<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTP issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522114#M631377</link>
    <description>&lt;P&gt;I have a server on a dmz that can ftp a file using the web browser and you can connect to the ftp server via the command line.&amp;nbsp;&amp;nbsp; However, when one of the developers tries to use a script to transfer the file it does not work.&amp;nbsp; Additionally, when you connect to the ftp server via the command line and try to run the ls command you receive an error message saying " 500 illegal port".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that ftp is allowed on the firewall and ftp is part of the default global inspection policy.&amp;nbsp; It looks like this is a PASV vs active issue.&amp;nbsp; However in windows it does not allow you to swtich to passive mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other then opening up all high level ports for this connection , does anyone have a suggestion on what/ if anything I can do on the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:33:33 GMT</pubDate>
    <dc:creator>lkadlik</dc:creator>
    <dc:date>2019-03-11T18:33:33Z</dc:date>
    <item>
      <title>FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522114#M631377</link>
      <description>&lt;P&gt;I have a server on a dmz that can ftp a file using the web browser and you can connect to the ftp server via the command line.&amp;nbsp;&amp;nbsp; However, when one of the developers tries to use a script to transfer the file it does not work.&amp;nbsp; Additionally, when you connect to the ftp server via the command line and try to run the ls command you receive an error message saying " 500 illegal port".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that ftp is allowed on the firewall and ftp is part of the default global inspection policy.&amp;nbsp; It looks like this is a PASV vs active issue.&amp;nbsp; However in windows it does not allow you to swtich to passive mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other then opening up all high level ports for this connection , does anyone have a suggestion on what/ if anything I can do on the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522114#M631377</guid>
      <dc:creator>lkadlik</dc:creator>
      <dc:date>2019-03-11T18:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522115#M631378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if this might help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1234738"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1234738&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see what is the behavior of the normal default FTP inspection on the ASA and you can additionally create an FTP inspection map to specify different behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 14:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522115#M631378</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-01T14:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522116#M631380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you provide details as to where is the client located with respect to the ASA and also IP address details of the ASA and the server along with the current ASA config (with altered IP addresses if needed)? We can go through that and see if we notice anything wrong on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 14:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522116#M631380</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-01T14:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522117#M631381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The client is on the dmz and can connect to the ftp server via the command line and transfer the file using a browser. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a.b.c.f is the ftp server&lt;/P&gt;&lt;P&gt;a.b.c.g is the client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The relevant parts of the config are as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address a.b.c.d 255.255.255.0 standby a.b.c.e&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.20.30.2 255.255.255.0 standby 10.20.30.3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.1&lt;/P&gt;&lt;P&gt;description LAN Failover Interface&lt;/P&gt;&lt;P&gt;vlan 28&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2.2&lt;/P&gt;&lt;P&gt;description STATE Failover Interface&lt;/P&gt;&lt;P&gt;vlan 29&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;speed 100&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif dmz&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.50.2 255.255.255.0 standby 192.168.50.3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif managment&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network-object host a.b.c.f&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service FTP_service&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-object tcp eq ftp-data &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-object tcp eq ftp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-object tcp range 5500 5700&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;　&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended deny object-group Anonymous any object-group BlackList&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended deny ip a.b.c.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended deny ip 192.168.50.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended deny ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended deny ip 127.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;access-list acl_Inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit tcp host 192.168.50.51 host 192.168.50.180 eq smtp&lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit tcp host 192.168.50.54 host 192.168.50.180 eq smtp&lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit tcp host 192.168.50.54 host 192.168.50.246 eq smtp&lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended deny ip 192.168.50.0 255.255.255.0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list acl_DMZ extended permit ip 192.168.50.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list acl_Outside extended permit object-group FTP_service any object-group FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu managment 1500&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-623.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;　&lt;/P&gt;&lt;P&gt;static (inside,outside) a.b.c.f 10.20.30.55 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) a.b.c.g 10.20.25.102 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group acl_Outside in interface outside&lt;/P&gt;&lt;P&gt;access-group acl_Inside in interface inside&lt;/P&gt;&lt;P&gt;access-group acl_DMZ in interface dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map Global_Policy&lt;/P&gt;&lt;P&gt;description Global Policy for Traffic Inspection&lt;/P&gt;&lt;P&gt;class Inspection_Default&lt;/P&gt;&lt;P&gt;inspect dns&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;inspect h323 h225&lt;/P&gt;&lt;P&gt;inspect h323 ras&lt;/P&gt;&lt;P&gt;inspect icmp&lt;/P&gt;&lt;P&gt;inspect ipsec-pass-thru&lt;/P&gt;&lt;P&gt;inspect mgcp&lt;/P&gt;&lt;P&gt;inspect pptp&lt;/P&gt;&lt;P&gt;inspect rsh&lt;/P&gt;&lt;P&gt;inspect rtsp&lt;/P&gt;&lt;P&gt;inspect sip&lt;/P&gt;&lt;P&gt;inspect skinny&lt;/P&gt;&lt;P&gt;inspect snmp&lt;/P&gt;&lt;P&gt;inspect sqlnet&lt;/P&gt;&lt;P&gt;inspect tftp&lt;/P&gt;&lt;P&gt;inspect xdmcp&lt;/P&gt;&lt;P&gt;inspect http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy Global_Policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:fd174eacd4f91d6b5b3ef484f5365abe&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 15:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522117#M631381</guid>
      <dc:creator>lkadlik</dc:creator>
      <dc:date>2010-09-01T15:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522118#M631383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have mentioned that both the client and the serve rare on the DMZ. But in the config i see the below 2 static commands redircting a.b.c.f (server) and a.b.c.g (client) to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) a.b.c.f 10.20.30.55 netmask&amp;nbsp; 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) a.b.c.g 10.20.25.102&amp;nbsp; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure about the topology yet. Could you clarify things a little bit more here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 15:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522118#M631383</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-01T15:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: FTP issue</title>
      <link>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522119#M631386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like this might be a barracuda issue.&amp;nbsp; Thank you for taking the time to respond to me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Sep 2010 21:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-issue/m-p/1522119#M631386</guid>
      <dc:creator>lkadlik</dc:creator>
      <dc:date>2010-09-01T21:47:58Z</dc:date>
    </item>
  </channel>
</rss>

