<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftp and internet access query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687454#M535961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I'm aware that the order is important, especially if a deny is executed before a permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though line 11 = access-list inside_access_in extended permit tcp InternalNetwork 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and line 22 = access-list inside_access_in extended deny ip InternalNetwork 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above suggests it should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I replace the ftp for http, browsing the Internet works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I simply the replaced the source/destination to test the packet transfer route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run the packet tracer, nothing fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's for the reading tips but unless the logic makes sense, reading isn't going to help me and from what I see in the GUI, it's not tallying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On another note, I can clearly see ACL rule within inside_access_in relating to a permet ftp, but this is not showing in the running config. I also set an any, any which worked one minute and then failed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jul 2011 12:37:10 GMT</pubDate>
    <dc:creator>mark.a.coleman</dc:creator>
    <dc:date>2011-07-19T12:37:10Z</dc:date>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687444#M535946</link>
      <description>&lt;P&gt;Have a query that I can't quite fathom out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an access rule on my asa5510 that permits 'full internet' for those members of that group (me included) and works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some reason I have a DHCP PC that is also gaining full internet access (they are not in this group), but for every other PC access is being blocked. The ones that are being blocked are what I would expect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have a rule that permits TCP ftp (21) and TCP SSH sftp (22) with the sftp working fine for said working user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've checked the logging using a test pc and see for following deny 'Deny'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Jul 15 2011&lt;/TD&gt;&lt;TD&gt;09:45:42&lt;/TD&gt;&lt;TD&gt;106023&lt;/TD&gt;&lt;TD&gt;10.0.0.76&lt;/TD&gt;&lt;TD&gt;1077&lt;/TD&gt;&lt;TD&gt;64.4.37.225&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Deny tcp src inside:10.0.0.76/1077 dst outside:64.4.37.225/80 by access-group "inside_access_in" [0x565b3da1, 0x0]&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see no NAT or Access rule that explains why one DHCP PC has full access and another nothing?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687444#M535946</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2019-03-11T20:59:11Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687445#M535948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which version do you run on the ASA and what is defined in access-lists "inside_access_in". Also would be great to know on which interface you put this ACL and where the traffic is initated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 09:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687445#M535948</guid>
      <dc:creator>Adam Makovecz</dc:creator>
      <dc:date>2011-07-15T09:00:15Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687446#M535952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We run 8.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In relation to the ACL for "inside_access_in", anything in particular you want info on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface is Ethernet0/0, since this is the only one showing an alocated 10.0.0.2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 09:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687446#M535952</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-15T09:10:20Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687447#M535954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive this is a configuration issue. May be it would be great if you could send me the "show run" output by email and I can check it for you.&lt;/P&gt;&lt;P&gt;We need to check which interface has the ACL, what is the security number, what the ACL contains and how it is related by the traffic.&lt;/P&gt;&lt;P&gt;You also have the option to run the packet-tracer which will show you where in the config is the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 09:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687447#M535954</guid>
      <dc:creator>Adam Makovecz</dc:creator>
      <dc:date>2011-07-15T09:23:27Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687448#M535955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just added http to the same rule and that worked fine. I've sent you a PM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Jul 2011 10:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687448#M535955</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-15T10:04:03Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687449#M535956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Anyone else care to drop in on this, doesn't make sense at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 08:09:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687449#M535956</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-19T08:09:33Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687450#M535957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mark,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I checked your config and it is a basic configuration issue. Your ACL is simply deny the traffic. for the example above what you give us this line is denying:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip InternalNetwork 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the packet tracer feature to check which line not let the traffic:&lt;/P&gt;&lt;P&gt;"packet-tracer input inside tcp 10.0.0.76 2134 64.4.37.225 80 det"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 08:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687450#M535957</guid>
      <dc:creator>Adam Makovecz</dc:creator>
      <dc:date>2011-07-19T08:51:58Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687451#M535958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm looking at the ACL Manager now for the "inside_access_in" and can see the rule permitting ftp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source = InternalNetwork&lt;/P&gt;&lt;P&gt;Destination = any&lt;/P&gt;&lt;P&gt;Service = ftp/ftp-data&lt;/P&gt;&lt;P&gt;Action = permit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 09:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687451#M535958</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-19T09:07:24Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687452#M535959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just ran the Packet Tracer using Interface = inside, packet type = tcp and set the source as an internal ip and the destination to the ftp, all passed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I swapped the source and destination around and set to outside it failed on our outside rule (incoming) which I guess is where the problem is, any, any IP, deny?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 09:17:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687452#M535959</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-19T09:17:32Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687453#M535960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mark, &lt;/P&gt;&lt;P&gt;please note that the order is very important. Indeed you have that rule, but the deny is at first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 17 extended deny ip InternalNetwork 255.255.255.0 any &amp;lt;-- this will drop the packet&lt;/P&gt;&lt;P&gt;access-list inside_access_in line 20 extended permit tcp InternalNetwork 255.255.255.0 any eq ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you change the source and destination it means you changing the way where the connection initiated. It means when you tried you simulated that FTP server initiate&amp;nbsp; a connection to your internal host. If you want this you have to allow the traffic by acl and nat rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recommend to read this documentation, it explaines the configuration and troubleshoot of ACLs.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807c35e7.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807c35e7.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/traffic.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 12:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687453#M535960</guid>
      <dc:creator>Adam Makovecz</dc:creator>
      <dc:date>2011-07-19T12:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687454#M535961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I'm aware that the order is important, especially if a deny is executed before a permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though line 11 = access-list inside_access_in extended permit tcp InternalNetwork 255.255.255.0 any eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and line 22 = access-list inside_access_in extended deny ip InternalNetwork 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above suggests it should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I replace the ftp for http, browsing the Internet works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I simply the replaced the source/destination to test the packet transfer route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run the packet tracer, nothing fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's for the reading tips but unless the logic makes sense, reading isn't going to help me and from what I see in the GUI, it's not tallying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On another note, I can clearly see ACL rule within inside_access_in relating to a permet ftp, but this is not showing in the running config. I also set an any, any which worked one minute and then failed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2011 12:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687454#M535961</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-19T12:37:10Z</dc:date>
    </item>
    <item>
      <title>ftp and internet access query</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687455#M535962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Sorted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jul 2011 10:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-internet-access-query/m-p/1687455#M535962</guid>
      <dc:creator>mark.a.coleman</dc:creator>
      <dc:date>2011-07-25T10:37:21Z</dc:date>
    </item>
  </channel>
</rss>

