<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP inspection problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699088#M561661</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) just remove the ftp-data from the object groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 &amp;amp; 3) The access-list should be based on the direction of the FTP requests since your FTP class-map is applied to the global-policy. For example, for FTP connections going from outside to inside the firewall, it would be easiest to match based on the destination (the internal networks). However, connections from inside to outside, it would than be easiest to create the ACL based on the source(again the internal networks).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a connect coming from outside to inside the firewall, you would need to use the mapped IP address when creating the ACL if youre using ASA code 8.2 and older. 8.3 and later requires you use the real IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres the easiest way I see creating the ACL for your MPF policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp 172.24.X.0 255.255.255.0 any eq 21&lt;BR /&gt;access-list global_mpc extended permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above access-list will not inspect any FTP traffic FROM 172.24.X.0 and inspect all other traffic. The following ACL will not inspect FTP traffic TO 172.24.X.0 while inspecting all other FTP traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp any 172.24.X.0 255.255.255.0 eq 21&lt;BR /&gt;access-list global_mpc extended permit tcp any any eq 21&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 May 2011 20:23:35 GMT</pubDate>
    <dc:creator>Edward Dutra</dc:creator>
    <dc:date>2011-05-27T20:23:35Z</dc:date>
    <item>
      <title>FTP inspection problems</title>
      <link>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699085#M561658</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have multiple customers and servers behind my ASA5510s.&amp;nbsp; After moving a new customer with an FTP server behind the firewalls, they immediatly had issues with customers connecting to their FTP server.&amp;nbsp; I had the default inspection rules running regarding FTP.&amp;nbsp; After removing the "inspect ftp" from the global policy their issues went away.&amp;nbsp; Since this is a larger customer I can't force them to change their server, I need to accomodate and fix this on the firewall.&amp;nbsp; I left the "inspect ftp" command out and there have been sporatic issues from other customers, unable to connect to outside FTP servers from the terminal servers and timeouts and disconnects to our own FTP servers.&amp;nbsp; I'm trying to figure this out fast, any help would be appreciated!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I "think" is the solution.. I added a second inspection policy after the default one and only added "inspect ftp" to it.&amp;nbsp; Then I used the "exclude" option to exclude the new customer.&amp;nbsp; That new customer is fine and things are better, but still not working right.&amp;nbsp; Does the following config accomplish what I want??&amp;nbsp; Does the exclude ACL get what I need or do I need an "include" or permit statement in that ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;should be all the relevant lines&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt; network-object 172.24.X.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp any object-group DM_INLINE_TCP_1 object-group DM_INLINE_NETWORK_10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map global-class-ftp&lt;BR /&gt; match access-list global_mpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt; class global-class-ftp&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Erick&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699085#M561658</guid>
      <dc:creator>ejensenscs</dc:creator>
      <dc:date>2019-03-11T20:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTP inspection problems</title>
      <link>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699086#M561659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Erick....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some things to point out in your config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) dont inspect port 20 ftp-data. Only port 21 needs to be inspected.&lt;/P&gt;&lt;P&gt;2) It looks like your&amp;nbsp; "denying" inspection for the 172.24.X.0 255.255.255.0 network, however youre not 'permitting' traffic that should be inspected.&lt;/P&gt;&lt;P&gt;3) The access-list that your applying to your MPF policy has the FTP port applied to the source, not the destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt;network-object 172.24.X.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq ftp&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp any object-group DM_INLINE_NETWORK_10 object-group DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt;access-list global_mpc extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 05:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699086#M561659</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-27T05:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTP inspection problems</title>
      <link>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699087#M561660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; I don't know that I picked port 20 out, I did it via ASDM, so I think it created that network object for me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; I'm trying to inspect everything from my various vlans EXCEPT the one listed there (172.24.x.0), from the ASDM it looked like that's what I was doing.&amp;nbsp; Maybe not?&amp;nbsp; Here's the list I'm going to apply now...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt; network-object 172.24.X.0 255.255.255.0&lt;BR /&gt; network-object customer 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&amp;nbsp; (asdm is creating these, I think I can clean this up later, only 1 object is needed)&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp any object-group DM_INLINE_TCP_1 object-group DM_INLINE_NETWORK_10 &lt;BR /&gt;access-list global_mpc extended permit tcp any object-group DM_INLINE_TCP_2 10.1x.1x.0 255.255.255.0 &lt;BR /&gt;access-list global_mpc extended permit tcp 10.1x.1x.0 255.255.255.0 object-group DM_INLINE_TCP_3 any&lt;/P&gt;&lt;P&gt;(I have servers and clients in this network so I think I need outbound and inbound inspection, no?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Should I be using internal IPs or the external IPs for these ACLs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 13:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699087#M561660</guid>
      <dc:creator>ejensenscs</dc:creator>
      <dc:date>2011-05-27T13:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: FTP inspection problems</title>
      <link>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699088#M561661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) just remove the ftp-data from the object groups&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 &amp;amp; 3) The access-list should be based on the direction of the FTP requests since your FTP class-map is applied to the global-policy. For example, for FTP connections going from outside to inside the firewall, it would be easiest to match based on the destination (the internal networks). However, connections from inside to outside, it would than be easiest to create the ACL based on the source(again the internal networks).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a connect coming from outside to inside the firewall, you would need to use the mapped IP address when creating the ACL if youre using ASA code 8.2 and older. 8.3 and later requires you use the real IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres the easiest way I see creating the ACL for your MPF policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp 172.24.X.0 255.255.255.0 any eq 21&lt;BR /&gt;access-list global_mpc extended permit tcp any any eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above access-list will not inspect any FTP traffic FROM 172.24.X.0 and inspect all other traffic. The following ACL will not inspect FTP traffic TO 172.24.X.0 while inspecting all other FTP traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list global_mpc extended deny tcp any 172.24.X.0 255.255.255.0 eq 21&lt;BR /&gt;access-list global_mpc extended permit tcp any any eq 21&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 May 2011 20:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-inspection-problems/m-p/1699088#M561661</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2011-05-27T20:23:35Z</dc:date>
    </item>
  </channel>
</rss>

