<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring an FTP Server behind Cisco in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096474#M915535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm confused then. Why don't you think I'm having any luck with Passive if I've configured ports on the software and firewall for that purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We may end up placing the FTP server in a DMZ and open up incoming 1024+. What do you think of that idea? Is that a terribly unsecure idea? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Aug 2008 18:13:21 GMT</pubDate>
    <dc:creator>briankrontz</dc:creator>
    <dc:date>2008-08-01T18:13:21Z</dc:date>
    <item>
      <title>Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096458#M915504</link>
      <description>&lt;P&gt;I'm trying to configure Serv-U to run in passive mode behind a Cisco ASA 5505. What is the proper way to do this?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096458#M915504</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2019-03-11T13:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096459#M915505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A static NAT entry to reach the FTP server, "inspect ftp" in the policy-map, and allow access to the FTP server in the access list is all you should need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) &lt;GLOBAL ip=""&gt; &lt;INTERNAL server="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/GLOBAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any host &lt;GLOBAL ip=""&gt; eq ftp&lt;/GLOBAL&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can also be done if using PAT instead of NAT. Just change the ACL and the static to use the interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp any interface outside eq ftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp &lt;INTERNAL server="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2008 20:04:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096459#M915505</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-07-31T20:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096460#M915506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm concerned about the passive part of my request. Can you expand on how that will work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We may end up placing the FTP server in a DMZ and open up incoming 1024+. What do you think of that idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2008 20:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096460#M915506</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2008-07-31T20:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096461#M915507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let understand this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Pix/ASA can NOT allow ONLY passive FTP through the firewall&lt;/P&gt;&lt;P&gt;if there is NAT involved.  This is NOT possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you have Linux vsftpd running behind the firewall&lt;/P&gt;&lt;P&gt;serving both Active/Passive.  Let say that your objective&lt;/P&gt;&lt;P&gt;is to allow both Active and Passive FTP for users on the inside&lt;/P&gt;&lt;P&gt;network; however, you want the firewall to allow ONLY passive&lt;/P&gt;&lt;P&gt;ftp from users from the outside (i.e. Internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say the IP address of the Linux vsFTPd server is 192.168.1.1.  &lt;/P&gt;&lt;P&gt;Let say that this server is NAT'ed to 1.1.1.1 by the pix firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenario, Pix can NOT do this.  In this scenario, you have&lt;/P&gt;&lt;P&gt;NO choice but to enable "fixup protocol ftp 21".  If you turn&lt;/P&gt;&lt;P&gt;OFF ftp inspection, nothing will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For situation like this, you need firewalls other than Cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2008 21:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096461#M915507</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-07-31T21:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096462#M915509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Of course; nobody is saying that fixup protocol ftp 21 (or inspect ftp in newer PIX code) is not necessary. Without the firewall doing deep packet inspection of FTP traffic dynamic holes can't be opened in the access list for return traffic so nothing will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am actually don't fully understand what you are saying: on the one hand you say that it is not possible but if you turn on fixup that it will. On the other hand you are saying that you may need firewalls other than Cisco, which I guess means you think it will not work. So I am puzzled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any firewall needs to inspect the FTP control connection to be able to determine what hole to poke on the access list. What is it that you say other firewalls do different than Cisco's?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2008 21:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096462#M915509</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-07-31T21:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096463#M915512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is what I understand:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Linux_FTP_server---(i)--Pix--(o)---FTP_client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP server is serving both Active/Passive FTP.&lt;/P&gt;&lt;P&gt;FTP server is 192.168.1.10/24.  Pix inside IP &lt;/P&gt;&lt;P&gt;is 192.168.1.1/24. Pix outside ip address is&lt;/P&gt;&lt;P&gt;1.1.1.1/24.  FTP_client is 1.1.1.2/24.  FTP_client&lt;/P&gt;&lt;P&gt;connects to FTP server via ip address of 1.1.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requirements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow ONLY Passive FTP through the Pix firwewall.&lt;/P&gt;&lt;P&gt;Active FTP will NOT be allowed through the Pix &lt;/P&gt;&lt;P&gt;firewall.  In other words, Active FTP connection&lt;/P&gt;&lt;P&gt;will be dropped by the Pix firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (i,o) 1.1.1.10 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list External permit ip any any log&lt;/P&gt;&lt;P&gt;access-group External in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix/ASA can NOT do this.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other firewalls vendors such as Checkpoint have the capability&lt;/P&gt;&lt;P&gt;to allow ONLY passive FTP through the firewall with NAT.  I &lt;/P&gt;&lt;P&gt;think Netscreen can do this too but I can't confirm because&lt;/P&gt;&lt;P&gt;I have not touched Netscreen in eight months.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jul 2008 22:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096463#M915512</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-07-31T22:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096464#M915514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My objective is to allow both Active and Passive SSH/SSL/HTTPS FTP to make it easier on my non-technical ftp clients. Thoughts on that? Would I need to do the "fixup"? I'm not sure what that is. I'm a Juniper GUI guy, sorry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rhinosoft, the maker of Serv-U, says that the reason I can only connect with Active is due to a misconfigured Cisco ASA 5505 sitting in front of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my IP and ports routed correctly as far as I can tell:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq 3389 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq ftp &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq https &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq ssh &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 eq 990 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 range 2000 2020 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host x.x.x.35 range 50000 50020&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last two entries are passive port ranges I tried to plug into the software, but they didn't give me any luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We may end up placing the FTP server in a DMZ and open up incoming 1024+. What do you think of that idea? Is that a terribly unsecure idea?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 00:39:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096464#M915514</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2008-08-01T00:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096465#M915516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The problem with the ASA is that fixup is &lt;/P&gt;&lt;P&gt;enabled by default.  Therefore, once you&lt;/P&gt;&lt;P&gt;allow FTP, both active/passive will be &lt;/P&gt;&lt;P&gt;allowed.  In a NAT environment, you can not&lt;/P&gt;&lt;P&gt;stop Active only or passive only FTP.  You&lt;/P&gt;&lt;P&gt;either have to allow both or deny both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know if you understand how Active &lt;/P&gt;&lt;P&gt;and Passive works.  In Active mode, the ftp&lt;/P&gt;&lt;P&gt;server initiates a connection back to the&lt;/P&gt;&lt;P&gt;client sourcing from port 20 to client random&lt;/P&gt;&lt;P&gt;high-ports.  This is a security risk to the&lt;/P&gt;&lt;P&gt;client.  In Passive mode, the client &lt;/P&gt;&lt;P&gt;initiates a connection from it's high ports&lt;/P&gt;&lt;P&gt;to a server random high-ports.  this will&lt;/P&gt;&lt;P&gt;put the server at risk because he has&lt;/P&gt;&lt;P&gt;to allow random high-ports on the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's why in vsftpd or even Microsoft IIS,&lt;/P&gt;&lt;P&gt;you minimize the risk by narrowing the &lt;/P&gt;&lt;P&gt;port-ranges in Passive mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround for all this is Secure Copy&lt;/P&gt;&lt;P&gt;Protocol (SCP) or SecureFTP.  both of these&lt;/P&gt;&lt;P&gt;run on top of SSH which is very secure.&lt;/P&gt;&lt;P&gt;don't need to worry about FTP craps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096465#M915516</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-01T01:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096466#M915517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cisco24x7,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; The problem with the ASA is that fixup is&lt;/P&gt;&lt;P&gt;&amp;gt; enabled by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's actually a positive thing, in my opinion, but if it bothers anyone, or violates the organization's security policy, it can obviously be disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; Therefore, once you&lt;/P&gt;&lt;P&gt;&amp;gt; allow FTP, both active/passive will be&lt;/P&gt;&lt;P&gt;&amp;gt; allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;He already said that he wants to allow both active and passive so this shouldn't be a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; In a NAT environment, you can not&lt;/P&gt;&lt;P&gt;&amp;gt; stop Active only or passive only FTP. You&lt;/P&gt;&lt;P&gt;&amp;gt; either have to allow both or deny both. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not necessarily - you can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in deny tcp any any eq 20&lt;/P&gt;&lt;P&gt;access-list inside_in permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this will prevent active FTP from working but passive FTP will still work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a problem for him, though, since he said that he wants both active and passive FTP. But anyone concerned about allowing active FTP can apply this simple workaround to kill active FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:33:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096466#M915517</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T01:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096467#M915518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm confused then. Why don't you think I'm having any luck with Passive if I've configured ports on the software and firewall for that purpose. I'll include my whole config below so that you can maybe explain where I need to make changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:36:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096467#M915518</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2008-08-01T01:36:11Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096468#M915521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, the deny above is obviously wrong. Should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_in deny tcp any eq 20 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(idea is obviously to prevent the FTP server to establish the outgoing connection from port 20 to the FTP client on the outside.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096468#M915521</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T01:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096469#M915523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.61.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 38.x.x.34 255.255.255.252 &lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name domainname1.com&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 172.16.0.0 255.240.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list domainname2 extended permit ip 192.168.61.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq 3389 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq ftp &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq https &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq ssh &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 eq 990 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 range 2000 2020 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 38.x.x.35 range 50000 50020 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended deny tcp any any eq 6346 &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended deny tcp any any eq 6347 &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended deny udp any any eq 6346 &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended deny udp any any eq 6347 &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 172.31.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 192.168.68.0 255.255.254.0 &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 192.168.212.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 172.30.103.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 192.168.70.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list domainname1 extended permit ip 192.168.61.0 255.255.255.0 192.168.180.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 38.x.x.34 192.168.61.200 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 38.x.x.35 192.168.61.248 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group OUTBOUND in interface inside&lt;/P&gt;&lt;P&gt;access-group INBOUND in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 38.x.x.33 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set to_vpn esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect pptp &lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096469#M915523</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2008-08-01T01:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096470#M915527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configuration looks *almost* good:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 38.x.x.34 192.168.61.200 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This line doesn't make sense - you are NATing 192.168.61.200 to the same IP address of the outside interface of the ASA. That shouldn't be but I don't see why it would affect the problem with FTP not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the FTP server at 192.168.61.248?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should turn on logging to see what is going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096470#M915527</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T01:55:14Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096471#M915530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eloy Paris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;Not necessarily - you can do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inside_in deny tcp any eq 20 any&lt;/P&gt;&lt;P&gt;&amp;gt;access-list inside_in permit ip any any &lt;/P&gt;&lt;P&gt;&amp;gt;access-group inside_in in interface inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;and this will prevent active FTP from &amp;gt;working but passive FTP will still work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this something you've tested and verified&lt;/P&gt;&lt;P&gt;that it works or is it just an "educated"&lt;/P&gt;&lt;P&gt;guess on your part?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you enable "fixup protocol ftp 21" or &lt;/P&gt;&lt;P&gt;ftp inspection, the ACL "access-list inside_in deny tcp any any eq 20" will become&lt;/P&gt;&lt;P&gt;useless when there is NAT.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, what you stated above is true if&lt;/P&gt;&lt;P&gt;there is NO NAT involved.  Again, the minute&lt;/P&gt;&lt;P&gt;you enable "fixup protocol ftp 21" that ACL will be bypassed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An analogy to this is like the command &lt;/P&gt;&lt;P&gt;"sysopt connection permit-ipsec" will bypass&lt;/P&gt;&lt;P&gt;the ACL line applying to the outside interface regarding IPSec.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 01:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096471#M915530</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-01T01:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096472#M915531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cisco24x7,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; Is this something you've tested and verified&lt;/P&gt;&lt;P&gt;&amp;gt; that it works or is it just an "educated"&lt;/P&gt;&lt;P&gt;&amp;gt; guess on your part?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was an "educated" guess on my part, but what you said got me thinking and I'm embarrased to say that the guess wasn't so "educated" and you were right and I was wrong...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; When you enable "fixup protocol ftp 21" or&lt;/P&gt;&lt;P&gt;&amp;gt; ftp inspection, the ACL "access-list&lt;/P&gt;&lt;P&gt;&amp;gt; inside_in deny tcp any any eq 20" &lt;/P&gt;&lt;P&gt;&amp;gt; will become useless when there is NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are absolutely correct in that as soon as you enable fixup protocol ftp, the ACL becomes useless because as soon as the PIX sees in the FTP control session that a session for data is being created it will create a connection for that session. The session will contain all the endpoit information (port 20 of the server to port &amp;gt; 1024 of the client.) Because when a connection is already built in the PIX ACLs are not checked, then as you so eloquently pointed out, the "deny tcp eq 20 any" will not block the data connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies for mudding the waters here; you were right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only part that I still don't follow is why you keep mentioning NAT. One thing is access control (handled by ACLs and protocol fixups) and another NAT. Why do you throw NAT into the mix? Even if we were using nat 0 (no NAT) or identity NAT, things should still work as we've discussed. Are you saying that things will work different when using nat 0 or identity NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 16:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096472#M915531</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T16:41:52Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096473#M915533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FTP_Server---(i)--Pix---(o)----FTP_client&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP_Server=    192.168.1.10/24&lt;/P&gt;&lt;P&gt;Pix inside=    192.168.1.1/24&lt;/P&gt;&lt;P&gt;Pix outside=   1.1.1.1/24&lt;/P&gt;&lt;P&gt;FTP_client=    1.1.1.2/4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FTP_client has default gateway point to 1.1.1.1 which&lt;/P&gt;&lt;P&gt;is the Pix outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let say that you're NOT doing any NAT on the Pix, just&lt;/P&gt;&lt;P&gt;simply route through the Pix:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Requirements:  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allow only Passive FTP through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this situation, it definitely works with this configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;access-list External permit tcp any host 192.168.1.10 eq 21 log&lt;/P&gt;&lt;P&gt;access-list External permit  tcp any host 192.168.1.10 gt 1024 log&lt;/P&gt;&lt;P&gt;access-list Internal deny tcp host 192.168.1.10 eq 20 any log&lt;/P&gt;&lt;P&gt;access-list Internal permit ip any any log&lt;/P&gt;&lt;P&gt;access-group External in interface outside&lt;/P&gt;&lt;P&gt;access-group Internal in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you disable NAT on the Pix and just route through the Pix, &lt;/P&gt;&lt;P&gt;you can control the Active/Passive FTP through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as soon as you enable "fixup protocol ftp 21", you will&lt;/P&gt;&lt;P&gt;will not be able to control Active/Passive FTP.  As a matter&lt;/P&gt;&lt;P&gt;of fact, when you have NAT enable, if you disable fixup, FTP will&lt;/P&gt;&lt;P&gt;fail to work altogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that clear?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 17:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096473#M915533</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-01T17:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096474#M915535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm confused then. Why don't you think I'm having any luck with Passive if I've configured ports on the software and firewall for that purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We may end up placing the FTP server in a DMZ and open up incoming 1024+. What do you think of that idea? Is that a terribly unsecure idea? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 18:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096474#M915535</guid>
      <dc:creator>briankrontz</dc:creator>
      <dc:date>2008-08-01T18:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096475#M915537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt; In this situation, it definitely works with&lt;/P&gt;&lt;P&gt;&amp;gt; this configuration:&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; no fixup protocol ftp 21 &lt;/P&gt;&lt;P&gt;[...]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course, you are disabling the fixup but are manually poling holes in the access lists. This is for sure a valid workaround but is not secure because now the FTP server is not protected on ports &amp;gt; 1024.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; When you disable NAT on the Pix and just &lt;/P&gt;&lt;P&gt;&amp;gt; route through the Pix,&lt;/P&gt;&lt;P&gt;&amp;gt; you can control the Active/Passive FTP &lt;/P&gt;&lt;P&gt;&amp;gt; through the firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assert that you can do this with NAT enabled. The key is disabling the FTP fixup and manually poking holes in the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; However, as soon as you enable&lt;/P&gt;&lt;P&gt;&amp;gt; "fixup protocol ftp 21", you will&lt;/P&gt;&lt;P&gt;&amp;gt; will not be able to control&lt;/P&gt;&lt;P&gt;&amp;gt; Active/Passive FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct, because then the fixup will automatically create the necessary connection, therefore bypassing any access list entries one may have created to control active/passive FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;  As a matter&lt;/P&gt;&lt;P&gt;&amp;gt; of fact, when you have NAT enable, if you &lt;/P&gt;&lt;P&gt;&amp;gt; disable fixup, FTP willfail to work &lt;/P&gt;&lt;P&gt;&amp;gt; altogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the part where I still don't follow - when you have NAT enabled or when you have NAT disabled, FTP will fail to work when you disable the fixup. You need the fixup for FTP to work, with NAT or no NAT, if you don't want to manually poke holes in the access lists. Why do you say that NAT has an influence on whether the fixup works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the same question you posed to me earlier - did you test that disabling/enabling NAT has any effect on whether you can control Active/Passive FTP through the firewall, or it is just an educated guess? &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eloy Paris.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 18:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096475#M915537</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T18:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096476#M915540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you remove the static command I mentioned yesterday didn't look right since it was using as the global IP the same IP of the outside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the private (inside) and public (outside) IP of the FTP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't see anything wrong other than the static but can you post your configuration again?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 18:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096476#M915540</guid>
      <dc:creator>elparis</dc:creator>
      <dc:date>2008-08-01T18:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring an FTP Server behind Cisco</title>
      <link>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096477#M915542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;gt;I assert that you can do this with NAT enabled. The key is disabling the FTP fixup and manually poking holes in the firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is NOT true.  You do not have to take&lt;/P&gt;&lt;P&gt;my words for it.  Just ask your colleagues &lt;/P&gt;&lt;P&gt;at Cisco Systems and they can explain it&lt;/P&gt;&lt;P&gt;to you better than I can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;This is the part where I still don't follow - "when you have NAT enabled or when you have NAT disabled, FTP will fail to work when you disable the fixup. You need the fixup for FTP to work, with NAT or no NAT, if you don't want to manually poke holes in the access lists. Why do you say that NAT has an influence on whether the fixup works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using the same question you posed to me earlier - did you test that disabling/enabling NAT has any effect on whether you can control Active/Passive FTP through the firewall, or it is just an educated guess? ;-)"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't tell people things that I've not tried&lt;/P&gt;&lt;P&gt;and tested it myself.  In other words, I &lt;/P&gt;&lt;P&gt;tested this myself and that's what I observed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you ask Cisco TAC, they will tell you the&lt;/P&gt;&lt;P&gt;same thing I am telling you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2008 18:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-an-ftp-server-behind-cisco/m-p/1096477#M915542</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-08-01T18:54:39Z</dc:date>
    </item>
  </channel>
</rss>

