Matthew Dempsky wrote:
The IPsec flow is between the FTP client and the FTP server?  Then by
design, any intermediary will not be able to eavesdrop or alter
packets in transit.
The IPSec flow is between the FTP Client and a LAN, and the packets are then NAT'd to the internet and send to the FTP server. I want to put an IPSEC link between the LAN and the FTP server, but I can't get this in place yet. If I could get this link setup, then there is no issue with the ftp, since there won't be any NAT taking place.

If you're okay with allowing arbitrary outgoing TCP connections and
can live with only allowing clients to use passive FTP (I believe the
default nowadays), then you shouldn't need ftp-proxy at all.
This is correct, passive ftp does work. Active doesn't work because the client puts their IP address into the PORT command, and the server can't connect back to this address. Unfortunately for me their custom application cannot use passive ftp.

Cam

Reply via email to