<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: zone based firewall - ftp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763295#M493735</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries. Asa is so much easier to deal w vs zbf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Nov 2011 00:19:24 GMT</pubDate>
    <dc:creator>Joseph Chambers</dc:creator>
    <dc:date>2011-11-11T00:19:24Z</dc:date>
    <item>
      <title>zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763289#M493729</link>
      <description>&lt;P&gt;I'm having an issue where ftp is allowed out, but is dropping on the way back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;seeing &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dropping tcp pkt 209.95.232.144:20 =&amp;gt; 192.168.0.11:62589&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that mean an ACL is dropping and not the ZBF?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763289#M493729</guid>
      <dc:creator>Joseph Chambers</dc:creator>
      <dc:date>2019-03-11T21:48:31Z</dc:date>
    </item>
    <item>
      <title>zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763290#M493730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;have you the following command:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -ip inspect log drop-pkt&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, the ZBF drop should look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; %FW-6-DROP_PKT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want you can post your running configuration with some changes of course because of security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 18:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763290#M493730</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-09T18:50:13Z</dc:date>
    </item>
    <item>
      <title>zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763291#M493731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt; match access-group 116&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-user-protocol--1-2&lt;/P&gt;&lt;P&gt; match access-group 107&lt;/P&gt;&lt;P&gt; match protocol user-protocol--1&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-service-sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-http-1&lt;/P&gt;&lt;P&gt; match access-group 108&lt;/P&gt;&lt;P&gt; match class-map sdm-service-sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-user-protocol--1-1&lt;/P&gt;&lt;P&gt; match access-group 106&lt;/P&gt;&lt;P&gt; match protocol user-protocol--1&lt;/P&gt;&lt;P&gt;class-map type inspect match-any FTP&lt;/P&gt;&lt;P&gt; match protocol ftps&lt;/P&gt;&lt;P&gt; match protocol ftp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-1&lt;/P&gt;&lt;P&gt; match class-map FTP&lt;/P&gt;&lt;P&gt; match access-group 120&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map type inspect match-all sdm-nat-smtp-1&lt;/P&gt;&lt;P&gt; match access-group 104&lt;/P&gt;&lt;P&gt; match protocol smtp&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_AH&lt;/P&gt;&lt;P&gt; match access-group name SDM_AH&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_WEBVPN&lt;/P&gt;&lt;P&gt; match access-group name SDM_WEBVPN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt; match class-map SDM_WEBVPN&lt;/P&gt;&lt;P&gt; match access-group 110&lt;/P&gt;&lt;P&gt;class-map type inspect match-any CCP-Voice-permit&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol skinny&lt;/P&gt;&lt;P&gt; match protocol sip&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt; match protocol cuseeme&lt;/P&gt;&lt;P&gt; match protocol dns&lt;/P&gt;&lt;P&gt; match protocol h323&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol imap&lt;/P&gt;&lt;P&gt; match protocol pop3&lt;/P&gt;&lt;P&gt; match protocol netshow&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match protocol shell&lt;/P&gt;&lt;P&gt; match protocol realmedia&lt;/P&gt;&lt;P&gt; match protocol rtsp&lt;/P&gt;&lt;P&gt; match protocol smtp extended&lt;/P&gt;&lt;P&gt; match protocol sql-net&lt;/P&gt;&lt;P&gt; match protocol streamworks&lt;/P&gt;&lt;P&gt; match protocol tftp&lt;/P&gt;&lt;P&gt; match protocol vdolive&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt; match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;class-map type inspect match-any all&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-cls--1&lt;/P&gt;&lt;P&gt; match class-map all&lt;/P&gt;&lt;P&gt; match access-group name to_ezvpn&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_IP&lt;/P&gt;&lt;P&gt; match access-group name SDM_IP&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_ESP&lt;/P&gt;&lt;P&gt; match access-group name SDM_ESP&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC&lt;/P&gt;&lt;P&gt; match protocol isakmp&lt;/P&gt;&lt;P&gt; match protocol ipsec-msft&lt;/P&gt;&lt;P&gt; match class-map SDM_AH&lt;/P&gt;&lt;P&gt; match class-map SDM_ESP&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_EASY_VPN_SERVER_PT&lt;/P&gt;&lt;P&gt; match class-map SDM_EASY_VPN_SERVER_TRAFFIC&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt; match protocol icmp&lt;/P&gt;&lt;P&gt; match protocol tcp&lt;/P&gt;&lt;P&gt; match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt; match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt; match access-group 103&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-https-2&lt;/P&gt;&lt;P&gt; match access-group 109&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-nat-https-1&lt;/P&gt;&lt;P&gt; match access-group 105&lt;/P&gt;&lt;P&gt; match protocol https&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-protocol-http&lt;/P&gt;&lt;P&gt; match protocol http&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; !&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt; class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-smtp-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-https-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-user-protocol--1-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-user-protocol--1-2&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-http-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-nat-https-2&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt; class type inspect ccp-invalid-src&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt; class type inspect ccp-protocol-http&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class type inspect CCP-Voice-permit&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt; class type inspect SDM_EASY_VPN_SERVER_PT&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt; class type inspect SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-policy-sdm-cls--1&lt;/P&gt;&lt;P&gt; class type inspect sdm-cls--1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-inspect-all&lt;/P&gt;&lt;P&gt; class type inspect sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt; class type inspect SDM_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; drop log&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security LAN&lt;/P&gt;&lt;P&gt;zone security Outside&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone security ezvpn-zone&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt; service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-permit-ip&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-self-ezvpn-zone source self destination ezvpn-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect sdm-policy-sdm-cls--1&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; description Do not delete - SDM WebVPN generated interface&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback1&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip address 192.168.52.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback5&lt;/P&gt;&lt;P&gt; ip address 192.168.57.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback6&lt;/P&gt;&lt;P&gt; ip address 192.168.58.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback9&lt;/P&gt;&lt;P&gt; ip address 192.168.61.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description connected to EthernetLAN$ETH-LAN$$FW_INSIDE$$ES_LAN$&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security in-zone&lt;/P&gt;&lt;P&gt; no ip route-cache cef&lt;/P&gt;&lt;P&gt; no ip route-cache&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description $ETH-WAN$$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address x.x.x.82 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; zone-member security out-zone&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat inside source route-map nonat interface FastEthernet0/1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.30 25 x.x.x.83 25 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.30 443 x.x.x.83 443 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.31 3389 x.x.x.84 3389 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.19 3389 x.x.x.85 3389 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.8 443 x.x.x.86 443 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.11 20 x.x.x.88 20 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.11 21 x.x.x.88 21 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.11 3389 x.x.x.88 3389 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.6 3389 x.x.x.89 3389 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.0.7 21 x.x.x.90 21 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.1 443 192.168.0.1 4443 extendable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_AH&lt;/P&gt;&lt;P&gt; remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt; permit ahp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_ESP&lt;/P&gt;&lt;P&gt; remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt; permit esp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_IP&lt;/P&gt;&lt;P&gt; remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_WEBVPN&lt;/P&gt;&lt;P&gt; remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt; permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;ip access-list extended VPN&lt;/P&gt;&lt;P&gt; permit udp any host 192.168.0.1 eq non500-isakmp&lt;/P&gt;&lt;P&gt; permit udp any host 192.168.0.1 eq isakmp&lt;/P&gt;&lt;P&gt; permit esp any host 192.168.0.1&lt;/P&gt;&lt;P&gt; permit ahp any host 192.168.0.1&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ip access-list extended to_ezvpn&lt;/P&gt;&lt;P&gt; remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt; permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip radius source-interface FastEthernet0/0 &lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;access-list 100 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 103 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 103 permit ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 66.195.205.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 104 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 216.82.240.0 0.0.15.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 67.219.240.0 0.0.15.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 85.158.136.0 0.0.7.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 95.131.104.0 0.0.7.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 117.120.16.0 0.0.7.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 193.109.254.0 0.0.1.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 194.106.220.0 0.0.1.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 195.245.230.0 0.0.1.255 host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 105 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 105 permit ip any host 192.168.0.30&lt;/P&gt;&lt;P&gt;access-list 106 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 106 permit ip any host 192.168.0.31&lt;/P&gt;&lt;P&gt;access-list 107 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 107 permit ip any host 192.168.0.11&lt;/P&gt;&lt;P&gt;access-list 107 permit ip any host 192.168.0.6&lt;/P&gt;&lt;P&gt;access-list 108 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 108 permit ip any host 192.168.0.8&lt;/P&gt;&lt;P&gt;access-list 109 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 109 permit ip any host 192.168.1.1&lt;/P&gt;&lt;P&gt;access-list 110 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 110 permit ip any host 66.195.205.82&lt;/P&gt;&lt;P&gt;access-list 111 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 111 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 112 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 112 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 113 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 113 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 114 permit ip host 192.168.0.6 192.168.50.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 114 permit ip 192.168.0.0 0.0.0.255 192.168.52.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 114 permit ip 192.168.0.0 0.0.0.255 192.168.53.0 0.0.0.255&lt;/P&gt;&lt;P&gt; --More--&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list 114 permit ip 192.168.0.0 0.0.0.255 192.168.54.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 115 permit tcp host 192.168.0.30 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 115 permit tcp host 192.168.0.31 any eq smtp&lt;/P&gt;&lt;P&gt;access-list 115 deny&amp;nbsp;&amp;nbsp; tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list 115 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 116 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 116 permit ip 192.168.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 120 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 120 permit ip any host 192.168.0.11&lt;/P&gt;&lt;P&gt;access-list 121 permit ip host 209.95.232.144 host 192.168.0.11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map nonat deny 10&lt;/P&gt;&lt;P&gt; match ip address 114&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map nonat permit 20&lt;/P&gt;&lt;P&gt; match ip address 115&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 18:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763291#M493731</guid>
      <dc:creator>Joseph Chambers</dc:creator>
      <dc:date>2011-11-09T18:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763292#M493732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Josheph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try the following please:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class-map type inspect match-any ccp-insp-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also would like you to apply the following command into your configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;Then send us the logs while the issue is happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Nov 2011 22:29:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763292#M493732</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-09T22:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763293#M493733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;that didn't fix it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Never mind, I dropped in an ASA today.&amp;nbsp; Problem solved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Nov 2011 20:51:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763293#M493733</guid>
      <dc:creator>Joseph Chambers</dc:creator>
      <dc:date>2011-11-10T20:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763294#M493734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Joseph,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure, without the logs is almost impossible to solve this kind of issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Nov 2011 20:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763294#M493734</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-11-10T20:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763295#M493735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries. Asa is so much easier to deal w vs zbf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2011 00:19:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763295#M493735</guid>
      <dc:creator>Joseph Chambers</dc:creator>
      <dc:date>2011-11-11T00:19:24Z</dc:date>
    </item>
    <item>
      <title>zone based firewall - ftp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763296#M493736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case you wanted to know the reason, it is because the ZBF is not inspecting FTP, so the dynamic data channel (in this case port 20) is going to be dropped. In order to overcome this issue you need to inspect FTP, so the Firewall know that a data connection will come. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command you needed was this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffi&lt;/P&gt;&lt;P&gt; inspect ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, I love the ASA, but ZBF is not a bad approach if you dont have enough budget &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2011 04:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-ftp/m-p/1763296#M493736</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-11-11T04:26:12Z</dc:date>
    </item>
  </channel>
</rss>

