<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftp on alternate port in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380503#M798547</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you check your routing? (Not VPN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also try to put a &lt;STRONG&gt;deny ip any any log&lt;/STRONG&gt; at the end of the incoming ACL and send all the log to a syslog server to inspect what else is being blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 31 Dec 2009 04:02:31 GMT</pubDate>
    <dc:creator>Jerry Ye</dc:creator>
    <dc:date>2009-12-31T04:02:31Z</dc:date>
    <item>
      <title>ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380498#M798542</link>
      <description>&lt;P&gt;I can't get through the firewall on port 5052. I'm using firezilla and it says that it does not recognize an unroutable address. it works over the vpn so it's something to do with the asa.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380498#M798542</guid>
      <dc:creator>dlove</dc:creator>
      <dc:date>2019-03-11T16:52:54Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380499#M798543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have firewall rules opened for this port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Dec 2009 23:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380499#M798543</guid>
      <dc:creator>Jerry Ye</dc:creator>
      <dc:date>2009-12-30T23:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380500#M798544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. A static and an access list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Dec 2009 00:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380500#M798544</guid>
      <dc:creator>dlove</dc:creator>
      <dc:date>2009-12-31T00:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380501#M798545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming static means static NAT. With limited information, I can only suggest two things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Make sure all routing is correct when access through the firewall. Verify it with ping and traceroute&lt;/P&gt;&lt;P&gt;2) Remove FTP inspection (fixup) and re-test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Dec 2009 02:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380501#M798545</guid>
      <dc:creator>Jerry Ye</dc:creator>
      <dc:date>2009-12-31T02:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380502#M798546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is all I have right now. I tried removing inspect with no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list incoming extended permit tcp any host 68.216.158.101 eq 5052 &lt;BR /&gt;static (inside,outside) tcp 68.216.158.101 5052 192.168.1.171 5052 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Dec 2009 02:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380502#M798546</guid>
      <dc:creator>dlove</dc:creator>
      <dc:date>2009-12-31T02:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380503#M798547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you check your routing? (Not VPN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also try to put a &lt;STRONG&gt;deny ip any any log&lt;/STRONG&gt; at the end of the incoming ACL and send all the log to a syslog server to inspect what else is being blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Dec 2009 04:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380503#M798547</guid>
      <dc:creator>Jerry Ye</dc:creator>
      <dc:date>2009-12-31T04:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: ftp on alternate port</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380504#M798548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wish to pass FTP traffic through your Firewall on NON STANDARD ports, then in order to make it work, please add the following MPF (modular Policy Framework) :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets assume you have FTP server (1.1.1.1) on outside of your ASA , and you have clients in inside which needs to access the server. First of all, remove inspect ftp from global_policy and the proceed as follows for non std FTP inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list FTP extended permit tcp any host 1.1.1.1 range 20 21&lt;/P&gt;&lt;P&gt;access-list FTP extended permit tcp&amp;nbsp; host 1.1.1.1 any range 20 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map class_ftp&lt;/P&gt;&lt;P&gt;match access-list FTP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Policy-map global_policy&lt;/P&gt;&lt;P&gt;class class_ftp&lt;/P&gt;&lt;P&gt;inspect ftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jan 2010 21:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-alternate-port/m-p/1380504#M798548</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-01T21:01:05Z</dc:date>
    </item>
  </channel>
</rss>

