<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing encrypted FTP traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326371#M989271</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have 2 choices.&lt;/P&gt;
&lt;P&gt;If you have enough public IPs you can do a static 1:1 nat and filter all ports within outside acl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can create your nat based on ports range like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network FTPsrv&lt;/P&gt;
&lt;P&gt;host&amp;nbsp;10.10.31.159&lt;/P&gt;
&lt;P&gt;object service PassiveFTP&lt;/P&gt;
&lt;P&gt;service tcp destination range 50000&amp;nbsp;51000&lt;/P&gt;
&lt;P&gt;nat (outside,inside) source static any any destination static YourPublicIP&amp;nbsp;FTPsrv&amp;nbsp;services PassiveFTP PassiveFTP&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.10.31.159&amp;nbsp;range 50000&amp;nbsp;51000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll need to create another 2 nat for other ports 21 and 990.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you test that and let me know?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2018 02:45:07 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-02-07T02:45:07Z</dc:date>
    <item>
      <title>Allowing encrypted FTP traffic</title>
      <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326175#M989270</link>
      <description>&lt;DIV style="-en-clipboard: true;"&gt;When I create a simple FTP entry, this works:&lt;/DIV&gt;
&lt;DIV&gt;object network BH&lt;/DIV&gt;
&lt;DIV&gt;host 99.199.xx.xx&lt;/DIV&gt;
&lt;DIV&gt;!&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;object network FTP_APACHE01&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;host 10.10.31.159&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;nat (inside,BH) static interface service tcp ftp ftp&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;access-list BH extended permit tcp any host 10.10.31.159 eq ftp&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;I'm able to connect with FTP from outside the company.&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="line-height: 1.45;"&gt;However, when trying to create an encrypted FTP allowance, it's a PAIN.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;We're using FileZilla to create an FTPS (FTP over TLS support)&amp;nbsp;&lt;SPAN style="line-height: 1.45;"&gt;with the following configuration:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;Allow the following ports to 10.10.31.159:&lt;/DIV&gt;
&lt;DIV&gt;Port 21&lt;/DIV&gt;
&lt;DIV&gt;Port 990&lt;/DIV&gt;
&lt;DIV&gt;Passive custom port range: 50000-51000&lt;/DIV&gt;
&lt;DIV&gt;Internal IP: 10.10.31.159&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;How do I configure the Cisco ASA 5510 v9.1 to allow FTPS from outside our firewall?&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Any help would be appreciated...&lt;/DIV&gt;
&lt;DIV&gt;Thanks&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt; &lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326175#M989270</guid>
      <dc:creator>greatbay1</dc:creator>
      <dc:date>2020-02-21T15:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing encrypted FTP traffic</title>
      <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326371#M989271</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have 2 choices.&lt;/P&gt;
&lt;P&gt;If you have enough public IPs you can do a static 1:1 nat and filter all ports within outside acl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can create your nat based on ports range like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network FTPsrv&lt;/P&gt;
&lt;P&gt;host&amp;nbsp;10.10.31.159&lt;/P&gt;
&lt;P&gt;object service PassiveFTP&lt;/P&gt;
&lt;P&gt;service tcp destination range 50000&amp;nbsp;51000&lt;/P&gt;
&lt;P&gt;nat (outside,inside) source static any any destination static YourPublicIP&amp;nbsp;FTPsrv&amp;nbsp;services PassiveFTP PassiveFTP&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.10.31.159&amp;nbsp;range 50000&amp;nbsp;51000&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You'll need to create another 2 nat for other ports 21 and 990.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you test that and let me know?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 02:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326371#M989271</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-02-07T02:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing encrypted FTP traffic</title>
      <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326649#M989272</link>
      <description>&lt;P&gt;Ok, I'm trying your config entry&lt;BR /&gt;&lt;BR /&gt;==&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;description outside&lt;BR /&gt;nameif &lt;STRONG&gt;BH&lt;/STRONG&gt;&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 99.199.xx.xx 255.255.255.248 standby 99.199.xx.xx&lt;BR /&gt;!&lt;BR /&gt;object network &lt;STRONG&gt;BH_Interface&lt;/STRONG&gt;&lt;BR /&gt;host 99.199.xx.xx&lt;BR /&gt;!&lt;BR /&gt;object network FTP_APACHE01&lt;BR /&gt;host 10.10.31.159&lt;BR /&gt;object service PassiveFTP&lt;BR /&gt;service tcp destination range 50000 51000&lt;BR /&gt;nat (BH,inside) source static any any destination static BH_Interface FTP_APACHE01 service PassiveFTP PassiveFTP&lt;BR /&gt;!&lt;BR /&gt;access-list BH extended permit tcp any host 10.10.31.159 range 50000 51000&lt;BR /&gt;==&lt;BR /&gt;&lt;BR /&gt;I entered "object network FTP_APACHE01", that goes through.&lt;BR /&gt;I entered "object service PassiveFTP", that goes through.&lt;BR /&gt;&lt;BR /&gt;However, when I try your following config line:&lt;BR /&gt;nat (&lt;STRONG&gt;outside&lt;/STRONG&gt;,inside) source static any any destination static &lt;STRONG&gt;YourPublicIP&lt;/STRONG&gt; FTPsrv services PassiveFTP PassiveFTP&lt;BR /&gt;Here's mine:&lt;BR /&gt;nat (&lt;STRONG&gt;BH&lt;/STRONG&gt;,inside) source static any any destination static &lt;STRONG&gt;BH_Interface&lt;/STRONG&gt; FTP_APACHE01 service PassiveFTP PassiveFTP&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;GBSP-FW1(config-service-object)# nat (&lt;STRONG&gt;BH&lt;/STRONG&gt;,inside) source static any any destination static &lt;STRONG&gt;BH_Interface&lt;/STRONG&gt; FTP_APACHE01 service PassiveFTP PassiveFTP&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;ERROR: Address 99.199.xx.xx overlaps with BH interface address.&lt;/FONT&gt;&lt;BR /&gt;ERROR: NAT Policy is not downloaded&lt;BR /&gt;GBSP-FW1(config)#&lt;BR /&gt;&lt;BR /&gt;What I'm I missing?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 13:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3326649#M989272</guid>
      <dc:creator>greatbay1</dc:creator>
      <dc:date>2018-02-07T13:15:30Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing encrypted FTP traffic</title>
      <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3327160#M989273</link>
      <description>Please share your config to see why it's complaining about overlap. Sure there's because it pops up this message but don't have your config to help you adapt the config</description>
      <pubDate>Thu, 08 Feb 2018 00:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3327160#M989273</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-02-08T00:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing encrypted FTP traffic</title>
      <link>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3330419#M989274</link>
      <description>&lt;DIV style="-en-clipboard: true;"&gt;After doing much research and talking to&amp;nbsp;management, we found it much easier to use SFTP.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;I found a little simple FTP server that uses both FTPS and SFTP. It's called FreeFTPd (&lt;A href="http://www.freesshd.com/?ctt=download" target="_blank"&gt;http://www.freesshd.com/?ctt=download&lt;/A&gt;), and it's FREE.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;It uses a single port for the connection and the traffic is encrypted.&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="font-weight: bold;"&gt;Cisco ASA&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;conf t&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;!&lt;/SPAN&gt; &lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; font-weight: bold;"&gt;Step 1. create network object&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;! Cisco ASDM ver. 7.4&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;! ASA Version 9.1(6)1&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;object network FTP_APACHE01&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&amp;nbsp;host 10.10.31.159&lt;/DIV&gt;
&lt;DIV&gt;object network FTP_APACHE01_990&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&amp;nbsp;host 10.10.31.159&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;exit&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;!&lt;/SPAN&gt; &lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; font-weight: bold;"&gt;Step 2. create nat policy&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;object network FTP_APACHE01&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&amp;nbsp;nat (inside,BH) static interface service tcp ftp ftp&lt;/DIV&gt;
&lt;DIV&gt;object network FTP_APACHE01_990&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&amp;nbsp;nat (inside,BH) static interface service tcp 990 990&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;exit&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;!&lt;/SPAN&gt; &lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; font-weight: bold;"&gt;Step 3. create the access rule or firewall access&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;access-list BH extended permit tcp any host 10.10.31.159 eq ftp log&lt;/DIV&gt;
&lt;DIV&gt;access-list BH extended permit tcp any host 10.10.31.159 eq 990&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"&gt;end&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN style="font-weight: bold;"&gt;VERIFY FTP&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;packet-tracer input BH tcp 172.217.14.174 4444 99.199.xx.xx 21&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;packet-tracer input BH tcp 172.217.14.174 4444 99.199.xx.xx 990&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;capture FTP_TEST interface BH match tcp any any eq 21&lt;/DIV&gt;
&lt;DIV&gt;show capture FTP_TEST&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;capture FTP_TEST_990 interface BH match tcp any any eq 990&lt;/DIV&gt;
&lt;DIV&gt;show capture FTP_TEST_990&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;==&lt;/DIV&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SFTP-setting_01.jpg" style="width: 581px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7497i6FEAD22D8D9891E8/image-size/large?v=v2&amp;amp;px=999" role="button" title="SFTP-setting_01.jpg" alt="SFTP-setting_01.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SFTP-setting_02.jpg" style="width: 558px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/7498i18DA79456A959681/image-size/large?v=v2&amp;amp;px=999" role="button" title="SFTP-setting_02.jpg" alt="SFTP-setting_02.jpg" /&gt;&lt;/span&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt; &lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2018 21:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-encrypted-ftp-traffic/m-p/3330419#M989274</guid>
      <dc:creator>greatbay1</dc:creator>
      <dc:date>2018-02-13T21:23:57Z</dc:date>
    </item>
  </channel>
</rss>

