Hello Sihanu,
So the Secure FTP server will be outside your network.....
All you need to do is to open the required TCP ports ( in this case 990) in the interface were the clients are going to be.
Lets focus on the following topology:
PC1------------(inside)ASA(outside)--------------INTERNET---------------SFTP
All you will need to do is if you have an ACL on the inside interface add a line
access-list test permit tcp host PC1 host SFTP eq 990.
I think this document will help:
https://supportforums.cisco.com/docs/DOC-23206
You will need to focus on the scenario 2:
Client on the inside and server on the outside, Server on Passive mode.
Same thing, client initiates the connection on port 990/22, the server agrees and waits for the client to set the port command. Client initiates the connection to the outside world in that n+1 port to the server and everything is going to work fine.
This may sound a little bit complicated, what you need to understand is that the firewall cannot open the Data channel because the Control channel is encrypted. Make sure that the data channel is seeing by the firewall as a regular connection.
Regards,
Do rate all the helpful posts
Julio
Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC