<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP issues - Can't reach ftp site while inside firewall usin in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638901#M604358</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the result of running that command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255 dns"&lt;/P&gt;&lt;P&gt;ERROR: mapped-address conflict with existing static&lt;BR /&gt;&amp;nbsp; TCP inside:192.168.1.3/9000 to ATT:99.23.119.78/80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Feb 2011 13:54:26 GMT</pubDate>
    <dc:creator>jill.kane</dc:creator>
    <dc:date>2011-02-28T13:54:26Z</dc:date>
    <item>
      <title>FTP issues - Can't reach ftp site while inside firewall using external url</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638898#M604355</link>
      <description>&lt;P&gt;I am trying to configure our ASA 5505 so that our users can access our ftp site using &lt;A href="http://www.fileshare.3eos.com" target="_blank"&gt;http://www.fileshare.3eos.com&lt;/A&gt; while inside the firewall. Our ftp site is setup so that you can reach it by either browsing to the above url or by browsing to &lt;A href="ftp://99.23.119.78" target="_blank"&gt;ftp://99.23.119.78&lt;/A&gt; but we are unable to access our ftp site from either route while inside the firewall. We can access our ftp site using the internal ip address of 192.168.1.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is our current confguration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif ATT&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group ATT&lt;BR /&gt;ip address pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;BR /&gt;port-object eq www&lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp &lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp-data &lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq www &lt;BR /&gt;access-list 100 extended permit tcp any interface ATT eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any interface ATT eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ATT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (ATT) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp 99.23.119.73 www 192.168.1.3 www netmask 255.255.255.255 &lt;BR /&gt;access-group ATT_access_in in interface ATT&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A class="jive-link-email-small" href="mailto:eossolutions@static.att.net" target="_blank"&gt;&lt;SPAN style="color: #2f6681;"&gt;eossolutions@static.att.net&lt;/SPAN&gt;&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn username &lt;A class="jive-link-email-small" href="mailto:eossolutions@static.att.net" target="_blank"&gt;&lt;SPAN style="color: #2f6681;"&gt;eossolutions@static.att.net&lt;/SPAN&gt;&lt;/A&gt; password ********* store-local&lt;BR /&gt;dhcpd auto_config ATT&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.132 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:7853eba819b95acc0d48be15849ff3e2&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;!-- [DocumentBodyEnd:37aedc1a-f653-4fff-8765-abb17be61d83] --&gt;&lt;!-- BEGIN attachments --&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- END attachments --&gt;&lt;!-- )--&gt;&lt;/P&gt;&lt;P&gt;&lt;!-- BEGIN helpful &amp;amp; correct buttons --&gt;&lt;!-- END helpful &amp;amp; correct buttons --&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:57:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638898#M604355</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2019-03-11T19:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638899#M604356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From inside, you will only be able to reach it by its private ip address (192.168.1.3) if you use ip address to access the FTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use name to access the FTP server, assuming that DNS is hosted on the outside, and the DNS request for "&lt;A class="jive-link-external-small" href="http://www.fileshare.3eos.com/"&gt;www.fileshare.3eos.com&lt;/A&gt;" passes through the ASA firewall, then you can configure "DNS Doctoring" which will modify the DNS reply from the server public ip address to its private ip address as from the inside, it's only accesible via its private ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in that case, you will have to add the "dns" keyword on your existing static PAT statement:&lt;/P&gt;&lt;P&gt;static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255 &lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you add the "dns" keyword to the above statement, you will have to flush the DNS cache on your PC, and try to access &lt;A href="https://community.cisco.com/www.fileshare.3eos.com" target="_blank"&gt;www.fileshare.3eos.com&lt;/A&gt;, or do an "nslookup" from an inside PC, and you should see that it resolves to its internal ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is true if the DNS entry for &lt;A href="https://community.cisco.com/www.fileshare.3eos.com" target="_blank"&gt;www.fileshare.3eos.com&lt;/A&gt; is hosted on the outside of the ASA, and the DNS query/reply passes through the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 01:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638899#M604356</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-28T01:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638900#M604357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks... that makes sense. The DNS for this is hosted outside of the ASA. I will try it tomorrow morning and let you know. I appreciate your quick response!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 01:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638900#M604357</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-02-28T01:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638901#M604358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the result of running that command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255 dns"&lt;/P&gt;&lt;P&gt;ERROR: mapped-address conflict with existing static&lt;BR /&gt;&amp;nbsp; TCP inside:192.168.1.3/9000 to ATT:99.23.119.78/80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 13:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638901#M604358</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-02-28T13:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638902#M604359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am still unable to reach our FTP server while inside the firewall using &lt;A href="http://www.fileshare.3eos.com"&gt;http://www.fileshare.3eos.com&lt;/A&gt;. Externally it works great. I can ping that web address from internal and I receive a request timeout from the correct external ip address (99.23.119.78)... so I know it's being resolved properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my current config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password qVQaNBP31RadYDLM encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif ATT&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group ATT&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list ATT_access_in remark Linkstation Access&lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP-Data&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq ftp-data &lt;BR /&gt;access-list ATT_access_in remark Linkstation FTP HTTP Customer&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq www &lt;BR /&gt;access-list ATT_access_in remark Linkstation Remote Admin&lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.73 eq www &lt;BR /&gt;access-list ATT_access_in remark RealVNC&lt;BR /&gt;access-list ATT_access_in extended permit tcp any interface ATT eq 5510 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 eq 29000 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 99.23.119.78 eq 39000 &lt;BR /&gt;access-list ATT_access_in extended permit tcp any host 192.168.1.4 eq 5510 &lt;BR /&gt;access-list 100 extended permit tcp any interface ATT eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any interface ATT eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list 100 extended permit tcp any host 99.23.119.73 eq 5510 &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq ftp-data &lt;BR /&gt;access-list extended extended permit tcp any host 192.168.1.3 eq www &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5900 &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5510 &lt;BR /&gt;access-list extended extended permit tcp any host 99.23.119.73 eq 5511 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu ATT 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (ATT) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,ATT) tcp 99.23.119.73 www 192.168.1.3 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 29000 192.168.1.4 29000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 39000 192.168.1.4 39000 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 5510 192.168.1.4 5510 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 5511 192.168.1.4 5511 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface 3389 192.168.1.4 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,ATT) tcp interface www 192.168.1.3 9000 netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;access-group ATT_access_in in interface ATT&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 ATT&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group ATT request dialout pppoe&lt;BR /&gt;vpdn group ATT localname &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt;&lt;BR /&gt;vpdn group ATT ppp authentication pap&lt;BR /&gt;vpdn username &lt;A href="mailto:eossolutions@static.att.net"&gt;eossolutions@static.att.net&lt;/A&gt; password ********* store-local&lt;BR /&gt;dhcpd auto_config ATT&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.132 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:bd6ede5c5400c2d1472282d3834f49f1&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 17:17:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638902#M604359</guid>
      <dc:creator>jill.kane</dc:creator>
      <dc:date>2011-02-28T17:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638903#M604360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jill/Jenn,&lt;/P&gt;&lt;P&gt;This question is for Jenn , is dns rewrite even compatible with static PAT ? I am asking you this because of :-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#intro&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;LI&gt;&lt;/LI&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Translates the DNS record based on the configuration completed using the &lt;STRONG&gt;static&lt;/STRONG&gt; and &lt;STRONG&gt;nat&lt;/STRONG&gt; commands (DNS rewrite). Translation only applies to the A-record in the&amp;nbsp; DNS reply. Therefore, reverse lookups, which request the PTR record,&amp;nbsp; are not affected by DNS rewrite.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt;DNS rewrite is not compatible with static Port Address&amp;nbsp; Translation (PAT) because multiple PAT rules are applicable for each&amp;nbsp; A-record, and the PAT rule to use is ambiguous.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Feb 2011 17:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638903#M604360</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-02-28T17:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issues - Can't reach ftp site while inside firewall usin</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638904#M604361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Spot on, Manish. You are totally right!!! Static PAT does not work with DNS doctoring as the public ip address can be translated to multiple internal address with different ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only option you have then Jill is to use the private ip address to connect instead of the name when you are connecting from the inside as your current setup does not allow DNS doctoring.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Mar 2011 08:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issues-can-t-reach-ftp-site-while-inside-firewall-using/m-p/1638904#M604361</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-03-01T08:48:54Z</dc:date>
    </item>
  </channel>
</rss>

