<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftp through a pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81191#M683683</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not using AAA and the version of software is 6.2 I've experienced this same problem on earlier versions&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Aug 2002 19:17:08 GMT</pubDate>
    <dc:creator>pjosephs</dc:creator>
    <dc:date>2002-08-29T19:17:08Z</dc:date>
    <item>
      <title>ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81188#M683680</link>
      <description>&lt;P&gt;I have configured a pix for ftp access to a dmz containing an AS400. Although all access lists and static are in place I keep getting a deny for the ftp-data port 20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seem to remember reading somewhere something about ftp via the pix causing issues with data transfer. Any ideas&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81188#M683680</guid>
      <dc:creator>pjosephs</dc:creator>
      <dc:date>2020-02-21T06:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81189#M683681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using AAA authentication and what version of pix software are you running?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2002 16:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81189#M683681</guid>
      <dc:creator>mtumarinson</dc:creator>
      <dc:date>2002-08-29T16:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81190#M683682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you use NAT ?  NAT might cause this problem .&lt;/P&gt;&lt;P&gt;Do you try to use fixup command yet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2002 19:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81190#M683682</guid>
      <dc:creator>thong.do</dc:creator>
      <dc:date>2002-08-29T19:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81191#M683683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not using AAA and the version of software is 6.2 I've experienced this same problem on earlier versions&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2002 19:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81191#M683683</guid>
      <dc:creator>pjosephs</dc:creator>
      <dc:date>2002-08-29T19:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81192#M683684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FTP is a wierd animal when it comes to Cisco ACL or PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally you would do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl1 permit tcp any host FTPSERVER eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however to get it to work you need to change the order of the command so it looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl1 permit tcp any eq ftp host FTPSERVER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same applies to SNMP and probably other things. A Cisco engineer tried to explain it to me but I don't think he understood it either. If anyone out there can explain then please - give it a go.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2002 14:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81192#M683684</guid>
      <dc:creator>martin.law</dc:creator>
      <dc:date>2002-08-30T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81193#M683685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know What your set up looks like but take this for example.&lt;/P&gt;&lt;P&gt;Your ftp server is on the dmz intf with ip 10.10.20.11&lt;/P&gt;&lt;P&gt;You have a network on the inside interface of your Pix. The net is 10.20.10.0 /24. You want everyone on that  net to be able to use the ftp server.&lt;/P&gt;&lt;P&gt;Provided that all preliminary configs are working fine, here is what your config should look like.&lt;/P&gt;&lt;P&gt;configure an access-list  that you will apply to nat (0) so that traffic between the two segments does not get natted.&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.20.10.0 255.255.255.0 10.10.20.11 255.255.255.255&lt;/P&gt;&lt;P&gt;apply  this to nat (0):&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100 &lt;/P&gt;&lt;P&gt;Now you will configure a conduit to allow bi-directional communicatiion between the two segment:&lt;/P&gt;&lt;P&gt;conduit permit tcp 10.20.10.0 255.255.255.0 host 10.10.20.11 eq ftp&lt;/P&gt;&lt;P&gt; If communication is to be initiated from the lower security interface to the higher one, you need the conduit. In the case of ftp,  the server will probably initiate communication from port 20 to  the client on the inside intf. If there is no conduit line in the config, those packets will be dropped because by default you cannot initiate communication from a lower priority intf to a higher one. Sorry for being so  long winded.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2002 18:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81193#M683685</guid>
      <dc:creator>gsatchivi</dc:creator>
      <dc:date>2002-08-30T18:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81194#M683686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's me again.&lt;/P&gt;&lt;P&gt;If all your clients are comming from outside or any intf with a lower security than the dmz, you still need a conduit command to allow the clients in.&lt;/P&gt;&lt;P&gt;in this case:  conduit permit tcp host [the server's IP]  eq ftp any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gilles&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2002 18:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81194#M683686</guid>
      <dc:creator>gsatchivi</dc:creator>
      <dc:date>2002-08-30T18:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: ftp through a pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81195#M683687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would go step by step:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Try to ftp from one of the machines in the DMZ interface itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.  Then configure the conduit statement to allow `any' to 'any' and try to ftp:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Then configure to permit all ports to that particular IP :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp host x.x.x.x any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Then configure to allow only ftp to that particular ip :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conduit permit tcp host x.x.x.x eq ftp any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. Even though it is not needed for a PIX, try `conduit;ing ftp-data also (never needed to do this though!).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Rgds / Sampath&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:Sampathsr@hclcomnet.co.in"&gt;Sampathsr@hclcomnet.co.in&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2002 20:22:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-through-a-pix/m-p/81195#M683687</guid>
      <dc:creator>sampathsr</dc:creator>
      <dc:date>2002-08-30T20:22:05Z</dc:date>
    </item>
  </channel>
</rss>

