Thank you very much, Priscilla.

Jill

""Priscilla Oppenheimer""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> From a book that I am working on. The figures would help, but you'll have
> to buy the book for that! ;-)
>
> FTP Active Mode
> 1 The client sends a TCP SYN to the well-known FTP control port (port 21)
> on the server. The client uses an ephemeral port as its source port.
> (Ephemeral means short-lived, not well-known, and greater than 1023.)
> 2 The server sends the client a SYN ACK from port 21 to the ephemeral port
> on the client.
> 3 The client sends an ACK. The client uses this connection to send FTP
> commands, and the server uses this connection to send FTP replies.
> 4 When the user requests a directory listing or initiates the sending or
> receiving of a file, the client software sends a PORT command that
includes
> an ephemeral port number that the client wishes the server to use when
> opening the data connection.
> 5 The server sends a SYN from port 20 (FTP data) to the client's ephemeral
> port number, which was provided to the server in the client's PORT
command.
> 6 The client sends a SYN ACK from its ephemeral port to port 20.
> 7 The server sends an ACK.
> 8 The host that is sending data uses this new connection to send the data
> in TCP segments, which the other host ACKs. (With some commands, such as
> STOR, the client sends data. With other commands, such as RETR, the server
> sends data.)
> 9 After the data transfer is complete, the host sending data closes the
> data connection with a FIN, which the other host ACKs. The other host also
> sends its own FIN, which the sending host ACKs.
> 10 The client can send more commands on the control connection, which may
> cause additional data connections to be opened and then closed. At some
> point, when the user is finished, the client closes the control connection
> with a FIN. The server ACKs the client's FIN. The server also sends its
own
> FIN, which the client ACKs.
>
>
> FTP Passive Mode
> The steps for passive FTP are described in the following list. Steps 1-3
> are the same as the first three steps for active mode. Also, steps 9-11
are
> the same as the last three steps for active mode.
> 1 The client sends a TCP SYN to the well-known FTP control port (port 21)
> on the server. The client uses an ephemeral port as the source port.
> 2 The server sends the client a SYN ACK from port 21 to the ephemeral port
> on the client.
> 3 The client sends an ACK. The client uses this connection to send FTP
> commands, and the server uses the connection to send FTP replies.
> 4 When the user requests a directory listing or initiates the sending or
> receiving of a file, the client software sends a PASV command to the
server
> indicating the desire to enter passive mode.
> 5 The server replies. The reply includes an ephemeral port number that the
> client should use when opening the connection for data transfer.
> 6 The client sends a SYN from a client-selected ephemeral port to the
> server's ephemeral port number, which was provided to the client in the
> reply to the client's PASV command.
> 7 The server sends a SYN ACK from its ephemeral port to the client's
> ephemeral port.
> 8 The client sends an ACK.
> 9 The host that is sending data uses this new connection to send the data
> in TCP segments, which the other host ACKs. (With some commands, such as
> STOR, the client sends data. With other commands, such as RETR, the server
> sends data.)
> 10 After the data transfer is complete, the host sending data closes the
> data connection with a FIN, which the other host ACKs. The other host also
> sends its own FIN, which the sending host ACKs.
> 11 The client can send more commands on the control session, which may
> cause additional data connections to be opened and then closed. At some
> point, when the user is finished, the client closes the control connection
> with a FIN. The server ACKs the client's FIN. The server also sends its
own
> FIN, which the client ACKs.
>
> Priscilla
>
>
> At 12:34 AM 10/31/01, Jill Johnson wrote:
> >Thank you very much for all your help.
> >
> >I still don't quite understand about the Passive Mode.
> >
> >The idea of setting up this access-list is for the users to dial in from
> >home and to be
> >able to do FTP to the servers at work.
> >
> >Thanks.
> >
> >Jill
> >
> >Jonathan Hays wrote:
> >
> > > Priscilla Oppenheimer wrote:
> > >
> > > > If it's not passive mode, the data channel is initiated by the
server
> >from
> > > > port 20 (FTP data) to the ephemeral port provided by the client in
its
> >PORT
> > > > command. Ephemeral just means a short-lived port with a number
greater
> >than
> > > > 1023.
> > > >
> > > > If it is passive mode, then the data channel is initiated by the
client
> > > > from an ephemeral port to an ephemeral port provided by the server
in
> its
> > > > PASV command.
> > > >
> > > > In other words, access lists with FTP are tricky.
> > > >
> > > > Priscilla
> > > >
> > > > At 03:14 PM 10/30/01, Jonathan Hays wrote:
> > > > >Don't we also want a ACL line for the ftp data channel?
> > > > >
> > > > >access-list 110 permit tcp any host 192.3.10.10 eq ftp-data
> > > > >
> > > > >And if the server is using passive ftp
> > > > >
> > > > >access-list 110 permit tcp any host 192.3.10.10 gt 1023 established
> > >
> > > Oops, you're right! I'm getting a bit rusty...
> > >
> > > The "ftp-data" entry would allow data connections from an external ftp
> > > server to ftp
> > > sessions initiated by the LAN client which is not what the original
> poster
> > > wanted.
> > >
> > > However, the "gt 1023 established" entry should allow access for
Internet
> > > clients to the
> > > LAN ftp server doing passive ftp. But it does open things up a bit too
> much
> > > for the
> > > comfort of most paranoid sysadmins.
> ________________________
>
> Priscilla Oppenheimer
> http://www.priscilla.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=24951&t=24525
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to