Ben Nagy wrote:
> 
> FTP Passive mode should work through those ACLs as well. Passive just means
> that the client starts the ftp-data connection instead of the server.

Actually, this is exactly why it will not work. ;)

The listed ACL's are:

> int ser0
>   ip access-group 110 in
> ...
> 
> ...
> access-list 110 permit tcp any eq ftp host X.X.X.X established
> access-list 110 permit tcp any eq ftp-data host X.X.X.X
> ...
> access-list 110 deny ip any any


You are 100% correct that passive is established from client to server.
The problem is its established from one upper port to another. There is
nothing here to allow inbound SYN=1 < 1023. To fix this, ports 1023-4096
need to be opened inbound to the FTP server as well. 

Just make sure the FTP server does not have anything else listening in
this range (i.e. do a "netstat -a" or "lsof -i" on the FTP server
first). If you do have ports open in this range, create ACL's to block
access to them prior to opening 1023-4096.

Also, the second rule can be changed to "established" for increased
security since in active mode the connection will originate from the
server. Anything hitting this rule should have ACK=1.

Finally, I assume there is also an ACL:
access-list 110 permit tcp any eq ftp host X.X.X.X 

or similar as you need to let in SYN=1 in order to establish the control
channel in the first place. If this is the case, the above listed
"establish" rule is redundant. 

HTH,
Chris
-- 
**************************************
[EMAIL PROTECTED]

* Mastering Cisco Routers
http://www.amazon.com/exec/obidos/ASIN/078212643X/
* Mastering Network Security
http://www.amazon.com/exec/obidos/ASIN/0782123430/
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to