<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP on Non Standard Port - PIX 7 or higher in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863031#M960273</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need the inspection engine, and you will also need to create a new class map for it.  Take a look at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1383679" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1383679&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...which goes into some detail on allowing ftp on port 1056.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kev&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Nov 2007 14:43:41 GMT</pubDate>
    <dc:creator>kagodfrey</dc:creator>
    <dc:date>2007-11-21T14:43:41Z</dc:date>
    <item>
      <title>FTP on Non Standard Port - PIX 7 or higher</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863030#M960272</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having problems trying to get FTP working on sites with ports not 21 ? I have 2 FTP sites on my DMZ - FTP 21 works fine but FTP to say 1400 seems to fail IE doesn't get there.... logs show connectiong through PIX not being denied but then says TCP FIN entry ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried removeing the inspection engine ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863030#M960272</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2019-03-26T00:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTP on Non Standard Port - PIX 7 or higher</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863031#M960273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need the inspection engine, and you will also need to create a new class map for it.  Take a look at:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1383679" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1383679&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...which goes into some detail on allowing ftp on port 1056.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kev&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 14:43:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863031#M960273</guid>
      <dc:creator>kagodfrey</dc:creator>
      <dc:date>2007-11-21T14:43:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTP on Non Standard Port - PIX 7 or higher</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863032#M960274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for point in the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2007 16:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863032#M960274</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-11-21T16:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTP on Non Standard Port - PIX 7 or higher</title>
      <link>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863033#M960275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortantly I'm having problems. I understand the consept however when I try to put it into practise it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have specified the access-list for it and assigned it to the new class. I have added this class to the policy global_default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing has changed thou ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have example config with this theory in ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 17:15:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftp-on-non-standard-port-pix-7-or-higher/m-p/863033#M960275</guid>
      <dc:creator>edw</dc:creator>
      <dc:date>2007-12-13T17:15:55Z</dc:date>
    </item>
  </channel>
</rss>

