<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5540 FTP problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414266#M857577</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jemal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think on the ASA, you checked what you can, incl CPU, xlate, acl etc... i hope all these parameters are under control.. which IOS version are you running on the ASA ? Did you check for open caveats etc ?&amp;nbsp; Since the DMZs are on subinterfaces, did you check the switchport which is connected to the DMZ interface for errors, duplex issues , stp issues etc ? did you say you just have issues connecting one DMZ to another, when FTP transaction takes place ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Dec 2009 16:52:34 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2009-12-18T16:52:34Z</dc:date>
    <item>
      <title>ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414265#M857575</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt;"&gt;I am having problem on ASA 5540 during FTP data transfer between DMZ's.&amp;nbsp; ASA 5540 is configured one interface for INSIDE, the second for OUTSIDE (internet) and the third interface for three DMZ's by creating subinterfaces. When ever I initiate FTP from INSIDE to one of DMZ's and start data transfer, all other connection from INSIDE to DMZ including traffic to OUTSIDE will be very very slow&amp;nbsp; or some times time out. But when data transfer is finished, every thing will be normal.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I&lt;SPAN style="font-size: 12pt;"&gt; checked the configuration including NAT/PAT, IPS, access-lists but found nothing wrong&lt;/SPAN&gt;. show perfmon also shows normal stats. There is also nothing change on memorey or cpu utilization during the problem.&amp;nbsp; When checking connectivity from the ASA it self&amp;nbsp; to DMZ ,it is also pefect. the problem is only on Inter DMZ communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comment apreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414265#M857575</guid>
      <dc:creator>alhabesha</dc:creator>
      <dc:date>2019-03-11T16:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414266#M857577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jemal&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think on the ASA, you checked what you can, incl CPU, xlate, acl etc... i hope all these parameters are under control.. which IOS version are you running on the ASA ? Did you check for open caveats etc ?&amp;nbsp; Since the DMZs are on subinterfaces, did you check the switchport which is connected to the DMZ interface for errors, duplex issues , stp issues etc ? did you say you just have issues connecting one DMZ to another, when FTP transaction takes place ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 16:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414266#M857577</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2009-12-18T16:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414267#M857579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls. make sure you are following this:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intrface.html#wp1049451"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intrface.html#wp1049451&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;If you use subinterfaces, you typically do not also want the physical interface to pass traffic, because the physical interface passes untagged packets. This property is also true for the active physical interface in a redundant interface pair. Because the physical or redundant interface must be enabled for the subinterface to pass traffic, ensure that the physical or redundant interface does not pass traffic by leaving out the &lt;STRONG class="cBold"&gt;nameif&lt;/STRONG&gt; command. I&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best thing is to collect packet captures and see what he issue may be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture command has a match keyword now to make it each to configure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capdmz int dmz match ip ho 10.10.10.1 host 192.168.2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin int inside match ip ho 10.10.10.1 host 192.168.2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh cap capin&lt;/P&gt;&lt;P&gt;sh cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to view the captures and issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear cap capin&lt;/P&gt;&lt;P&gt;cle cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to clear them and collect fresh packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Dec 2009 17:38:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414267#M857579</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-18T17:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414268#M857582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA software version running is&amp;nbsp; 8.0(3). Yes I have checked ports both on the switch and ASA for errors,duplex issues....which shows normal status.&lt;/P&gt;&lt;P&gt;The issue is&amp;nbsp; when ever there is FTP transaction from one of DMZ servers to INSIDE, all other traffic (except the already opened&amp;nbsp; ftp data transaction) in inter DMZ communication like from INSIDE to other DMZ's and OUTSIDE is very very slow(will be above 500ms or time out which was 1ms during normal time). As soon as data transfer is finished and when there is no FTP data transfer, every thing works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;couldn't find open caveats for this spesfic case..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Dec 2009 07:43:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414268#M857582</guid>
      <dc:creator>alhabesha</dc:creator>
      <dc:date>2009-12-19T07:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414269#M857585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ physical interface is not configured with the command &lt;SPAN style="color: #ff0000;"&gt;nameif&lt;/SPAN&gt;.It is configured only on subinterfaces. Atached is partial configuration of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to capture packets (ping and telnet between DMZ's)&amp;nbsp; before and during FTP data transaction, it seems the same on ASA&amp;nbsp; but I can see&amp;nbsp; high latency or time out on nodes during inter DMZ communications when the FTP data transaction occured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;Before FTP data transaction started!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" style="; width: 100%; border: 1px solid #000000"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Header 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Header 2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;C:\&amp;gt;ping 172.16.30.126 -t&lt;BR /&gt;&lt;BR /&gt;Pinging 172.16.30.126 with 32 bytes of data:&lt;BR /&gt;&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=7ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=4ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3ms TTL=252&lt;/TD&gt;&lt;TD&gt;ASA-01(config)# sh capture capin&lt;BR /&gt;44 packets captured&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 11:21:17.848726 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 11:21:17.851274 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 11:21:18.850297 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 11:21:18.851579 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 11:21:19.852494 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 11:21:19.853776 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 11:21:20.852876 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 11:21:20.854173 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 11:21:21.853151 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 10: 11:21:21.854585 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 11: 11:21:22.853532 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 12: 11:21:22.855027 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 13: 11:21:23.853318 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 14: 11:21:23.854585 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;During FTP data transaction!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" style="; width: 100%; border: 1px solid #000000"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Header 1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;TH align="center" style="background-color:#6690BC;" valign="middle"&gt;&lt;SPAN style="color: #ffffff;"&gt;&lt;STRONG&gt;Header 2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Reply from 172.16.30.126: bytes=32 time=3563ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3588ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=259ms TTL=252&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=285ms TTL=252&lt;BR /&gt;Request timed out.&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=3540ms TTL=252&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=109ms TTL=252&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Reply from 172.16.30.126: bytes=32 time=12ms TTL=252&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;/TD&gt;&lt;TD&gt;ASA-01(config)# sh capture capin&lt;BR /&gt;64 packets captured&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 1: 11:26:14.567872 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 11:26:14.570374 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 11:26:19.920362 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 11:26:19.921888 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 11:26:20.921140 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 11:26:20.922590 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 11:26:21.921232 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 11:26:21.922590 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 11:26:26.000015 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 10: 11:26:26.001418 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 11: 11:26:27.000686 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 12: 11:26:27.001922 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 13: 11:26:32.421303 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;BR /&gt;&amp;nbsp; 14: 11:26:32.423012 172.16.30.126 &amp;gt; 192.168.8.214: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 15: 11:26:35.989557 192.168.8.214 &amp;gt; 172.16.30.126: icmp: echo request&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Dec 2009 12:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414269#M857585</guid>
      <dc:creator>alhabesha</dc:creator>
      <dc:date>2009-12-19T12:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414270#M857589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the captures that you posted. ICMP replies were sent out the inside interface but, your host didn't receive it. Why?&lt;/P&gt;&lt;P&gt;I don' t believe this is a firewall problem. What happens after the replies leave the firewall? Can we run a span on the switch? Is there a layer 3 device on the inside doing some sort of QoS/Policing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Dec 2009 14:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414270#M857589</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-19T14:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414271#M857593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&amp;nbsp; Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you said,&amp;nbsp; It was not a firewall problem..There was packet shaper which is directly connected to the inside Interface with policing enabled..when shapping feature is disable from it , every thing works fine..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it realy helps me alot..&lt;/P&gt;&lt;P&gt;Thank you very much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Dec 2009 07:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414271#M857593</guid>
      <dc:creator>alhabesha</dc:creator>
      <dc:date>2009-12-21T07:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5540 FTP problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414272#M857596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very glad to hear. Thanks for rating the post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Dec 2009 13:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5540-ftp-problem/m-p/1414272#M857596</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-21T13:54:13Z</dc:date>
    </item>
  </channel>
</rss>

