04-22-2004 07:02 AM - edited 02-20-2020 11:21 PM
I have a question.
I have some clients that use old FTP software. I want to know if I want to open up access to an FTP server do I need to open both:
allow eq ftp
and the high port range from 1024 to 65535
I am not sure if the newer IOS requires me to do the high range.
Let me know.
Thanks,
Chris
04-22-2004 07:23 AM
You should not have to code the high range. The newer ios and pix codes do ftp session-state and will dynamically open up the proper ports depending upon whether passive or port mode ftp is used.
All you need to do is to configure the control session (that is ftp, not ftp-data).
Keeping the high-range opens more holes than you need, so if it is present, I would remove it.
08-10-2004 05:21 AM
Sorry, but I didn't understand how the Pix permit passive ftp.
I have 2 sites, each of them with a pix and "fixup protocol ftp 21" enabled, but only active ftp work without open ports > 1024 on the pix protecting the server ftp.
Since th e2 sites are under my control the security issues are not so important, but now I have to publish the ftp service to outside world (internet), with both active/standard and passive ftp connections.
I read many Cisco CCO documents about fixup and passive ftp but they specified in details only the cases with fix disabled.
I don't understand if fixup open the ftp-data ports only for the standard port #20, so it can't never work with the passive ftp connection schema.
many thanks
Roberto Grassi
08-10-2004 06:17 AM
I have the following for configuration and both active and passive FTP works just fine.
fixup protocol ftp 21
access-list 100 permit tcp any host
access-list 100 permit tcp any host
I know this works as I have some "legacy" ftp clients that use passive ftp to send/retrieve data.
-Cheers
08-24-2004 08:04 AM
I have the same configuration but doesn't work.
Your access-list 100 is applied in inbound on the outside if or in outbound?
For us the problem is to receive passive ftp connection from outside. The logging output of the firewall tell "deny tcp .... by access-list out2in"
It seem the fixup work only for outbound connection and not the the inbound ones.
The router behind the firewall permit any ip from outside to the public IP of the internal ftp server.
On the PIX there is a static one-to-one NAT, not a PAT.
Can you confirm your configuration works fine?
Many thanks
Roberto
08-24-2004 10:02 AM
Do this: (this works for me)
fixup protocol ftp 21
access-list 100 permit tcp any host
access-list 100 permit tcp any host
access-group 100 in interface outside
static (inside,outside)
****
So it is an ACL applied on the outside interface, facing the public Internet, "inbound"...i.e. "in interface outside".
I am not doing PAT and no Global pool. Simple one to one nat on the pix, thats it.
This configuration works fine. I know this as I have some "legacy" FTP clients with mainframes using passive FTP.
Let me know how you make out.
-Chris
08-24-2004 01:35 PM
I'm going crazy with the same configurations my pix does not work,
and according the messages from the pix (at bottom), it is a local
pix trouble.
I'm running a 6.3(4) with the following conf:
fixup protocol ftp 21
access-list out2in line 1 permit tcp any host x.x.x.228 eq www (hitcnt=87)
access-list out2in line 2 permit tcp any host x.x.x.229 eq ftp (hitcnt=12)
access-list out2in line 3 permit tcp any host x.x.x.229 eq ftp-data (hitcnt=0)
access-group out2in in interface outside
static (inside,outside) tcp x.x.x.228 www 192.168.10.202 www netmask 255.255.255.255 0 0
static (inside,outside) x.x.x.229 192.168.10.32 netmask 255.255.255.255 0 0
nat (inside) 0 access-list nonat
nat (inside) 1 192.168.10.0 255.255.255.0 0 0
global (outside) 1 interface
! outside interface ip address is x.x.x.228
When I try to retrive a file o a directory listing, on logging monitor I got
errors like this:
106023: Deny tcp src outside:
I tried also the "fix protocol ftp 21 strict" and without "fixup protocol ftp" and I still can connect to the server although the reference manual tell that without fixup protocol inbound ftp requested are denied
Also note that line 3 of access-list out2in did not increment the counter, although I change from passive to active for testing, and with the active mode listing run fine. Infact without line 3 the active mode run well and the connection from the client to the port no. 20 of the server is correctly opened from fixup protocol.
Many thanks for any other idea.
Roberto
10-01-2004 09:06 AM
Looks like the acl is blocking tcp ports gt than 1024.
10-01-2004 11:50 AM
sorry, we have discover that an upstream router (ISP side) had acl we were unaware of that did not permit the traffic above port 1024.
thanks to all
Roberto
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide