<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftp and pix in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259321#M859026</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have ftp inspection enabled, using either fixup protocols or mpf policies?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(This depends on your code version)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Jul 2009 11:20:22 GMT</pubDate>
    <dc:creator>Stuart Hare</dc:creator>
    <dc:date>2009-07-01T11:20:22Z</dc:date>
    <item>
      <title>ftp and pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259319#M859020</link>
      <description>&lt;P&gt;I have a pix 515E and I am trying to get the ftp server accessile from the outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have an ftp server that is working without any problems but the new ftp server is not accessible from the outside. &lt;/P&gt;&lt;P&gt;my access list is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE1-IN permit tcp any host (public ip) eq ftp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is natted as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside1) (public ip) (inside ip) netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only difference between the two servers is that the working one is in the dmz. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259319#M859020</guid>
      <dc:creator>musumani.woods</dc:creator>
      <dc:date>2019-03-11T15:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: ftp and pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259320#M859023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Musumani,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of software is your PIX running? If it is 7.2(1) or later, take a look at the output of this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside1 tcp 1.1.1.1 1024 &lt;PUBLIC_IP&gt; 21&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/p.html#wp1878788" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/p.html#wp1878788&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should give you a hint as to where the traffic is failing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PIX is running 7.0(1) or later, you might also look at the output of 'show asp drop' for reasons why packets are being dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s2.html#wp1351326" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s2.html#wp1351326&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It might also be worthwhile to setup some captures and see exactly where the connection is failing (i.e. the initial traffic or the return traffic). Here is the command reference for the capture command if you are running 6.2(1) or later:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c1.html#wp2108895" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/c1.html#wp2108895&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jun 2009 18:35:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259320#M859023</guid>
      <dc:creator>robertson.michael</dc:creator>
      <dc:date>2009-06-30T18:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: ftp and pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259321#M859026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have ftp inspection enabled, using either fixup protocols or mpf policies?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fixup protocol ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;(This depends on your code version)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jul 2009 11:20:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259321#M859026</guid>
      <dc:creator>Stuart Hare</dc:creator>
      <dc:date>2009-07-01T11:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: ftp and pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259322#M859027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes I do.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jul 2009 16:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259322#M859027</guid>
      <dc:creator>musumani.woods</dc:creator>
      <dc:date>2009-07-01T16:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: ftp and pix</title>
      <link>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259323#M859028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you using on the PIX? If you are trying to do port redirection I don's see port 21 in the Static NAT statement, you might need something like this (v6.3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside1) tcp (public IP) ftp (inside IP) ftp netmask 255.255.255.255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However on version 7.2 (I believe) you have to state the name of the outside interface instead of the IP i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp outside1 ftp (inside IP) ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is from memeory but I think it's right, unless I have misunderstood your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have port redirection on a 515 running v7.2 for OWA and OMA (HTTPS) so if the above doesn't work I can get the config when I have access and post it here if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jul 2009 17:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-and-pix/m-p/1259323#M859028</guid>
      <dc:creator>marchomden</dc:creator>
      <dc:date>2009-07-01T17:32:11Z</dc:date>
    </item>
  </channel>
</rss>

