<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5520 + FTP over Explicit TLS/SSL Client in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391769#M703825</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear. I was certain it had to do with someone tearing the connection down.&lt;/P&gt;&lt;P&gt;If it was NAT the connection would not have been built.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, pls. rate the posts that helped you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Apr 2010 12:27:11 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-04-08T12:27:11Z</dc:date>
    <item>
      <title>ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391757#M703808</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;Been working on this issue for a while now, and I don't know ASA very well to know where to troubleshoot.&lt;/P&gt;&lt;P&gt;Here's our issue: we have issues connecting to FTPES sites (FTP over Explicit TLS/SSL (port 21), not SFTP (port 22) ) from our network.&lt;/P&gt;&lt;P&gt;Normal passive FTP connection works fine from our network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have nailed it down to the ASA, because when I bypass the box, my test machine can connect to the FTPES site just fine.&lt;/P&gt;&lt;P&gt;Using Filezilla, from our network, we can connect to the site and log in, but it failed when trying to do directory listing.&lt;/P&gt;&lt;P&gt;Here's the log from Filezilla:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command:&amp;nbsp;&amp;nbsp; MLSD&lt;BR /&gt;Error:&amp;nbsp;&amp;nbsp; GnuTLS error -53: Error in the push function.&lt;BR /&gt;Response:&amp;nbsp;&amp;nbsp; 425 Can't open data connection.&lt;BR /&gt;Error:&amp;nbsp;&amp;nbsp; Failed to retrieve directory listing&lt;BR /&gt;Response:&amp;nbsp;&amp;nbsp; 421 Connection timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have searched Google and it all points to NAT issue.&lt;/P&gt;&lt;P&gt;The thing is, I don't think the connection from that machine is NAT-ed (when I go to sites like whatsmyip, it shows the IP address of the server I am on and not the router).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also opened up IP connection from the external interface (the one connected to our main router) to my test machine, still no go.&lt;/P&gt;&lt;P&gt;Stuck on the same place. Any ideas? &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391757#M703808</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2019-03-11T17:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391758#M703809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;could you post the output of "sh run policy-map" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have ftp inspection configured? This is needed for regular (clear) ftp. If the client is on the inside and server is no the outside, passive ftp will work as the server sends the port command the client on the inside (higher security) opens a new connection to the server's high port to receive the data. If the server were to start a brand new connection from the lower security interface to send data and if the ACL applied on the outside does not allow this, data connection will break and you will not be able to list directory. Pls. make sure the outside ACL allows the high ports that the server will try to connect back to the client on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do you see in the logs?&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;where x.x.x.x is the ftp server IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 00:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391758#M703809</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T00:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391759#M703810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi kusankar&lt;/P&gt;&lt;P&gt;Here's the output from show run policy-map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect netbios &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class class_ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class class_ftp1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect h323 H323_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description H323 Policy Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; call-party-numbers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; h245-tunnel-block action log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; state-checking h225&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; state-checking ras&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; rtp-conformance enforce-payloadtype&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match media-type audio&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match media-type video&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match media-type data&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect netbios NetBIOS_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description NetBIOS Intrusion Detection Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; protocol-violation action log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect http HTTP-Map-100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; body-match-maximum 256&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; protocol-violation action log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match req-resp content-type mismatch&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header content-type violation&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header content-type violation&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_gator&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_kazaa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_http-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_gnu-http-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_httport-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_firethru-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_GoToMyPC-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_windows-media-player-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_shoutcast-tunneling-protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_msn-messenger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_aim-messenger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class _default_yahoo-messenger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method post&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method put&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method trace&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method delete&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method options&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method connect&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method get&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method head&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method unlock&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method edit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method save&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method mkdir&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method copy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method lock&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method index&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method move&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request method unedit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header transfer-encoding chunked&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header transfer-encoding chunked&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header transfer-encoding compress&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header transfer-encoding compress&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header transfer-encoding deflate&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header transfer-encoding deflate&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header transfer-encoding gzip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header transfer-encoding gzip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match request header transfer-encoding identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match response header transfer-encoding identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect ftp FTP-Map-100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; mask-banner&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; mask-syst-reply&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect dns DNS_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description DNS Policy_Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; message-length maximum 512&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; id-randomization&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; id-mismatch action log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect sip SIP_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description SIP Intrusion prevention Policy Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; ip-address-privacy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; max-forwards-validation action log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; state-checking action drop-connection log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; software-version action mask log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; strict-header-validation action drop log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; no traffic-non-sip&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; uri-non-sip action mask log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; rtp-conformance enforce-payloadtype&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect skinny SCCP_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description Skinny Protocol Inspection Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; enforce-registration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; message-id max 0x141&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; sccp-prefix-len max 65536&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; timeout media 0:01:00&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; timeout signaling 0:05:00&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; rtp-conformance enforce-payloadtype&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map global-policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description Policy for IPS Sensor&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class global-class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect sqlnet &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect xdmcp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect tftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect icmp error &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect rtsp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect sunrpc &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect mgcp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect pptp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect ctiqbe &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect rsh &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect icmp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect ils &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect snmp SNMP-Map-100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect http HTTP-Map-100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect ftp strict FTP-Map-100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect dns DNS_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect netbios NetBIOS_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect sip SIP_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect skinny SCCP_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect h323 h225 H323_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; inspect h323 ras H323_Map_100 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; class IPS_Class_10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; ips inline fail-open&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; set connection advanced-options TCP-Norm-Map-100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;policy-map type inspect im Instant_Messaging_Inspect_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description Policy Map to detect and log Instant Messaging and Tunnelling protocols within IM and HTTP tunnels&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; parameters&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match protocol msn-im yahoo-im &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_GoToMyPC-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_GoToMyPC-tunnel_2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_aim-messenger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_firethru-tunnel_1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_firethru-tunnel_2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_gator&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_gnu-http-tunnel_arg&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_gnu-http-tunnel_uri&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_http-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_httport-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_icy-metadata&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_msn-messenger&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_shoutcast-tunneling-protocol&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_windows-media-player-tunnel&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match version regex _default_x-kazaa-network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match service chat conference games voice-chat webcam &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;nbsp; log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;So yeah, inspect ftp is running. As I mentioned before, regular FTP works fine.&lt;/DIV&gt;&lt;DIV&gt;I'll actually qualify that statement. Regular FTP works to public sites like ftp.microsoft.com, but since the site I am trying to connect to don't actually have a normal FTP site, I can't test.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Nothing from sh logg | i ftp.server.address, looks like I need help in setting up proper logging. I have tried this while trying to connect to that site, nothing on the log.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 01:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391759#M703810</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T01:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391760#M703811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh boy ! didn't expect this output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need "sh run service-policy" output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable logging following this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;logging buffer-size 1048576&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;clear logg buff&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do this (sh logg command) quickly when you try the ftp connection.&amp;nbsp; If this is a busy firewall, which I think it is, the buffer may wrap too quickly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also collect the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh service-policy flow tcp host a.a.a.a host x.x.x.x eq 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where a.a.a.a is the client IP and x.x.x.x is the ftp server IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 01:17:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391760#M703811</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T01:17:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391761#M703813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firstly, thank you for your help so far.&lt;/P&gt;&lt;P&gt;Secondly, oops, my apologies for that. Ran the wrong command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's probably what you want:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;acerasa# sh run service-policy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;acerasa# &lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A bit of background: I am currently testing it from our Internal network.&lt;/P&gt;&lt;P&gt;x.x.x.x is the address of the FTP site we're testing.&lt;/P&gt;&lt;P&gt;y.y.y.y is the address of the interface labeled "External". That's the IP address we use to get out from our internal interface.&lt;/P&gt;&lt;P&gt;As you can see in the last line, something is denied. I think we're getting somewhere, if you can help me decipher this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's an output from the log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;acerasa# sh logg | i x.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:23:43 EST: %ASA-session-6-302014: Teardown TCP connection 197913265 for External:x.x.x.x/21 to Internal:10.10.0.162/1144 duration 0:00:22 bytes 1712 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:23:43 EST: %ASA-session-6-106100: access-list External_access_in denied tcp External/x.x.x.x(21) -&amp;gt; Internal/y.y.y.y(2839) hit-cnt 1 first hit [0xfd329ad8, 0x0]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:23:48 EST: %ASA-session-6-106100: access-list Internal_access_in permitted tcp Internal/10.10.0.162(1145) -&amp;gt; External/x.x.x.x(21) hit-cnt 1 first hit [0xd6d51b48, 0x4b81b8a0]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:23:48 EST: %ASA-session-6-302013: Built outbound TCP connection 197913995 for External:x.x.x.x/21 (x.x.x.x/21) to Internal:10.10.0.162/1145 (y.y.y.y/20049)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:24:09 EST: %ASA-session-6-302014: Teardown TCP connection 197913995 for External:x.x.x.x/21 to Internal:10.10.0.162/1145 duration 0:00:21 bytes 1712 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 11:24:09 EST: %ASA-session-6-106100: access-list External_access_in denied tcp External/x.x.x.x(21) -&amp;gt; Internal/y.y.y.y(20049) hit-cnt 1 first hit [0xfd329ad8, 0x0]&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 01:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391761#M703813</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T01:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391762#M703815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA-session-6-302013: Built outbound TCP connection 197913995 for External:x.x.x.x/21 (x.x.x.x/21) to Internal:10.10.0.162/1145 (y.y.y.y/20049)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA-session-6-106100: access-list External_access_in denied tcp External/x.x.x.x(21) -&amp;gt; Internal/y.y.y.y(20049)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, the inside client 10.10.0.162 looks like the external interface y.y.y.y upon NAT and tries to talk to x.x.x.x on the outside of external?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is this External_access_in acl applied? "IN" bound on the External interface? Seems like the response is getting dropped when it should be automatically allowed. Internal is higher level security than external correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you get the sh service-policy flow command output?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 01:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391762#M703815</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T01:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391763#M703816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;"So, the inside client 10.10.0.162 looks like the external interface y.y.y.y upon NAT and tries to talk to x.x.x.x on the outside of external?"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes. That is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;"Where is this External_access_in acl applied? "IN" bound on the External interface? Seems like the response is getting dropped when it should be automatically allowed. Internal is higher level security than external correct?"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, it is applied inbound on the External interface.&lt;/P&gt;&lt;P&gt;I tried putting a rule that would permit x.x.x.x to talk to y.y.y.y on high ports on the External interface, and the log changes to this instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;lt;190&amp;gt;:Apr 08 11:54:00 EST: %ASA-session-6-106015: Deny TCP (no connection) from x.x.x.x/21 to y.y.y.y/51519 flags ACK&amp;nbsp; on interface External&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;lt;190&amp;gt;:Apr 08 11:54:00 EST: %ASA-session-6-106015: Deny TCP (no connection) from x.x.x.x/21 to y.y.y.y/51519 flags ACK&amp;nbsp; on interface External&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like NAT gone screwy?&lt;/P&gt;&lt;P&gt;How do I check the higher security level of each interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;"Did you get the sh service-policy flow command output?"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ah yes, here it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;Global policy: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; Service-policy: global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class_ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: port tcp range 1 1023&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow:&amp;nbsp; inspect ftp &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Action:&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 02:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391763#M703816</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T02:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391764#M703819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;lt;190&amp;gt;:Apr 08 11:23:48 EST: %ASA-session-6-302013: Built outbound TCP connection 197913995 for External:x.x.x.x/21 (x.x.x.x/21) to Internal:10.10.0.162/1145 (y.y.y.y/20049)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;190&amp;gt;:Apr 08 11:24:09 EST: %ASA-session-6-302014: Teardown TCP connection 197913995 for External:x.x.x.x/21 to Internal:10.10.0.162/1145 duration 0:00:21 bytes 1712 TCP FINs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;190&amp;gt;:Apr 08 11:24:09 EST: %ASA-session-6-106100: access-list External_access_in denied tcp External/x.x.x.x(21) -&amp;gt; Internal/y.y.y.y(20049) hit-cnt 1 first hit [0xfd329ad8, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the explanation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. We build a connection from internal to external - and hope the respose will automatically be allowed.&lt;/P&gt;&lt;P&gt;2. the connection gets torn down for TCP FINs reason&lt;/P&gt;&lt;P&gt;3. After which the server responds - too late see the time. So, by the time the response comes the connection is not there so, we decide to check the acl for permission and deny the flow.&lt;/P&gt;&lt;P&gt;4. Even after you added the permission - Now you got deny tcp 106015 meaning, the response is now allowed but the connection or request that is matching this flow does not exist on the firewall and was torn down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet captures (wireshark) on the client on the server both taken simultaneously will explain things further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh nameif&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this above command will show you the security levels on the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 02:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391764#M703819</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T02:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391765#M703820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for that.&lt;/P&gt;&lt;P&gt;I have understood a heck a lot more now.&lt;/P&gt;&lt;P&gt;Half-way there, thanks to your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is definitely a NAT issue now.&lt;/P&gt;&lt;P&gt;We have 4 interfaces on the ASA, external, internal, dmz1 and dmz2.&lt;/P&gt;&lt;P&gt;I have managed to connect the machine to the FTP site from dmz1 (not NAT-ed), all I have to do is allow the machine to connect to port 30000 - 60000 to the FTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the internal interface, the connection is NAT-ed.&lt;/P&gt;&lt;P&gt;I figured because this is FTP over TLS/SSL, somehow the routing detail must have gotten encrypted as well, hence why I am getting the deny tcp 106015.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way around this? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 03:47:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391765#M703820</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T03:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391766#M703821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new',courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class_ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new',courier;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: port tcp range 1 1023&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears that you are doing ftp inspection for tcp ports 1 through 1023. Pls. change it to just match port 21.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is another class-map as well which is doing ftp inspection. I am not sure what port that is matching on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. post the output of "sh run class-map".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fact that you are masking all the IP address makes hard to review the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Capture on the client and server is the best option. Pls. download wireshark and get captues on the client and server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure that there is no web-filter kind of thing that may be blocking FTP TLS negotiation? Clearly the conn gets torn down due to FINs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also FTP SSL is supposed to be on port 990. It is not the case in your setup? Also, since this is encrypted inspection cannot look within the packet and automatically allow the data connection, you need to allow that in the acl applied on the External interface which you have done.&amp;nbsp; Right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://en.wikipedia.org/wiki/FTPS"&gt;http://en.wikipedia.org/wiki/FTPS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 04:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391766#M703821</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T04:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391767#M703822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;acerasa# sh run class-map &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map IPS_Class_10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match access-list global_mpc&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map global-class&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map class_ftp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match port tcp range 1 1023&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map class_ftp1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match port tcp range 1024 65535&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map type inspect im match-all Instant_Messaging_Map_100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; description Class Map for intstant Messaging&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match service chat conference file-transfer games voice-chat webcam &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match protocol msn-im yahoo-im &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;class-map inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt; match default-inspection-traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Unfortunately I don't have access to the FTP server (we're just connecting to them, it's not ours)&lt;/DIV&gt;&lt;DIV&gt;And I am not running FTPS, but FTPES (FTP over Explicit TLS/SSL). On the wikipage you linked, it is the first one under Method of Invoking:&lt;/DIV&gt;&lt;DIV&gt;&lt;H2&gt;&lt;SPAN style="font-size: 8pt; "&gt;Methods of invoking&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;Two separate methods were developed to invoke client security for use with FTP clients: &lt;/SPAN&gt;&lt;EM style="font-size: 8pt; "&gt;Explicit&lt;/EM&gt;&lt;SPAN style="font-size: 8pt;"&gt; or &lt;/SPAN&gt;&lt;EM style="font-size: 8pt; "&gt;Implicit&lt;/EM&gt;&lt;SPAN style="font-size: 8pt;"&gt;. The former method is a legacy compatible implementation where FTPS aware clients can invoke security with an FTPS aware server without breaking overall FTP functionality with non-FTPS aware clients. The latter method requires clients to be FTPS aware, and thus is incompatible with non-FTPS-aware clients.&lt;/SPAN&gt;&lt;/P&gt;&lt;H3&gt;&lt;SPAN class="editsection"&gt;&lt;SPAN style="font-size: 8pt;"&gt;[&lt;/SPAN&gt;&lt;A href="http://en.wikipedia.org/w/index.php?title=FTPS&amp;amp;action=edit&amp;amp;section=3" title="Edit section: Explicit"&gt;&lt;SPAN style="font-size: 8pt;"&gt;edit&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 8pt;"&gt;]&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 8pt; "&gt;Explicit&lt;/SPAN&gt;&lt;/H3&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;In explicit mode (also known as &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;FTPES&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt;), an FTPS client must "explicitly request" security from an FTPS server and then step-up to a mutually agreed encryption method. If a client does not request security, the FTPS server can either allow the client to continue insecure or refuse/limit the connection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;The mechanism for negotiating authentication and security with FTP was added under &lt;/SPAN&gt;&lt;A class="external mw-magiclink-rfc" href="http://tools.ietf.org/html/rfc2228"&gt;&lt;SPAN style="font-size: 8pt;"&gt;RFC 2228&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 8pt;"&gt;, which included the new FTP command &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt;. While this RFC does not explicitly define any required security mechanisms (ie, SSL or TLS), it does require that the FTPS client will challenge the FTPS server with a mutually known mechanism. If the FTPS client challenges the FTPS server with an unknown security mechanism, the FTPS server will respond to the &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt; command with error code &lt;/SPAN&gt;&lt;EM style="font-size: 8pt; "&gt;504 (not supported)&lt;/EM&gt;&lt;SPAN style="font-size: 8pt;"&gt;. Clients could determine which mechanisms were supported by querying the FTPS server with the &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;FEAT&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt; command, although it should be noted that servers are not necessarily required to be honest in disclosing what levels of security they support. Common methods of invoking FTPS security included: &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH TLS&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt; and &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH SSL&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;In the later &lt;/SPAN&gt;&lt;A class="external mw-magiclink-rfc" href="http://tools.ietf.org/html/rfc4217"&gt;&lt;SPAN style="font-size: 8pt;"&gt;RFC 4217&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="font-size: 8pt;"&gt;, FTPS compliance required that clients always negotiate using the &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH TLS&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt; method. The RFC also recommends FTPS servers to accept the draft mechanism &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; "&gt;AUTH TLS-C&lt;/STRONG&gt;&lt;SPAN style="font-size: 8pt;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have another layer of firewall between ASA and our Internal server, but I have allowed FTP and also high ports to the external FTP server. I'll try to get as many packet capture as possible.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'andale mono', times;"&gt;"Also, since this is encrypted inspection cannot look within the packet and automatically allow the data connection, you need to allow that in the acl applied on the External interface which you have done.&amp;nbsp; Right?"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have allowed incoming to our External interface ports 30000 - 60000, still getting this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 11px;"&gt;acerasa# sho logg | i 78.46.61.19&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 14:35:56 EST: %ASA-session-6-106100: access-list Internal_access_in permitted tcp Internal/10.10.0.162(1331) -&amp;gt; External/78.46.61.19(21) hit-cnt 1 first hit [0xd6d51b48, 0x4b81b8a0]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 14:35:56 EST: %ASA-session-6-302013: Built outbound TCP connection 198370172 for External:78.46.61.19/21 (78.46.61.19/21) to Internal:10.10.0.162/1331 (203.xxx.xxx.xxx/44726)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&amp;lt;190&amp;gt;:Apr 08 14:36:19 EST: %ASA-session-6-302014: Teardown TCP connection 198370172 for External:78.46.61.19/21 to Internal:10.10.0.162/1331 duration 0:00:22 bytes 1712 TCP FINs&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&lt;STRONG&gt;&amp;lt;190&amp;gt;:Apr 08 14:36:19 EST: %ASA-session-6-106015: Deny TCP (no connection) from 78.46.61.19/21 to 203.xxx.xxx.xxx/44726 flags ACK&amp;nbsp; on interface External&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier; "&gt;&lt;STRONG&gt;&amp;lt;190&amp;gt;:Apr 08 14:36:19 EST: %ASA-session-6-106015: Deny TCP (no connection) from 78.46.61.19/21 to 203.xxx.xxx.xxx/44726 flags ACK&amp;nbsp; on interface External&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;203.xxx.xxx.xxx is our ASA external interface.&lt;/DIV&gt;&lt;DIV&gt;78.46.61.19 is the FTP server in Germany we're trying to connect to.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 04:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391767#M703822</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T04:41:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391768#M703823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SOLVED!!!!&lt;/P&gt;&lt;P&gt;Your last message about a filter got me thinking.&lt;/P&gt;&lt;P&gt;I had a closer look at the internal firewall that we have (Watchguard).&lt;/P&gt;&lt;P&gt;It turns out that it is doing some funky inspection stuff with FTP.&lt;/P&gt;&lt;P&gt;I created a new FTP rule and deleted the old one, voila, everything works now.&lt;/P&gt;&lt;P&gt;Thanks for your help, I do learn heaps from this &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 05:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391768#M703823</guid>
      <dc:creator>jafaruddinlie</dc:creator>
      <dc:date>2010-04-08T05:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391769#M703825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear. I was certain it had to do with someone tearing the connection down.&lt;/P&gt;&lt;P&gt;If it was NAT the connection would not have been built.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, pls. rate the posts that helped you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 12:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/1391769#M703825</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-08T12:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 + FTP over Explicit TLS/SSL Client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/3381953#M703827</link>
      <description>&lt;P&gt;Is there any compromise in bypassing the inspection of FTP over Explicit TLS/SSL Client on firewall? as i have ASA firewall waiting your reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if inspection required to be kept then is there any way that Firewall doesn't restrict the connection&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;awaiting your reply.&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 16:23:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-ftp-over-explicit-tls-ssl-client/m-p/3381953#M703827</guid>
      <dc:creator>ontljoshi</dc:creator>
      <dc:date>2018-05-11T16:23:52Z</dc:date>
    </item>
  </channel>
</rss>

