<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Implicit Rule prevents FTP from ASA to adjacent server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3350968#M981553</link>
    <description>&lt;P&gt;Thanks for your reply, I was more interested in how to interpret the packet-tracer output.&amp;nbsp; But the command that fails is:&lt;/P&gt;
&lt;P&gt;copy disk0: ftp:&lt;/P&gt;
&lt;P&gt;I can ping the destination but no ftp packets leave the firewall - the config is above&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Rich&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ps any ideas where to find documentation on packet-tracer output?&lt;/P&gt;</description>
    <pubDate>Mon, 19 Mar 2018 16:01:05 GMT</pubDate>
    <dc:creator>richard-ziga</dc:creator>
    <dc:date>2018-03-19T16:01:05Z</dc:date>
    <item>
      <title>Implicit Rule prevents FTP from ASA to adjacent server</title>
      <link>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3347963#M981544</link>
      <description>&lt;P&gt;This is my lab, I need to transfer files to and from my ftp server filezilla, I am running this on GNS3 and doing a wire shark capture I see no ftp packets leaving the firewall - I don't know how to interpret the output from phase 2...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa/act# packet-tracer in log tcp 192.168.65.3 ftp 192.168.65.1 ftp de&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.65.1 using egress ifc&amp;nbsp; log&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;in&amp;nbsp; id=0x7f605d9651f0, priority=501, domain=permit, deny=true&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=16, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.65.3, mask=255.255.255.255, port=0, tag=any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=log, output_ifc=any&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: log&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: log&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;ciscoasa/act#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;#########################################&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA Version 9.8(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name zigalab.com&lt;BR /&gt;enable password &lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd iWqg9uTDs.mRfZdK encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool engineering 10.2.0.50-10.2.0.100 mask 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif log&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.65.3 255.255.255.0 standby 192.168.65.4 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif test&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.2.2.1 255.255.255.0 standby 10.2.2.3 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;nameif Webservers&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.2.0.155 255.255.255.0 standby 10.2.0.156 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;&amp;nbsp;nameif HA-link&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.1 255.255.255.0 standby 10.0.0.3 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Webservers&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name zigalab.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Ubuntu&lt;BR /&gt;&amp;nbsp;host 192.168.56.1&lt;BR /&gt;object network Webservers&lt;BR /&gt;&amp;nbsp;range 10.2.0.11 10.2.0.33&lt;BR /&gt;object-group network UbuntuDev&lt;BR /&gt;&amp;nbsp;network-object object Ubuntu&lt;BR /&gt;access-list InternalSubnets standard permit 10.2.0.0 255.255.255.0 &lt;BR /&gt;access-list to-log extended permit ip any any log &lt;BR /&gt;access-list allow-all extended permit ip any any log &lt;BR /&gt;access-list out-log extended permit ip any any log &lt;BR /&gt;pager lines 23&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list notif-cfg-changes level warnings&lt;BR /&gt;logging list notif-cfg-changes message 111008-111010&lt;BR /&gt;logging list buffer-logging message 106001-106102&lt;BR /&gt;logging buffer-size 64000&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap warnings&lt;BR /&gt;logging history warnings&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging host log 192.168.65.50&lt;BR /&gt;logging debug-trace&lt;BR /&gt;logging message 106007 level warnings&lt;BR /&gt;logging message 113008 level warnings&lt;BR /&gt;logging message 113012 level warnings&lt;BR /&gt;logging message 611101 level warnings&lt;BR /&gt;logging message 605005 level warnings&lt;BR /&gt;logging message 111009 level warnings&lt;BR /&gt;logging message 111008 level warnings&lt;BR /&gt;logging message 111010 level warnings&lt;BR /&gt;mtu log 1500&lt;BR /&gt;mtu test 1500&lt;BR /&gt;mtu Webservers 1500&lt;BR /&gt;mtu HA-link 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface HA-asdm-link GigabitEthernet0/2&lt;BR /&gt;failover link HA-asdm-link GigabitEthernet0/2&lt;BR /&gt;failover interface ip HA-asdm-link 10.7.7.1 255.255.255.0 standby 10.7.7.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;access-group to-log in interface log&lt;BR /&gt;access-group out-log out interface log&lt;BR /&gt;access-group allow-all global&lt;BR /&gt;route log 0.0.0.0 0.0.0.0 192.168.56.1 1&lt;BR /&gt;route log 0.0.0.0 0.0.0.0 192.168.65.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authorization exec LOCAL auto-enable&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.56.0 255.255.255.0 log&lt;BR /&gt;http 192.168.65.0 255.255.255.0 log&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;no validation-usage&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0_VPNlab&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=ciscoasa&lt;BR /&gt;&amp;nbsp;keypair vpnlabkey&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;&amp;nbsp;auto-import&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0_VPNlab&lt;BR /&gt;&amp;nbsp;certificate 5e9c6f5a&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308202ee 308201d6 a0030201 0202045e 9c6f5a30 0d06092a 864886f7 0d01010b &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003039 3111300f 06035504 03130863 6973636f 61736131 24302206 092a8648 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021615 63697363 6f617361 2e7a6967 61686f6d 652e636f 6d301e17 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d313830 31333031 39323735 325a170d 32383031 32383139 32373532 5a303931 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11300f06 03550403 13086369 73636f61 73613124 30220609 2a864886 f70d0109 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02161563 6973636f 6173612e 7a696761 686f6d65 2e636f6d 30820122 300d0609 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2a864886 f70d0101 01050003 82010f00 3082010a 02820101 0086ef37 fc524640 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3137bb2b 8915e593 c01a7e4e e237b280 9403b267 59052365 0fb8e7eb fd4549e3 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 73060935 08cc3dd8 3b464179 d59a83d2 7169dd67 f0844db2 b182e6ee 42f64f1a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9ecdacd8 3c3ff135 a5853260 f3e328a4 c4fa80a3 3a0b8268 6464889e d087bc29 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69298148 54c90c20 e607429f 668f8f76 f09dd5e9 ffa44511 ceba9245 6320add3 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6848af1a 0b679c6b 70b6da23 bc13d38a b4161253 51fb8a8f 07e4aaa3 b7679b97 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c32681ef 1acd0b85 8d03b33c 0c0fdf31 06a2cd59 7be3957a 7985b11b 1f7dc9ba &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9990c47b 4f8d211a 1fe0f567 7a7ac7fb 0710193a f6d76bd9 6870532a 87a42d51 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 53b857ad 356323c9 b07aeb9f 6ad5a683 7a64d8a5 c376f9a7 33020301 0001300d &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 06092a86 4886f70d 01010b05 00038201 01005dde 3eab0bb2 677eb66e d1fac648 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e6b129b4 2bc53fef ffaa7162 93c1bcf3 bfae7107 ef8805cc 5da24fff f2832fc2 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 549010c1 919685e1 d3427eb0 1f1e33aa 07fafbe3 19f8cf98 80785a59 1919bd22 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c3b790d0 6f3af2d1 c438eb17 4cedbed8 4e0660d2 ec671a2e 43baf526 6973978a &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29bef9fc 2de72396 f41a2109 5ee72323 92010e7e 40991ba6 c07f98c5 72e1ace5 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ee5efec3 64bb77d6 d92532b3 3c898ae9 d62a386d 7c125193 080f99c2 93732cdd &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4abc0355 ca9b6dac 530b63da 9bcd069e 65bbf633 31aabeb9 cab53300 35b53846 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aa6d8a53 102d9e93 6c57c586 a8170613 a89aaf3d 09a7fd02 8789e5e2 cea0b4dc &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b8e7a2b4 8112d35f e6e18da4 5ce6c147 0d7c&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet 192.168.56.0 255.255.255.0 log&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 log&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.56.0 255.255.255.0 log&lt;BR /&gt;ssh 192.168.65.0 255.255.255.0 log&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 10.2.0.50-10.2.0.100 Webservers&lt;BR /&gt;dhcpd enable Webservers&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 192.168.65.2&lt;BR /&gt;ssl cipher default custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "RC4-SHA:AES128-SHA:AES256-SHA:DES-CBC3-SHA"&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0_VPNlab&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0_VPNlab log&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable log&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-linux64-4.5.03040-webdeploy-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-4.5.03040-webdeploy-k9.pkg 2&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;&amp;nbsp;tunnel-group-preference group-url&lt;BR /&gt;&amp;nbsp;cache&lt;BR /&gt;&amp;nbsp; disable&lt;BR /&gt;&amp;nbsp;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;group-policy Engineering internal&lt;BR /&gt;group-policy Engineering attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dhcp-network-scope 10.2.0.0&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-client &lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelall&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value InternalSubnets&lt;BR /&gt;&amp;nbsp;default-domain none&lt;BR /&gt;&amp;nbsp;address-pools none&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username vpnuser password $sha512$5000$A+68p6VVTBtpVzJDHZBgEA==$lNEdl0JdvbbW6d+LiVuoXQ== pbkdf2 privilege 15&lt;BR /&gt;username vpnuser attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy Engineering&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username rich password $sha512$5000$bImmacCvYBFNFsraZMjEUA==$6x+eU2KvgJETFcZR3hvc4w== pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_2&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;&amp;nbsp; no tcp-inspection&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname state &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;&amp;nbsp;profile License&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3347963#M981544</guid>
      <dc:creator>richard-ziga</dc:creator>
      <dc:date>2020-02-21T15:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Implicit Rule prevents FTP from ASA to adjacent server</title>
      <link>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3348216#M981548</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please attach the commands you are trying to connect to ftp from ASA, you can refer to the link for transferring files to and from ASA:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/security-documents/asa-upgrade-different-ways-to-load-files-to-flash/ta-p/3126869" target="_blank"&gt;https://supportforums.cisco.com/t5/security-documents/asa-upgrade-different-ways-to-load-files-to-flash/ta-p/3126869&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just check the ftp mode supported on filezilla server as well. Currently on firewall, passive mode is supported. Also, packet-tracer will not help troubleshoot the issue since this is to-the-box traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please paste the command you are trying on ASA and the error message.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;AJ&lt;/P&gt;</description>
      <pubDate>Wed, 14 Mar 2018 08:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3348216#M981548</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-03-14T08:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Implicit Rule prevents FTP from ASA to adjacent server</title>
      <link>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3350968#M981553</link>
      <description>&lt;P&gt;Thanks for your reply, I was more interested in how to interpret the packet-tracer output.&amp;nbsp; But the command that fails is:&lt;/P&gt;
&lt;P&gt;copy disk0: ftp:&lt;/P&gt;
&lt;P&gt;I can ping the destination but no ftp packets leave the firewall - the config is above&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Rich&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ps any ideas where to find documentation on packet-tracer output?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Mar 2018 16:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/implicit-rule-prevents-ftp-from-asa-to-adjacent-server/m-p/3350968#M981553</guid>
      <dc:creator>richard-ziga</dc:creator>
      <dc:date>2018-03-19T16:01:05Z</dc:date>
    </item>
  </channel>
</rss>

