|
Question : Cisco Pix 501 allow ftp
|
|
Ok, I have looked at other topics, cisco docs, and google like a mad man but this is stumping me. I am fairly new to configuring cisco pix so I think I must have made a simple mistake.
I want to allow ftp access from any outside address to a host on my internal network. Quick facts: PPPOE works Outbound access works Cisco Pix 501 6.3(3) Outside address is dynamic assigned by ISP via pppoe (ADSL) I see the cnt rise on my access-list rule and the ftp connection on the remote end does not error and will remain "connected" until I cancel it.
Here is my config:
roxen# show config : Saved : Written by enable_15 at 16:36:45.352 UTC Fri Feb 6 2004 PIX Version 6.3(3) interface ethernet0 10baset interface ethernet1 100full nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password XXXXXX encrypted passwd XXXXXXX encrypted hostname roxen domain-name mysuperdomain.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list 100 permit tcp any any eq ftp pager lines 24 icmp deny any 1 outside mtu outside 1500 mtu inside 1500 ip address outside pppoe setroute ip address inside 172.16.1.1 255.255.255.0 ip audit info action alarm ip audit attack action alarm ip local pool pptp-pool 192.168.1.200-192.168.1.205 pdm location 172.16.0.0 255.255.0.0 inside pdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) interface 172.16.1.6 netmask 255.255.255.255 0 0 access-group 100 in interface outside timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server RADIUS protocol radius aaa-server LOCAL protocol local aaa authentication telnet console LOCAL http server enable http 172.16.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server community supersnmp no snmp-server enable traps floodguard enable sysopt connection permit-pptp auth-prompt prompt Roxen Login auth-prompt accept "" auth-prompt reject "" telnet 172.16.0.0 255.255.0.0 inside telnet timeout 5 ssh 172.16.1.0 255.255.255.0 inside ssh timeout 15 console timeout 0 vpdn group pppoex request dialout pppoe vpdn group pppoex localname [email protected] vpdn group pppoex ppp authentication pap vpdn group vpn accept dialin pptp vpdn group vpn ppp authentication pap vpdn group vpn ppp authentication chap vpdn group vpn ppp authentication mschap vpdn group vpn client configuration address local pptp-pool vpdn group vpn pptp echo 60 vpdn group vpn client authentication local vpdn username [email protected] password ******** vpdn username adam password ******** dhcpd address 172.16.1.5-172.16.1.20 inside dhcpd dns 205.152.191.252 205.125.144.235 dhcpd lease 432000 dhcpd ping_timeout 750 dhcpd domain mysuperdomain.com dhcpd enable inside username adam password XXXXX encrypted privilege 2 terminal width 80 Cryptochecksum:53cbbaf17fb413127d2c23b1442390ef
Any help would be appreciated. Thanks Adam
|
Answer : Cisco Pix 501 allow ftp
|
|
is it possible that your ISP is blocking FTP inbound? Many Broadband ISPs do. Why don't you enable syslog from the pix to the server.
go to: www.syslogd.com and download (free) kiwi's syslogd. Install it as a service on your server and config the pix to log to it. See what the pix is saying about it.
|
|
|