<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about passive ftp trough the pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482973#M533392</link>
    <description>&lt;P&gt;I have a ftp-server on the inside of a pix 515 that are giving services to the public clients on the outside. My goal is to only open up for passive ftp (active-ftp should not be allowed) I have tried sevral things, but they all seems to also open up for active-ftp.. Can sombody please let me know what exactly to do to only allow for passive-ftp on the pix. I have no edge routers on the outside of the pix, so all config need to be done on hte firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advanvce&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:23:09 GMT</pubDate>
    <dc:creator>jenseike</dc:creator>
    <dc:date>2020-02-21T08:23:09Z</dc:date>
    <item>
      <title>Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482973#M533392</link>
      <description>&lt;P&gt;I have a ftp-server on the inside of a pix 515 that are giving services to the public clients on the outside. My goal is to only open up for passive ftp (active-ftp should not be allowed) I have tried sevral things, but they all seems to also open up for active-ftp.. Can sombody please let me know what exactly to do to only allow for passive-ftp on the pix. I have no edge routers on the outside of the pix, so all config need to be done on hte firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advanvce&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482973#M533392</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2020-02-21T08:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482974#M533393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as you know in the active ftp mode the server uses   tcp port number 20 for data channel and it initiates this channel to client so you should deny any packets from the ftp server which has source tcp port 20 then users have to connect to inside ftp server from outside through passive mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 07:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482974#M533393</guid>
      <dc:creator>mehrdad</dc:creator>
      <dc:date>2005-09-11T07:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482975#M533394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you surly know the pix are stopping all traffic by default from outside to inside. When I allow only port 21 from the ftp-server as this :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;STATIC (INSIDE, OUTSIDE) &lt;FTP-PUBLIC&gt; &lt;FTP-PRIVAT&gt; NETMASK 255.255.255.255&lt;/FTP-PRIVAT&gt;&lt;/FTP-PUBLIC&gt;&lt;/P&gt;&lt;P&gt;ACCESS-LIST OUT-IN PERMIT TCP &lt;CLIENT&gt; &lt;FTP-PUBLIC&gt; EQ 21&lt;/FTP-PUBLIC&gt;&lt;/CLIENT&gt;&lt;/P&gt;&lt;P&gt;ACCESS-GROUP OUT-IN IN INTERFACE OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would think that this would stop active ftp, but it still seems to work, so what other config do I need to do on the pix to achive only passive.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also appreaciate that configs was shown to me also..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the basic of active and passive ftp, so that is no problem, I just need to know how to do this in practice..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 07:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482975#M533394</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-11T07:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482976#M533395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pls check this out as well:&lt;/P&gt;&lt;P&gt;ACCESS-LIST IN-IN DENY TCP &lt;FTP-PRIVATE&gt; EQ 20 &lt;CLIENTS&gt; &lt;/CLIENTS&gt;&lt;/FTP-PRIVATE&gt;&lt;/P&gt;&lt;P&gt;ACCESS-GROUP IN-IN IN INTERFACE INSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 07:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482976#M533395</guid>
      <dc:creator>mehrdad</dc:creator>
      <dc:date>2005-09-11T07:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482977#M533396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont realy think that this will enhance the security, because the source port does not really matter. All what really mater is securing the inside destination "server" ports. You dont want to allow the client to access resources on TCP ports 1-1023 except 21.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what can we do to stop active ftp-request to the server ports? I dont think that this will be solved with only using acl stopping things, but that we need something more&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 08:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482977#M533396</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-11T08:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482978#M533397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sniffer Trace Illustrating standard (or Active) Mode FTP :&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ciscopress.com/content/images/chap9_1587050358/elementLinks/09fig01.gif" target="_blank"&gt;http://www.ciscopress.com/content/images/chap9_1587050358/elementLinks/09fig01.gif&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Setup connection to destination port 21 for control channel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[10.10.2.51] [198.133.219.27] TCP: D=21 S=1065 SYN SEQ=1763920874 LEN=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] TCP: D=1065 S=21 SYN ACK=1763920875 SEQ=2208726475 LEN=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[10.10.2.51] [198.133.219.27] TCP: D=21 S=1065 ACK=2208726476&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#FTP server negotiates FTP-DATA channel with TCP source port 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[10.10.2.51] [198.133.219.27] FTP: C PORT=1065 LIST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] TCP: D=1066 S=20 SYN SEQ=2209373687 LEN=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[10.10.2.51] [198.133.219.27] TCP: D=20 S=1066 SYN ACK=2209373688 SEQ=1765279364 LEN=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] TCP: D=1065 S=21 ACK=1763920967&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] TCP: D=1066 S=20 ACK=1765279365&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] FTP: R PORT=1065 150 ASCII mode data connection for /bin/ls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[198.133.219.27] [10.10.2.51] FTP: R PORT=1066 Text Data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ciscopress.com/articles/article.asp?p=24685" target="_blank"&gt;http://www.ciscopress.com/articles/article.asp?p=24685&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 08:33:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482978#M533397</guid>
      <dc:creator>mehrdad</dc:creator>
      <dc:date>2005-09-11T08:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482979#M533398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, and...??+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 08:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482979#M533398</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-11T08:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482980#M533399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;look at the link (picture) which i wrote to my last post so if you deny any packets with source port tcp #20 from server to client or if you deny any packets with destination port tcp #20 from client to server then the active/standard ftp will be disabled for those clients.&lt;/P&gt;&lt;P&gt;note in active mode ftp server initiates a data channel from itself (initiate from inside) with tcp port #20 to client (client listen to specify port)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 09:00:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482980#M533399</guid>
      <dc:creator>mehrdad</dc:creator>
      <dc:date>2005-09-11T09:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482981#M533400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok... I will try to test with denying the server respond from port 20 and see if it works, if there are any other suggestion that will also gladly be appreachiated..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your responses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 09:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482981#M533400</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-11T09:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482982#M533401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the FTP fixup enabled on port 21?  According to the Cisco Secure Pix Firewall Advance (CSPFA Second Edition) study guide, if the "fixup protocol ftp" command is not enabled, inbound standard FTP works (with a properly configured conduit or ACL) and passive FTP does not work properly.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Standard mode FTP will also work if you allow all traffic from the Inside or DMZ networks out through the Pix if the Inside or DMZ segments do not have access lists on them.  See the link below for a short primer on FTP and the Pix.  It should have the information on the page that will help you resolve your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.ciscopress.com/articles/article.asp?p=24685&amp;amp;rl=1" target="_blank"&gt;http://www.ciscopress.com/articles/article.asp?p=24685&amp;amp;rl=1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2005 21:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482982#M533401</guid>
      <dc:creator>pwicks</dc:creator>
      <dc:date>2005-09-11T21:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482983#M533402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I my question was how to enable passive ftp from clients from outside to inside ftp server. I know whery well how the fixup command works, and I know whery well how ftp works. I was wondering what the trick was to get passive ftp working on  with the pix without also enabling active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2005 03:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482983#M533402</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-12T03:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Question about passive ftp trough the pix</title>
      <link>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482984#M533403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey man...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested your solution and it did not work... FTP was nto able to open data channel in to the server..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i open high port over 1023 it was able to find the data channel inn, so to me it looks like the fixup protocol dont work from outside..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more suggestion would be appreaciated..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2005 17:11:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-passive-ftp-trough-the-pix/m-p/482984#M533403</guid>
      <dc:creator>jenseike</dc:creator>
      <dc:date>2005-09-12T17:11:20Z</dc:date>
    </item>
  </channel>
</rss>

