<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NATing to an FTP on DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741463#M533531</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What type of ftp are you setting up???, is it active or passive??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active FTP:&amp;nbsp; client connects to server on port 21.&amp;nbsp; Server uses port&amp;nbsp; 20 to transfer data back to client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Passive&amp;nbsp; FTP:&amp;nbsp; client connects to server on port 21.&amp;nbsp; Server tells the client a&amp;nbsp; port &amp;gt; 1024 to use for the data transfer.&amp;nbsp; Client then makes a 2nd&amp;nbsp; connection from its &amp;gt;1024 ports to the server &amp;gt; 1024 ports.&amp;nbsp; In&amp;nbsp; this scenario, the client does all the work, server does nothing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There would be different config for both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Aug 2011 17:40:44 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-08-15T17:40:44Z</dc:date>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741457#M533525</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please please please can someone help.&amp;nbsp; I have an FTP server running on my DMZ.&amp;nbsp; I can access it fine from another computer on the DMZ and am trying to open it up so I can conect via the 'net.&amp;nbsp; After spending hours with google I have got as far as the following, but am out of ideas on how to progress.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASDM 6.2&lt;/P&gt;&lt;P&gt;ASA 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Network object&lt;/STRONG&gt;Name: FTPServer&lt;/P&gt;&lt;P&gt;IP: 192.168.2.10&lt;/P&gt;&lt;P&gt;Netmask: 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Access rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Interface: Outside&lt;/P&gt;&lt;P&gt;Source: any&lt;/P&gt;&lt;P&gt;Destination: FTPServer&lt;/P&gt;&lt;P&gt;Service tcp/ftp, tcp/ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Orij. Interface: DMZ&lt;/P&gt;&lt;P&gt;Orig. Source: FTPServer&lt;/P&gt;&lt;P&gt;Trans. Interface: Outside&lt;/P&gt;&lt;P&gt;Using interface IP Address&lt;/P&gt;&lt;P&gt;PAT Enabled&lt;/P&gt;&lt;P&gt;Orij. port 21&lt;/P&gt;&lt;P&gt;Trans port 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankyou!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:11:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741457#M533525</guid>
      <dc:creator>Betterware</dc:creator>
      <dc:date>2019-03-11T21:11:48Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741458#M533526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you check if "inspect ftp" is enabled on the firewall or not? It would be good if you could post the output of "sh run" here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 14:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741458#M533526</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-08-15T14:30:41Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741459#M533527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankyou, Amu for helping me.&amp;nbsp; According to the sh run output ftp inspect is on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password qvxoIOSQ42Tst4.8 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.2.10 FTPServer description FTPServer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no forward interface Vlan3&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 200.0.0.206 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address ##.##.##.## 255.255.255.252&lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 5&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server ##.##.##.##&lt;/P&gt;&lt;P&gt; name-server ##.##.##.##&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;dns server-group ####&lt;/P&gt;&lt;P&gt; name-server ##.##.##.##&lt;/P&gt;&lt;P&gt; name-server ##.##.##.##&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;access-list inside_access_in remark ip out&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark http out&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark out to https&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq https log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark ping out&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any log disable &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host FTPServer object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in remark http out&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq www log disable &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in remark ip out&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit ip any any log disable &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in remark ping out&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp any any log disable &lt;/P&gt;&lt;P&gt;access-list DMZ_access_in remark out to https&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit tcp any any eq https log disable &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-621.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp interface ftp FTPServer ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (outside,DMZ) tcp FTPServer ftp 0.0.0.0 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 ##.##.##.##1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 200.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username admin password jbNBXUKHa1JUjwuD encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt; inspect h323 h225 &lt;/P&gt;&lt;P&gt; inspect h323 ras &lt;/P&gt;&lt;P&gt; inspect rsh &lt;/P&gt;&lt;P&gt; inspect rtsp &lt;/P&gt;&lt;P&gt; inspect esmtp &lt;/P&gt;&lt;P&gt; inspect sqlnet &lt;/P&gt;&lt;P&gt; inspect skinny &lt;/P&gt;&lt;P&gt; inspect sunrpc &lt;/P&gt;&lt;P&gt; inspect xdmcp &lt;/P&gt;&lt;P&gt; inspect sip &lt;/P&gt;&lt;P&gt; inspect netbios &lt;/P&gt;&lt;P&gt; inspect tftp &lt;/P&gt;&lt;P&gt; inspect icmp &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:f1ba46587fbf7c5c2e8c587b807f1227&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 14:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741459#M533527</guid>
      <dc:creator>Betterware</dc:creator>
      <dc:date>2011-08-15T14:47:53Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741460#M533528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure why you have this configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,DMZ) tcp FTPServer ftp 0.0.0.0 ftp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But&amp;nbsp; you don't need this nat, so you can get rid of it and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 15:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741460#M533528</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-15T15:17:19Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741461#M533529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun, that entry is history!&amp;nbsp; Still now joy after testing again though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 15:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741461#M533529</guid>
      <dc:creator>Betterware</dc:creator>
      <dc:date>2011-08-15T15:41:42Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741462#M533530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you try removing "inspect ftp" and test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 17:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741462#M533530</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-08-15T17:25:46Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741463#M533531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What type of ftp are you setting up???, is it active or passive??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Active FTP:&amp;nbsp; client connects to server on port 21.&amp;nbsp; Server uses port&amp;nbsp; 20 to transfer data back to client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Passive&amp;nbsp; FTP:&amp;nbsp; client connects to server on port 21.&amp;nbsp; Server tells the client a&amp;nbsp; port &amp;gt; 1024 to use for the data transfer.&amp;nbsp; Client then makes a 2nd&amp;nbsp; connection from its &amp;gt;1024 ports to the server &amp;gt; 1024 ports.&amp;nbsp; In&amp;nbsp; this scenario, the client does all the work, server does nothing.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There would be different config for both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 17:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741463#M533531</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-15T17:40:44Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741464#M533532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have removed FTP inspect (relevent [sh run] output below) and tested again, no joy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt; inspect h323 h225 &lt;/P&gt;&lt;P&gt; inspect h323 ras &lt;/P&gt;&lt;P&gt; inspect rsh &lt;/P&gt;&lt;P&gt; inspect rtsp &lt;/P&gt;&lt;P&gt; inspect esmtp &lt;/P&gt;&lt;P&gt; inspect sqlnet &lt;/P&gt;&lt;P&gt; inspect skinny &lt;/P&gt;&lt;P&gt; inspect sunrpc &lt;/P&gt;&lt;P&gt; inspect xdmcp &lt;/P&gt;&lt;P&gt; inspect sip &lt;/P&gt;&lt;P&gt; inspect netbios &lt;/P&gt;&lt;P&gt; inspect tftp &lt;/P&gt;&lt;P&gt; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using Filezilla Server here, and the passive modes are set to default.&amp;nbsp; I'm under the impression that PASV is the way forwards but am open to suggestions of course.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 08:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741464#M533532</guid>
      <dc:creator>Betterware</dc:creator>
      <dc:date>2011-08-16T08:11:42Z</dc:date>
    </item>
    <item>
      <title>NATing to an FTP on DMZ</title>
      <link>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741465#M533533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Anu&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Quick update- removing inspect ftp trashed our usual batch file ftp communications, so this has been re-enabled and they work again.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Aug 2011 10:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nating-to-an-ftp-on-dmz/m-p/1741465#M533533</guid>
      <dc:creator>Betterware</dc:creator>
      <dc:date>2011-08-16T10:12:29Z</dc:date>
    </item>
  </channel>
</rss>

