ASA-USERNAME&gt;&lt;/P&gt;&lt;P&gt;&lt;ASA-PASSWORD&gt;@&lt;FTP-PASSWORD&gt;&lt;/FTP-PASSWORD&gt;&lt;/ASA-PASSWORD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to find some tips on the ASA configuration manual and command reference applicable to your ASAs software. There might have been some changes in the format between the older software and 8.4 atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Mar 2012 07:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cut-through-proxy-asa/m-p/1924519#M457635</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-03-29T07:08:04Z</dc:date>
    </item>
  </channel>
</rss>

