<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX and FTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384237#M554747</link>
    <description>&lt;P&gt;We have a PIX 525, running 5.0(2), in our network. For the as long as I can remember workstations behind the PIX were able to connect to FTP servers on the Internet using either active and passive FTP. We rebooted the PIX recently (which had been up for a very long time), and now workstations can only use active. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the fixup protocol ftp 21 in our configuration. If I change that to "no fixup...", then workstations can only use passive. Because we have some applications that require Passive and others that require active, I need to get it back to being able to do both at the same time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don't have any FTP servers behind the PIX so I not concerned about that. I'm puzzled why this is an issue. Because the connections originate behind the PIX, I would think this should not be an issue. I would the fixup protocol ftp 21 would only be an issue for incoming traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all assistance will be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daris &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:45:15 GMT</pubDate>
    <dc:creator>dbouthillier</dc:creator>
    <dc:date>2020-02-21T07:45:15Z</dc:date>
    <item>
      <title>PIX and FTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384237#M554747</link>
      <description>&lt;P&gt;We have a PIX 525, running 5.0(2), in our network. For the as long as I can remember workstations behind the PIX were able to connect to FTP servers on the Internet using either active and passive FTP. We rebooted the PIX recently (which had been up for a very long time), and now workstations can only use active. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the fixup protocol ftp 21 in our configuration. If I change that to "no fixup...", then workstations can only use passive. Because we have some applications that require Passive and others that require active, I need to get it back to being able to do both at the same time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don't have any FTP servers behind the PIX so I not concerned about that. I'm puzzled why this is an issue. Because the connections originate behind the PIX, I would think this should not be an issue. I would the fixup protocol ftp 21 would only be an issue for incoming traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any and all assistance will be greatly appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Daris &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:45:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384237#M554747</guid>
      <dc:creator>dbouthillier</dc:creator>
      <dc:date>2020-02-21T07:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and FTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384238#M554749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have not found any detailed description for the fixup protocol in the 5.0 Command reference, here is an explication of the 6.3 PIX OS Command Reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the fixup protocol ftp command to specify the listening port or ports for the File Transfer Protocol (FTP). The following list describes the features and usage of this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;The PIX Firewall listens to port 21 for FTP by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;Mutliple ports can be specified.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;Only specify the port for the FTP control connection and not the data connection. The PIX Firewall stateful inspection will dynamically prepare the data connection as necessary. For example, the following is incorrect:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INCORRECT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol ftp 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and is the following is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CORRECT = fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;Use caution when moving FTP to a higher port. For example, if you set the FTP port to 2021 by entering fixup protocol ftp 2021 all connections that initiate to port 2021 will have their data payload interpreted as FTP commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following is an example of a fixup protocol ftp command configuration that uses multiple FTP fixups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: For a PIX Firewall with two interfaces&lt;/P&gt;&lt;P&gt;ip address outside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: There is an inside host 10.1.1.15 that will be exported as 192.168.1.15.  This host runs the FTP services at port 21 and 1021&lt;/P&gt;&lt;P&gt;static (inside, outside) 192.168.1.15 10.1.1.15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Construct an access list to permit inbound FTP traffic to port 21 and 1021&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 192.168.1.15 eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 192.168.1.15 eq 1021&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Specify that traffic to port 21 and 1021 are FTP traffic&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol ftp 1021&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you disable FTP fixups with the no fixup protocol ftp command, outbound users can start connections only in passive mode, and all inbound FTP is disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strict option in the fixup protocol ftp command performs two seperate functions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;The strict option prevents web browsers from sending embedded commands in FTP requests. Each FTP command must be acknowledged before a new command is allowed. Connections sending embedded commands are dropped.The strict option only lets an FTP server generate the 227 command and only lets an FTP client generate the PORT command. The 227 and PORT commands are checked to ensure they do not appear in an error string.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;#149;The strict option also prevents the PIX from opening up return connections based solely on the information sent in the PORT command. The strict option enables the PIX to make sure a successful reply is sent from the server in addition to the PORT command before opening the connection. If an error is seen, the PORT command is ignored by the PIX and the connection is never established. This keeps the PIX from opening data connections for communication that will never occur. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094885.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094885.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2004 18:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384238#M554749</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-17T18:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and FTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384239#M554750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way might be a good idea to upgarde your software version !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/warp/public/110/upgrade.shtml" target="_blank"&gt;http://www.cisco.com/warp/public/110/upgrade.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2004 18:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384239#M554750</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-17T18:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and FTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384240#M554751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems this was a bug in 5.0(2), fixed in 5.0(3).  Certain other constraints were preventing an upgrade to 6.3.  Looks like we will see if we can upgrade to 5.2(3) without breaking anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2004 19:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384240#M554751</guid>
      <dc:creator>dbouthillier</dc:creator>
      <dc:date>2004-11-17T19:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and FTP</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384241#M554752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The upgrade to 5.2(3) fixed this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 17:20:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-ftp/m-p/384241#M554752</guid>
      <dc:creator>dbouthillier</dc:creator>
      <dc:date>2004-11-22T17:20:02Z</dc:date>
    </item>
  </channel>
</rss>

