<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 8.4(1) ftp passive problem with NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609083#M590189</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you checked your syslogs or checked the show service-policy for drops?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Mar 2011 19:49:22 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-03-04T19:49:22Z</dc:date>
    <item>
      <title>ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609082#M590187</link>
      <description>&lt;P&gt;Hi !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="long_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;We have&lt;/SPAN&gt; 2 &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;ASA&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;5580&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;with a cluster&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;active&lt;/SPAN&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;/standby configuration&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="long_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;We&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;have&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;updated&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;to version&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;8.4.(1)&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;since&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;version&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;8.3(1&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt;)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="long_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt; but&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;since then&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;it&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;is&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;impossible&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;to&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;establish&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;the FTP connection&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;in passive mode&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;with&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;NAT.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before this update, all was OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here our configuration :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map global-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; class global-class&lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect pptp &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if it's a bug or you can fixed this problem ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609082#M590187</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2019-03-11T20:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609083#M590189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you checked your syslogs or checked the show service-policy for drops?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 19:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609083#M590189</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-04T19:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609084#M590192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;We have no errors in syslog messages and "show service-policy" display :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inspect: ftp, packet 650742, lock fail 0, drop 0, reset-drop 8&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 23:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609084#M590192</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2011-03-04T23:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609085#M590193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, there are some drop-resets on your service-policy that could be the cause. Is it possible for you to test the FTP connection and check the logs and the service-policy to see if the number increases?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 23:35:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609085#M590193</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-04T23:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609086#M590194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;Inspect: ftp, packet 771540, lock fail 0, drop 0, reset-drop 8&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reset-drop &lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;does not increase.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;Why&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;inspection&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;work&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;without&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;NAT&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt;?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;We&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;are&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;only ones with&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;this behavior&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt; (version 8.4.1)?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;If&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;you&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;have any&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;ideas&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt;,&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;thank you for your&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;help&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt;!&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 12:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609086#M590194</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2011-03-05T12:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609087#M590195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please answer the following questions? I know this is suppose to work on this version as well, but I want to analyze some data:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the server located?&lt;/P&gt;&lt;P&gt;Were is the client located?&lt;/P&gt;&lt;P&gt;What are the security levels for the interfaces?&lt;/P&gt;&lt;P&gt;Can you get the logs when the connection doesnt work?&lt;/P&gt;&lt;P&gt;Would you please get a packet capture with all TCP between the client and the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 17:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609087#M590195</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-05T17:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609088#M590197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the interest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here our answer :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is the server located?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is behind our ASA 5580 connected on an Vlan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Were is the client located?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The client comes from Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are the security levels for the interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All our interaces are in security level 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you get the logs when the connection doesnt work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have no log when the connection doesnt work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please get a packet capture with all TCP between the client and the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh capture ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;48 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 00:00:19.577011 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: S 2847225137:2847225137(0) win 5840 &lt;MSS 1336=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 00:00:19.577225 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: S 1447625788:1447625788(0) ack 2847225138 win 5792 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 00:00:19.605635 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625789 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 00:00:19.607527 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625789:1447625799(10) ack 2847225138 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 00:00:19.637860 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625799 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 00:00:26.124779 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225138:2847225154(16) ack 1447625799 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 00:00:26.125039 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: . ack 2847225154 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 00:00:26.125054 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625799:1447625833(34) ack 2847225154 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 00:00:26.152518 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625833 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 10: 00:00:29.892226 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225154:2847225170(16) ack 1447625833 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 11: 00:00:29.914823 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625833:1447625856(23) ack 2847225170 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 12: 00:00:29.941601 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625856 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 13: 00:00:29.943173 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225170:2847225176(6) ack 1447625856 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 14: 00:00:29.943447 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625856:1447625875(19) ack 2847225176 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 15: 00:00:30.011428 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625875 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 16: 00:00:32.052746 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225176:2847225182(6) ack 1447625875 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 17: 00:00:32.053097 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625875:1447625921(46) ack 2847225182 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 18: 00:00:32.082500 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 19: 00:00:32.083629 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: S 2327685571:2327685571(0) win 5840 &lt;MSS 1336=""&gt; &lt;BR /&gt;&amp;nbsp; 20: 00:00:32.083796 802.1Q vlan#832 P0 10.34.4.37.23061 &amp;gt; 82.239.4.178.48382: S 1457888673:1457888673(0) ack 2327685572 win 5792 &lt;MSS 1460=""&gt; &lt;BR /&gt;&amp;nbsp; 21: 00:00:32.109781 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: . ack 1457888674 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 22: 00:00:32.111505 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 23: 00:00:32.287186 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625875:1447625921(46) ack 2847225182 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 24: 00:00:32.314757 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 25: 00:00:32.340695 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 26: 00:00:32.755072 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625875:1447625921(46) ack 2847225182 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 27: 00:00:32.781865 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: . ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 28: 00:00:32.803287 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 29: 00:00:32.803806 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 30: 00:00:32.803867 802.1Q vlan#832 P0 10.34.4.37.23061 &amp;gt; 82.239.4.178.48382: . 1457888674:1457889998(1324) ack 2327685572 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 31: 00:00:32.803898 802.1Q vlan#832 P0 10.34.4.37.23061 &amp;gt; 82.239.4.178.48382: P 1457889998:1457890049(51) ack 2327685572 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 32: 00:00:32.803898 802.1Q vlan#832 P0 10.34.4.37.23061 &amp;gt; 82.239.4.178.48382: F 1457890049:1457890049(0) ack 2327685572 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 33: 00:00:32.842241 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: . ack 1457889998 win 137 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 34: 00:00:32.842973 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: . ack 1457890049 win 137 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 35: 00:00:32.882019 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: . ack 1457890050 win 137 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 36: 00:00:32.882232 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625960:1447625984(24) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 37: 00:00:33.038007 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 38: 00:00:33.508793 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 39: 00:00:33.729484 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 40: 00:00:34.448508 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 41: 00:00:35.581695 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 42: 00:00:36.327955 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 43: 00:00:39.281632 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 44: 00:00:40.087809 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 45: 00:00:46.688517 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 46: 00:00:47.607512 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 47: 00:01:01.505497 802.1Q vlan#832 P0 82.239.4.178.58805 &amp;gt; 10.34.4.37.21: P 2847225182:2847225188(6) ack 1447625921 win 92 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 48: 00:01:02.647030 802.1Q vlan#832 P0 10.34.4.37.21 &amp;gt; 82.239.4.178.58805: P 1447625921:1447625960(39) ack 2847225188 win 46 &lt;NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our customers are impacted by this problem and all worked well before the update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for you help.&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 23:06:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609088#M590197</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2011-03-05T23:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609089#M590200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be possible for you to get the capture on a pcap format? I want to take a look at the payload of the packets, from what I can see, there is a secondary connection being opened&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; 19: 00:00:32.083629 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: S 2327685571:2327685571(0) win 5840 &lt;MSS 1336=""&gt;&lt;BR /&gt;&amp;nbsp; 20: 00:00:32.083796 802.1Q vlan#832 P0 10.34.4.37.23061 &amp;gt; 82.239.4.178.48382: S 1457888673:1457888673(0) ack 2327685572 win 5792 &lt;MSS 1460=""&gt;&lt;BR /&gt;&amp;nbsp; 21: 00:00:32.109781 802.1Q vlan#832 P0 82.239.4.178.48382 &amp;gt; 10.34.4.37.23061: . ack 1457888674 win 92 &lt;NOP&gt;&lt;/NOP&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Makes me thing that this can be the data channel but not sure. In order to download them do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable HTTP server on the interface where the management station is&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTTP server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enable access via HTTP to that host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTTP x.x.x.x y.y.y.y.y inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then put the following url&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&lt;INSIDE_IP&gt;/capture/&lt;CAPTURE_NAME&gt;/pcap&lt;/CAPTURE_NAME&gt;&lt;/INSIDE_IP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if you can please take a capture of ASP drop just to make sure that the ASA is not dropping anything:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can get the logs using ASDM or a syslog server that would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Mar 2011 23:14:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609089#M590200</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-05T23:14:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609090#M590201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you, in attachment you find the pcap file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 20:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609090#M590201</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2011-03-06T20:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609091#M590203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the captures it seems that the server is sending again the "Entering to passive mode message" which is causing the retransmissions. However, I can see the data channel being opened. If you try to do the command list or try to pull a file, does it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 20:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609091#M590203</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-06T20:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609092#M590206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We observed many log :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&amp;lt;163&amp;gt;%ASA-3-210005: LU allocate connection failed&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="long_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;Can&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;there be&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;a&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;relationship&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;between&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;the&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;log&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;and&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;our&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;FTP&lt;/SPAN&gt; &lt;SPAN class="hps" title="Cliquer ici pour voir d'autres traductions"&gt;connection problem&lt;/SPAN&gt;&lt;SPAN title="Cliquer ici pour voir d'autres traductions"&gt;?&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 21:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609092#M590206</guid>
      <dc:creator>gdelavenne</dc:creator>
      <dc:date>2011-03-06T21:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609093#M590209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not really, since the connection is estsblished with no problems. we may need to do in deep troubleshooting on this case. Clearly we are missing packets on the connection, however, I am unsure if the data channel worked fine. I can see that when you did the listing of the directory it completely. So my big question is, what is it that is not working? Is it polling a file? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is so, please take a captures on the server, inside and outside of the firewall and get them on pcap format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By any change, do you have a CSC module attached to this firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 22:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609093#M590209</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-03-06T22:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609094#M590210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know that this has been dead for a while, but I have similar problems with passive FTP and 8.4.1 for the ASA. Since upgrading to this version, passive FTP drops consantly from some servers. I have identified that it is an issue with IPS on the firewall. With my issue, the firewall is creating out of order packets. Cisco TAC has been working on it for weeks and has no idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that a new version of the ASA software just came out today, and I am planning on upgrading it tonight. I have had nothing but issues with the 8.4.1 version. Garbage if you ask me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have had the following issues:&lt;/P&gt;&lt;P&gt;1. FTP dropping issues&lt;/P&gt;&lt;P&gt;2. IPSEC L2L VPN tunnel drops. packets get dropped at random. , although a small percent. TAC has not been able to track down the problem. &lt;/P&gt;&lt;P&gt;3. A lot of asp drops. TAC as of yet unable to determine why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All of these issues are not major by themselves, but after people started reporting issues within a few days, I reviewed my log server and found that the problems maifested themselves the second that I switched over to 8.0.3. My config has been verified 3 seperate times by TAC and has no issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was about to downgrade to a previous version before 8.4.2 was released today. I will see if that corrects the issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jun 2011 20:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609094#M590210</guid>
      <dc:creator>ryan.palamara</dc:creator>
      <dc:date>2011-06-20T20:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609095#M590212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls. provide case numbers if you have them. Unless TAC pointed out documented defects that were resolved in 8.4.2, the probelms that you are seeing in 8.4.1 might still be there in 8.4.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jun 2011 23:20:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609095#M590212</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-06-20T23:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609096#M590213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Kureli, you are right. Maybe more eyes could help to determine what the problem is, upgrading may not be the desire path cuz the issue may remain.&amp;nbsp; Maybe taking a look at the documentation on the case will help us to check and see what the root cause can be. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 03:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609096#M590213</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-21T03:42:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609097#M590215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes,&amp;nbsp; the issue was not corrected by the software upgrade. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ticket open on this is 618020667. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 14:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609097#M590215</guid>
      <dc:creator>ryan.palamara</dc:creator>
      <dc:date>2011-06-21T14:00:12Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609098#M590217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We also seem to be running into this problem with a 5585x 8.4.1 with IPS. One server works and the other does not. The non-working servers is NATed to an internal number, the working server is not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 14:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609098#M590217</guid>
      <dc:creator>dporod</dc:creator>
      <dc:date>2011-06-21T14:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609099#M590219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dprod, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please verify if you are not hitting the following defect CSCto09465. Ryan, I checked on the case and the captures were taken only on port 21. I have asked this question before, what is it that does not work? What happens when you try to pull a file? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 16:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609099#M590219</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-21T16:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609100#M590221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi, we are running into CSCto09465 also, my understanding is that CSCto09465 applies to active ftp. We also seem to have issues with passive ftp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 16:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609100#M590221</guid>
      <dc:creator>dporod</dc:creator>
      <dc:date>2011-06-21T16:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4(1) ftp passive problem with NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609101#M590223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, can you take captures and paste them here as pcap format? I want you to take the captures with IP instead of just the control channel of FTP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;******* Capture configuration ******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;{Enable GUI interface:}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http 0 0 inside&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;{For outside interface:}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture1 permit ip host &lt;TRANSLATED_IP&gt;&amp;nbsp; host &lt;DESTINATION_IP&gt;&lt;/DESTINATION_IP&gt;&lt;/TRANSLATED_IP&gt;&lt;/P&gt;&lt;P&gt;access-list capture1 permit ip host &lt;DESTINATION_IP&gt; host &lt;TRANSLATED_IP&gt;&lt;/TRANSLATED_IP&gt;&lt;/DESTINATION_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;{For inside interface:}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list capture2 permit ip host &lt;INSIDE_HOST_IP&gt; host &lt;DESTINATION_IP&gt;&lt;/DESTINATION_IP&gt;&lt;/INSIDE_HOST_IP&gt;&lt;/P&gt;&lt;P&gt;access-list capture2 permit ip host &lt;DESTINATION_IP&gt; host &lt;INSIDE_HOST_IP&gt;&lt;/INSIDE_HOST_IP&gt;&lt;/DESTINATION_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture tcpin access-list capture1 interface outside &lt;/P&gt;&lt;P&gt;capture tcpout access-list capture2 interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;****** To download the files then&amp;#133; *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Open the browser&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&lt;ASA_INSIDE_IP_ADDRESS&gt;/capture/tcpin/pcap&lt;/ASA_INSIDE_IP_ADDRESS&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://"&gt;https://&lt;/A&gt;&lt;SPAN&gt;&lt;ASA_INSIDE_IP_ADDRESS&gt;/capture/tcpout/pcap&lt;/ASA_INSIDE_IP_ADDRESS&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: &lt;/P&gt;&lt;P&gt;Username: blank = no name&lt;/P&gt;&lt;P&gt;Password: {enable password}&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;********* To delete them *********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear access-list capture1&lt;/P&gt;&lt;P&gt;clear access-list capture2&lt;/P&gt;&lt;P&gt;no capture tcpin&lt;/P&gt;&lt;P&gt;no capture tcpout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;********** End *********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 16:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-1-ftp-passive-problem-with-nat/m-p/1609101#M590223</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-21T16:54:39Z</dc:date>
    </item>
  </channel>
</rss>

