03-10-2016 05:05 AM - edited 03-12-2019 06:09 PM
Hello
I have a ASA 5508 and internal server. I want to NAT an internal IP for FTP to an external IP.
The problem is that i cannot access th FTP server from outside.
I have this config
nat (Internal_Network,outside) static 188.20.243.230 net-to-net service tcp ftp ftp
access-list outside_access_in_1 line 4 extended permit tcp any any eq ftp (hitcnt=0) 0x2428bf2e
access-list outside_access_in_1 line 5 extended permit tcp any any eq ftp-data (hitcnt=0) 0x1469fea0
The outside interface has an other global IP with 91.114.x.x
so what´s the problem?
Thanks
Solved! Go to Solution.
03-10-2016 08:23 AM
Hi Raimund,
Please configure 'ciscoasa(config)# arp permit-nonconnected' as Server's Mapped IP is in different subnet then ASA's Outside Interface IP.
Hope it helps.
Regards,
Akshay Rastogi
Remember to rate helpful posts.
03-10-2016 05:17 AM
Are you using Active FTP or Passive FTP?
Can you please share the output of
packet-tracer input
show run all policy-map
Regards,
Dinesh Moudgil
P.S. Please rate helpful posts.
03-10-2016 06:55 AM
I have now active FTP So port 20 and 21
Firewall# packet-tracer input outside tcp 5.5.5.5 2332 188.20.243.230 21 detai$
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
object network FreeNAS
nat (Internal_Network,outside) static 188.20.243.230 net-to-net service tcp ftp ftp
Additional Information:
NAT divert to egress interface Internal_Network
Untranslate 188.20.243.230/21 to 192.168.1.30/21
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside_access_in_1 in interface outside
access-list outside_access_in_1 extended permit tcp any object FTP-Server eq ftp
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7fffc579aeb0, priority=13, domain=permit, deny=false
hits=2, user_data=0x7fffbe26af80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=192.168.1.30, mask=255.255.255.255, port=21, tag=any, dscp=0x0
input_ifc=outside, output_ifc=any
Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7fffc51a0180, priority=0, domain=nat-per-session, deny=false
hits=482716, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7fffb89abd00, priority=0, domain=inspect-ip-options, deny=true
hits=778469, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=outside, output_ifc=any
Phase: 5
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7fffb8faf170, priority=13, domain=ipsec-tunnel-flow, deny=true
hits=707187, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=outside, output_ifc=any
Phase: 6
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (Internal_Network,outside) source dynamic Internal_Network interface
Additional Information:
Forward Flow based lookup yields rule:
out id=0x7fffb9306f60, priority=6, domain=nat-reverse, deny=false
hits=5, user_data=0x7fffb90ac8f0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=192.168.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0
input_ifc=outside, output_ifc=Internal_Network
Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x7fffc51a0180, priority=0, domain=nat-per-session, deny=false
hits=482718, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 8
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x7fffb8a19f10, priority=0, domain=inspect-ip-options, deny=true
hits=404080, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=Internal_Network, output_ifc=any
Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 3325952, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_translate
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat
Module information for reverse flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_translate
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: Internal_Network
output-status: up
output-line-status: up
Action: allow
03-10-2016 07:17 AM
Hi,
Have you enable FTP
Share the show run policy-map output
Regards,
Aditya
Please rate helpful posts.
03-10-2016 07:40 AM
Firewall# show running-config policy-map
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
!
Firewall#
03-10-2016 07:41 AM
Hi Raimund,
Try using inspection for FTP and then check the traffic:
fixup protocol
Regards,
Aditya
03-10-2016 08:23 AM
Hi Raimund,
Please configure 'ciscoasa(config)# arp permit-nonconnected' as Server's Mapped IP is in different subnet then ASA's Outside Interface IP.
Hope it helps.
Regards,
Akshay Rastogi
Remember to rate helpful posts.
03-10-2016 11:21 PM
This was the problem
Now it works
Thanks a lot
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide