<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641552#M594948</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can be configured with an FTP map to provide application inspection and instruct the ASA to allow only certain type of commands, and other restrictions.&lt;/P&gt;&lt;P&gt;This is creating a Layer 7 Policy MAP and class MAP for FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Jan 2011 17:24:58 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2011-01-07T17:24:58Z</dc:date>
    <item>
      <title>FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641551#M594946</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to know if I have FTP Server and I want to configure something on firewall or Routers so Client or user have only read-only access to FTP server or user can not upload or download the data from FTP server??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641551#M594946</guid>
      <dc:creator>abhi-adte</dc:creator>
      <dc:date>2019-03-11T19:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641552#M594948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can be configured with an FTP map to provide application inspection and instruct the ASA to allow only certain type of commands, and other restrictions.&lt;/P&gt;&lt;P&gt;This is creating a Layer 7 Policy MAP and class MAP for FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 17:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641552#M594948</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-07T17:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641553#M594950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are talking abt the FPM or MPF..??&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jan 2011 22:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641553#M594950</guid>
      <dc:creator>abhi-adte</dc:creator>
      <dc:date>2011-01-09T22:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641554#M594952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well...&lt;/P&gt;&lt;P&gt;FPM is on IOS and MPF is either on IOS or ASAs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jan 2011 00:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641554#M594952</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-10T00:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641555#M594954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is ok and good; but some one told me it can done via ACL so I tried but its not done from me if u get some thing about it pls share with me...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 13:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641555#M594954</guid>
      <dc:creator>abhi-adte</dc:creator>
      <dc:date>2011-01-12T13:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641556#M594956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Abhinay,&lt;/P&gt;&lt;P&gt;If you want the users to have only read-only permission on the ftp server then, this needs to be done on the ftp server. Firewall has no knowledge of whether you have read-only, full-control, change or write permission to a folder. All it knows is IP address and ports. If the acl allows it it will allow the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you are talking about strict ftp inspection where you can block certain ftp commands like mkdir, put can be dropped and reset when sent via ftp protocol via MPF (modular policy framework)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641556#M594956</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-12T14:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641557#M594959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly.&lt;/P&gt;&lt;P&gt;What I'm saying is that an ''advanced'' Layer 7 Policy Map for FTP could include more detailed restrictions (application access) as to specify read-only or write-access, which commands are allowed, etc... (definitely not with an ACL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check this here:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/inspect_basic.html#wp1810407"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/inspect_basic.html#wp1810407&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641557#M594959</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-12T14:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: FTP?</title>
      <link>https://community.cisco.com/t5/network-security/ftp/m-p/1641558#M594961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to all...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jan 2011 14:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp/m-p/1641558#M594961</guid>
      <dc:creator>abhi-adte</dc:creator>
      <dc:date>2011-01-12T14:50:08Z</dc:date>
    </item>
  </channel>
</rss>

