<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with FTP ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651759#M593177</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm relatively new to this Cisco... so please bare with me. I ran the command "show service-policy" and it returned nothing but the standard prompt. Is there anything else I should be doing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 28 Jan 2011 19:06:01 GMT</pubDate>
    <dc:creator>jill.kane</dc:creator>
    <dc:date>2011-01-28T19:06:01Z</dc:date>
    <item>
      <title>Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651754#M593172</link>
      <description>&lt;P&gt;I am unable to get inbound ftp working. Here is my current running configuration. Can anyone help me? All I want is to ftp to the external ip address and have it hit the internal ftp server address of 192.168.1.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname EOSasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt; ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.1.3 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 99.23.119.78 netmask 255.255.255.248&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group EOS request dialout pppoe&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net" target="_blank"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn group linkstation request dialout pppoe&lt;BR /&gt;vpdn group linkstation localname &lt;A href="mailto:eossolutions@static.att.net" target="_blank"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group linkstation ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net" target="_blank"&gt;eossolutions@static.att.net&lt;/A&gt; password ********* &lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;BR /&gt;dhcpd dns 68.94.156.1 68.94.157.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy Admins internal&lt;BR /&gt;group-policy Admins attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;username adminjk password 4V9t4jYY5NUXyHQF encrypted privilege 0&lt;BR /&gt;username adminjk attributes&lt;BR /&gt; vpn-group-policy Admins&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map golbal_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2d387046ad799a8a93b065724d24faf4&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651754#M593172</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2019-03-11T19:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651755#M593173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This line should reference the public IP (instead than the private IP):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.3 object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 18:04:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651755#M593173</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-28T18:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651756#M593174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still no luck... any other ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ftp internally when connected to the local ip. However, going to &lt;A href="ftp://99.23.119.78"&gt;ftp://99.23.119.78&lt;/A&gt; it times out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname EOSasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group ATT&lt;BR /&gt;ip address pppoe setroute &lt;BR /&gt;ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 99.23.119.78 netmask 255.255.255.248&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group EOS request dialout pppoe&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn group linkstation request dialout pppoe&lt;BR /&gt;vpdn group linkstation localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group linkstation ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt; password ********* &lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;BR /&gt;dhcpd dns 68.94.156.1 68.94.157.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;group-policy Admins internal&lt;BR /&gt;group-policy Admins attributes&lt;BR /&gt;vpn-tunnel-protocol webvpn&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;username adminjk password 4V9t4jYY5NUXyHQF encrypted privilege 0&lt;BR /&gt;username adminjk attributes&lt;BR /&gt;vpn-group-policy Admins&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map golbal_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2d387046ad799a8a93b065724d24faf4&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 18:08:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651756#M593174</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T18:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651757#M593175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see that I am now getting hits in the ASDM but they are not coming through. What else should I change?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 18:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651757#M593175</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T18:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651758#M593176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jill,&lt;/P&gt;&lt;P&gt;Can you post sh service-policy output ?&lt;/P&gt;&lt;P&gt;manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 18:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651758#M593176</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T18:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651759#M593177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm relatively new to this Cisco... so please bare with me. I ran the command "show service-policy" and it returned nothing but the standard prompt. Is there anything else I should be doing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651759#M593177</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T19:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651760#M593178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try this :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa(config)# service-policy golbal_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then test your ftp from outside network ( From client side )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then&amp;nbsp; do sh service-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651760#M593178</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T19:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651761#M593179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still no connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran sh service-policy and this is the output:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Global policy:&lt;BR /&gt;&amp;nbsp; Service-policy: golbal_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inspect: ftp, packet 0, drop 0, reset-drop 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anything else?&lt;/P&gt;&lt;P&gt;It seems the ftp traffic is coming to the right place, its just not being sent to the internal ip address - thus never prompting for a login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see that there are hits.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651761#M593179</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T19:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651762#M593180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jill,&lt;/P&gt;&lt;P&gt;Is this the correct ip address that you are using 99.23.119.78 ?&lt;/P&gt;&lt;P&gt;Externally it only show port 443 &amp;amp; 22 open.&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:46:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651762#M593180</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T19:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651763#M593181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct... the ip is 99.23.119.78.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I open port 21 for ftp?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again, this is the running config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname EOSasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute&lt;BR /&gt; ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 99.23.119.78 object-g&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; roup DM_INLINE_TCP_1&lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp&lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp-data&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www&lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp&lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 99.23.119.78 netmask 255.255.255.248&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group EOS request dialout pppoe&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn group linkstation request dialout pppoe&lt;BR /&gt;vpdn group linkstation localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group linkstation ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt; password *********&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;BR /&gt;dhcpd dns 68.94.156.1 68.94.157.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy Admins internal&lt;BR /&gt;group-policy Admins attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;username adminjk password 4V9t4jYY5NUXyHQF encrypted privilege 0&lt;BR /&gt;username adminjk attributes&lt;BR /&gt; vpn-group-policy Admins&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map golbal_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;!&lt;BR /&gt;service-policy golbal_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:2d387046ad799a8a93b065724d24faf4&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651763#M593181</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T19:50:34Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651764#M593182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One question... when you attempt the FTP connection do you get an error on the client?&lt;/P&gt;&lt;P&gt;Are you able to FTP to your server from the inside (inside the ASA)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:55:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651764#M593182</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-28T19:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651765#M593183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Inside the network I am able to ftp to &lt;A href="ftp://192.168.1.3"&gt;ftp://192.168.1.3&lt;/A&gt; and am prompted for credentials and am able to gain access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;And regardless of if I am inside the network or outside when try to ftp to &lt;A href="ftp://99.23.119.78"&gt;ftp://99.23.119.78&lt;/A&gt; it is unable to connect. It times out and is unable to access the folder; a connection with the server could not be established.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Try it out yourself and let me know.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thanks, I really appreciate the help! I've been trying to get this to work for about 5 hours today and it shouldn't be that difficult!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 19:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651765#M593183</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T19:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651766#M593184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Last time I saw your config you had :-&lt;/P&gt;&lt;P&gt;"static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where are these lines now ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if they are not there , then please add these lines :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 192.168.1.3 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651766#M593184</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T20:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651767#M593185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the updated config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname EOSasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute&lt;BR /&gt; ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp&lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp-data&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data&lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www&lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp&lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 99.23.119.78 netmask 255.255.255.248&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group EOS request dialout pppoe&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn group linkstation request dialout pppoe&lt;BR /&gt;vpdn group linkstation localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group linkstation ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt; password *********&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;BR /&gt;dhcpd dns 68.94.156.1 68.94.157.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy Admins internal&lt;BR /&gt;group-policy Admins attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;username adminjk password 4V9t4jYY5NUXyHQF encrypted privilege 0&lt;BR /&gt;username adminjk attributes&lt;BR /&gt; vpn-group-policy Admins&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map golbal_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;!&lt;BR /&gt;service-policy golbal_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:2d387046ad799a8a93b065724d24faf4&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:06:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651767#M593185</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T20:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651768#M593187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The scan to your IP ADD looks&lt;/P&gt;&lt;P&gt;like this :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[root@cola1 ~]# nmap -sS -vv 99.23.119.78&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Starting Nmap 4.11 ( &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.insecure.org/nmap/"&gt;http://www.insecure.org/nmap/&lt;/A&gt;&lt;SPAN&gt; ) at 2011-01-28 05:58 PST&lt;/SPAN&gt;&lt;BR /&gt;DNS resolution of 1 IPs took 0.00s.&lt;BR /&gt;Initiating SYN Stealth Scan against 99-23-119-78.dsl.sfldmi.sbcglobal.net (99.23.119.78) [1680 ports] at 05:58&lt;BR /&gt;Discovered open port 22/tcp on 99.23.119.78&lt;BR /&gt;Discovered open port 443/tcp on 99.23.119.78&lt;BR /&gt;The SYN Stealth Scan took 27.75s to scan 1680 total ports.&lt;BR /&gt;Host 99-23-119-78.dsl.sfldmi.sbcglobal.net (99.23.119.78) appears to be up ... good.&lt;BR /&gt;Interesting ports on 99-23-119-78.dsl.sfldmi.sbcglobal.net (99.23.119.78):&lt;BR /&gt;Not shown: 1678 filtered ports&lt;BR /&gt;PORT&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE SERVICE&lt;BR /&gt;22/tcp&amp;nbsp; open&amp;nbsp; ssh&lt;BR /&gt;443/tcp open&amp;nbsp; https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nmap finished: 1 IP address (1 host up) scanned in 28.138 seconds&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Raw packets sent: 3361 (147.864KB) | Rcvd: 10 (544B)&lt;BR /&gt;[root@cola1 ~]#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651768#M593187</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T20:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651769#M593189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Retest now , it shows :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Discovered open port 22/tcp on 99.23.119.78&lt;BR /&gt;Discovered open port 443/tcp on 99.23.119.78&lt;BR /&gt;Discovered open port 80/tcp on 99.23.119.78&lt;BR /&gt;Discovered open port 21/tcp on 99.23.119.78&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651769#M593189</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T20:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651770#M593191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It works from outside now.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Index of &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://99.23.119.78/"&gt;ftp://99.23.119.78/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Up to higher level directory&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;BR /&gt;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; Name&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Size&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last Modified&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; disk1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12/30/2010&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2:13:00 PM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; info&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/14/2009&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12:00:00 AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651770#M593191</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T20:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651771#M593192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;GREAT!!!!!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Thank you so much for being patient with me and helping me out!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I can finally move on!!! You'r awesome! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651771#M593192</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T20:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651772#M593193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One more question before you go...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to allow customers to access the web interface of the ftp site (which is actually just a Buffalo Linkstation) and to do so it uses port 9000. What is the command that I should run to allow this? I added tcp,9000 to the outside (incoming rule) so that it now shows 9000, ftp, ftp-data and http.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this correct? Here's my config (hopefully for the last time):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname EOSasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt; ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq 9000&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any interface outside eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 1 99.23.119.78 netmask 255.255.255.248&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface ftp 192.168.1.3 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ftp-data 192.168.1.3 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 9000 192.168.1.3 9000 netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group EOS request dialout pppoe&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn group linkstation request dialout pppoe&lt;BR /&gt;vpdn group linkstation localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group linkstation ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt; password ********* &lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.100 inside&lt;BR /&gt;dhcpd dns 68.94.156.1 68.94.157.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy Admins internal&lt;BR /&gt;group-policy Admins attributes&lt;BR /&gt; vpn-tunnel-protocol webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;username adminjk password 4V9t4jYY5NUXyHQF encrypted privilege 0&lt;BR /&gt;username adminjk attributes&lt;BR /&gt; vpn-group-policy Admins&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map golbal_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;!&lt;BR /&gt;service-policy golbal_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2d387046ad799a8a93b065724d24faf4&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 20:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651772#M593193</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-01-28T20:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with FTP ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651773#M593194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;YES,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I do see authentication window on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://99.23.119.78:9000"&gt;http://99.23.119.78:9000&lt;/A&gt;&lt;SPAN&gt; .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you please mark Federico post as answered too &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; , he was helping you out too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chrees&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 21:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-ftp-asa-5505/m-p/1651773#M593194</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-28T21:39:01Z</dc:date>
    </item>
  </channel>
</rss>

