11-30-2018 01:11 PM - edited 02-21-2020 08:31 AM
Hi,
I've published a new FTP over TLS server with Windows 2012 R2 and behind an ASA 5515-X. I'm using Passive mode so I configured ports 21 and the range for PASV to permit FTPS traffic. These are the results:
This is my issue: when I try to connect from another site with a public IP in a subnet other than production and labs (i.e. my home or a cellular network), I can not connect and FileZilla is just stuck at "Connecting to ftpes://x.y.z.13:21..."
That's weird, I checked Access and NAT Rules, I can ping from anywhere to the ASA outside interface, route exists and it's OK, Lab has Internet access, but FTPS server is not visible. The other thing I noticed is that when seeing real-time logs, I can see when connecting, for example, from inside production to the server, but when trying to connect from a public IP like a.b.c.86 (home public IP), nothing appears in logs. It doesn't even tell me if there's a dropped connection.
Am I doing something wrong? Thanks for your help.
11-30-2018 02:39 PM
When you mentioned "new FTP over TLS server with Windows 2012 R2 and behind an ASA 5515-X"
and you have mentioned that mapped IP to x.y.z.13 - that means you have windows 2012 Server inside network IP ?
if that is correct do you have NAT for that to translate from Outside IP to inside IP and Access rules in place ?
if my understand wrong, please correct me.
11-30-2018 02:43 PM
Yeah, I have FTPS on a Windows Server 2012 R2 in my inside network lab. The IP x.y.z.13 is the public IP mapped to the server.
I have my NAT from Outside to Inside and Access Rules correctly placed.
You are correct.
11-30-2018 02:47 PM
what is the inside Server IP, can you post the configuration to suggest.
11-30-2018 03:14 PM
The inside IP of my server is 172.30.16.97.
I attach the current NAT and Access Rules in ASDM. As you can see, FTP network object corresponds to TCP 21 port and PASV object corresponds to ports 30000-40000 for passive mode.
As I said, I can only connect to the server if my FTP client is behind a NAT device with an outside IP in the same subnet of ASA public IP.
12-04-2018 03:46 PM
here is a base CLI port-forwarding config that I always use & manipulate for different requirements
in this case, we are allowing any ip on internet to access public ip of 100. for web server that is natted to internal dmz ip of 172
object network websvr-ext
host 100.1.1.10
object network websvr-int
host 172.16.0.10
nat (dmz,outside) static websvr-ext service tcp 80 80
access-list outside-in ext permit tcp any object websvr-int eq 80
hope that helps
regards, mk
01-03-2019 01:54 PM
Finally, I think I found what was happening. It seems like there was an IP conflict, since all our public IPs are used to publish another services. So what I did was replying the scenario but using only private addresses in both inside and outside interfaces, with another ASA unit for lab purposes.
My test:
Inside network: 192.168.0.0/16
Inside FTP server: 192.168.20.97
FTP Server's external address: 172.30.31.19
* The outside network in this scenario is the labs network.
* Same rules used to publish a secure FTP, including passive ports.
Client testing:
Client 1: 172.30.8.71 (in production network)
Client 2: 172.30.60.10 (VPN client connected to Labs network)
It worked for both.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide