<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599523#M591925</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can get to the FTP Internally, I can ping the FTP from the ASA.&amp;nbsp; I can't get the external IP to hit the internal via the internet.&amp;nbsp; This one is bugging me.&amp;nbsp; I run a packet trace from the External IP to the ASA and the packet succeeds.&amp;nbsp; The Gateway of the FTP is the ASA IP.&amp;nbsp; The services are running because I can get the FTP site in the DMZ zone.&amp;nbsp; Any othe ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Feb 2011 16:48:19 GMT</pubDate>
    <dc:creator>Lewis_Cipher</dc:creator>
    <dc:date>2011-02-14T16:48:19Z</dc:date>
    <item>
      <title>FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599513#M591894</link>
      <description>&lt;P&gt; I am trying to NAT my FTP to the outside.&amp;nbsp; I can't get to that IP.&amp;nbsp; Am I missing something?&amp;nbsp; I have FTP allowed in access rules. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside&amp;nbsp; - to the internal IP&lt;/P&gt;&lt;P&gt;Outside - external IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the server from firewall internally.&amp;nbsp; What else can I do to test?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599513#M591894</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2019-03-11T19:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599514#M591897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are you trying a static NAT for your FTP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;FTP 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NATed IP 66.12.66.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;stat (inside,outside) 66.12.66.10 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that what you are trying?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 16:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599514#M591897</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-11T16:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599515#M591902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, do I have all the info correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 16:44:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599515#M591902</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-11T16:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599516#M591907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if you have a similar static NAT it seems correct. Are there any ACLs on the inside interface that could prevent the traffic from going out. Is the NATed IP on your range of outside IPs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can send the config it would be great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 16:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599516#M591907</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-11T16:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599517#M591910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sent via private message....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 18:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599517#M591910</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-11T18:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599518#M591915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the config. If you are trying to allow FTP traffic from the outside to the inside it won't work since you are denying the traffic in the first two lines of your access-l outside_access_in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the test that you are trying? FTP to the SGA_Website_NAT address coming from the outside? &lt;/P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 19:32:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599518#M591915</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-11T19:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599519#M591918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Deny is on purpose unti l can get it to work I have it on deny.&amp;nbsp; Yes the NAT is SGA_Website_NAT.&amp;nbsp; It is called website becasue we got rid of that and I changed the nat for our FTP server now.&amp;nbsp; I can get to the website internally, but not externally, when I try the NAT ip address on the outside...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 20:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599519#M591918</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-11T20:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599520#M591920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you see hitcounts on the ACL after the testing? If there are not hitcounts that means that the traffic is not getting to your ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 20:44:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599520#M591920</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-11T20:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599521#M591922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is weird becasue I do see hit counts, but can't get to address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 21:22:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599521#M591922</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-11T21:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599522#M591923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your FTP server has a default gateway? It should be your ASA 10.1.101.1. Make sure the FTP service is up.&lt;/P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Feb 2011 21:29:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599522#M591923</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-11T21:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599523#M591925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can get to the FTP Internally, I can ping the FTP from the ASA.&amp;nbsp; I can't get the external IP to hit the internal via the internet.&amp;nbsp; This one is bugging me.&amp;nbsp; I run a packet trace from the External IP to the ASA and the packet succeeds.&amp;nbsp; The Gateway of the FTP is the ASA IP.&amp;nbsp; The services are running because I can get the FTP site in the DMZ zone.&amp;nbsp; Any othe ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 16:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599523#M591925</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-14T16:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599524#M591926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have any other filtering device such as an IPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We could set some captures on the ASA inside interface to see if the packet returns to the ASA and how it returns.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 16:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599524#M591926</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-14T16:54:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599525#M591927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am getting a failure when packet tracing from ASA to the FTP server on inside interface.&amp;nbsp; Do I need to allow this internally...&amp;nbsp; Any Less secure networks are allowed IP...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 17:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599525#M591927</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-14T17:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599526#M591928</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No IPS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 17:09:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599526#M591928</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-14T17:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599527#M591929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am checking to see if the Router is open to FTP... I will post back back in a few.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 20:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599527#M591929</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-14T20:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599528#M591930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;TITLE&gt;&lt;/TITLE&gt;&lt;/P&gt;&lt;P class="p1"&gt;if the traffic is coming from outside to inside you just need the ACLs on the outside. Also make sure you have the inspect ftp on your policy map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Feb 2011 20:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599528#M591930</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-14T20:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599529#M591931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inspect FTP on Policy Map?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 15:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599529#M591931</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-15T15:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599530#M591932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 15:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599530#M591932</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-15T15:25:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599531#M591933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lewis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you using ports 20 and 21 for FTP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807ee585.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807ee585.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Feb 2011 16:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599531#M591933</guid>
      <dc:creator>ciscona728</dc:creator>
      <dc:date>2011-02-15T16:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: FTP</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1599532#M591934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class="results"&gt;&lt;P class="error"&gt;FTP test I get this error????&lt;/P&gt;&lt;P class="error"&gt;&lt;/P&gt;&lt;P class="error"&gt;Error: FEAT response lines must begin with a single space character&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Feb 2011 14:40:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1599532#M591934</guid>
      <dc:creator>Lewis_Cipher</dc:creator>
      <dc:date>2011-02-16T14:40:11Z</dc:date>
    </item>
  </channel>
</rss>

