We are migrating from ASA 5525 to FTD 2110 running FTD/FMC 184.108.40.206 and cannot seem to get active-mode FTP to work through the FTD for a client on the inside connecting to an external Internet server on the outside. The initial control channel works, but the data channel fails to connect (passive-mode FTP works ok). With our ASA, as long as "inspect ftp" is enabled, the data channel gets pin holed through and NAT rewrite also occurs and active-mode FTP works. I cannot seem to get the same functionality with the FTD. I have confirmed that "inspect-ftp" is in the global_policy, and have used either a port 21 match and/or an FTP application match in my ACP, and it still does not work with active-mode. I also, read that another option is to use a prefilter/fastpath to bypass Snort, but this isn't working either. I am suspecting a NAT issue, as I see the following in a Capture w/Trace:
Action: drop Drop-reason: (nat-no-xlate-to-pat-pool) Connection to PAT address without pre-existing xlate
The NAT is an auto NAT with PAT configured the same as we have on our ASA. Has anyone else successfully configured active-mode FTP through an FTD, and can offer some insight into what may be going on here?
For all versions of the Email Security Appliance (ESA) and Security Management Appliance (SMA), some Secure Sockets Link (SSL) certificates issued from the QuoVadis root certificate authority (CA) trust chain before 2021-03-31 cannot b...
Automation and programmability for networking and security are increasingly important topics. Every release since ISE 1.2 has included new REST API capabilities to better automate and integrate ISE with the rest of your network, appli...
The latest iteration (v2.3.4) of the Cisco Secure Firewall Migration Tool adds public beta support for S2S VPN migrations from ASA:
Policy-based (crypto map) Pre-Shared key authentication type VPN configuration to Firepower Management Center
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
This document presents the ISE data limiting best practices that can dramatically improve the system performance on ISE.
Your deployment may be impacted if the alarms tab on ISE shows High load average, high CPU or high memoy usage alarm...