<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: tftp blocking on asa5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642030#M592471</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what does those 2 additional class maps contain?&lt;/P&gt;&lt;P&gt;Can you send the sh run class-map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Feb 2011 21:57:03 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-02-07T21:57:03Z</dc:date>
    <item>
      <title>tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642025#M592460</link>
      <description>&lt;P&gt;we have a network manager inside and a ris server outside of an asa&lt;/P&gt;&lt;P&gt;5510 firewall running&amp;nbsp; ios version asa823-k8.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a rule on both the inside and outside interfaces allowing tftp through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When tftp is initiated from the Netmager on hte inside the firewall allows out to the RIS server on destination port 69 and a ramdon source port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The return traffic goes back to the Netmanager the destination port is the random source port that the NEtman Used and the Firewall blocks the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I allow all UDP in its works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shouldn't the firewall open up the ports to allow the traffic back in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something/&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642025#M592460</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2019-03-11T19:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642026#M592461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are right. The return traffic of the original connection should be allow back in. Have you checked the logs or applied captures to see what is going on?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 20:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642026#M592461</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T20:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642027#M592462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Yes Ive checked the log - its dropping the incoming packets sent back to the Netman on the Random port it sends on. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; I found this post relative to PIX and it referred to a command "fixup protocol tftp" which I see as an option on my ASA's.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Any idea is this should be enabled on our ASA's to pass tftp traffic?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;**************&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;The situation becomes more complicated if it is necessary to provide the clients’ access from the protected network to the external TFTP server. &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Requesting the file, the client sends TFTP RRQ packet from a random UDP port to UDP 69 port of the TFTP server. As far as the packet is being sent from more protected network to the less protected one, firewall sends it to TFTP server. Transmitting the file, firewall adds to the table of translation a record that corresponds to the connection on UDP protocol between the chosen client’s port and port 69 of TFTP server. According to RFC 1350, the server sends to the client (from a random port) DATA TFTP packet. However, firewall rejects this packet because it cannot find the existing connection between the chosen server port and the client’s port in the table of translation.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt; mso-margin-top-alt: auto; mso-margin-bottom-alt: auto;"&gt;&lt;SPAN style="font-size: 10pt; color: #505050; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Devices, like Cisco PIX, can review the passing TFTP traffic and dynamically add to the table of translation records, allowing TFTP answers to pass from the external network to the enterprise network.&amp;nbsp;&amp;nbsp; To enable this mode in Cisco PIX firewall there is a command &lt;STRONG&gt;fixup protocol tftp&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 21:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642027#M592462</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2011-02-07T21:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642028#M592463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need the inspect TFTP. Please read the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The security appliance inspects TFTP traffic and dynamically creates connections and translations, if necessary, to permit file transfer between a TFTP client and server"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa71/command/reference/i2_711.html#wp1639081"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/command/reference/i2_711.html#wp1639081&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 21:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642028#M592463</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T21:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642029#M592467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have&amp;nbsp; global policy which is the default right out of the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class class_tftpt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class class_tftp1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 21:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642029#M592467</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2011-02-07T21:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642030#M592471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what does those 2 additional class maps contain?&lt;/P&gt;&lt;P&gt;Can you send the sh run class-map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 21:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642030#M592471</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T21:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642031#M592473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;# show run class-map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map class_tftp1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match port udp range 1 1023&lt;/P&gt;&lt;P&gt;class-map class_tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match port udp range 1.24 65535&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match default-inspection-traffic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642031#M592473</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2011-02-07T22:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642032#M592474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think you need those two class maps in your policy map, the default inspect tftp should handle the traffic. If you can test removing that it would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the traffic should be allowed back succesfully.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642032#M592474</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T22:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642033#M592477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok thanks I'll try that tomorrow and get back - most appreciated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:15:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642033#M592477</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2011-02-07T22:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: tftp blocking on asa5510</title>
      <link>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642034#M592478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I removed the other tftp class-maps and its still blocking the traffic.&amp;nbsp; If i allow back in udp ports 1024-655xx then it works ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything that you have to do different to allow tftp return traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 22:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tftp-blocking-on-asa5510/m-p/1642034#M592478</guid>
      <dc:creator>jschweng</dc:creator>
      <dc:date>2011-02-08T22:09:24Z</dc:date>
    </item>
  </channel>
</rss>

