Priscilla,

So you used AFP instead of FTP.    Do you mind sending the info on AFP such
as vendor name,  web site, phone number, etc.?

Thanks.

Jill

""Priscilla Oppenheimer""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Thanks for carrying it through. It's very helpful.
>
> And to reiterate what you said in your first message, this one (for
passive
> mode when the 192.3.10.10 server is on the local network) is risky because
> it has to be non-specific:
>
> access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
>
> So maybe it's best to tell the users not to use passive mode. But then
they
> better not have personal firewalls that don't allow the session setup from
> the server! I have actually run into situations where there were so many
> firewalls (network-wide and personal) that we couldn't use FTP. We used
AFP
> over TCP instead. (which by the way is much more secure for another
reason,
> which is that it encrypts a random number provided by the server with the
> password. FTP sends the password in clear text.)
>
> Anyway, thanks again.
>
> Priscilla
>
> At 12:49 AM 11/1/01, Jonathan Hays wrote:
> >Priscilla Oppenheimer wrote:
> >
> > > From a book that I am working on. The figures would help, but you'll
have
> > > to buy the book for that! ;-)
> >
> >
> >
> >Thanks. Good info! And a good reminder for people like me who have been
> >working on
> >non-Cisco projects and are getting rusty on our access list skills.  8-)
> >
> >For closure (often synonymous with "getting the last word"   ) I will
work
> >through
> >the typical FTP access list entries in light of Priscilla's excellent
> >description.
> >Experienced folks will probably be bored reading this and I tend to be
> >repetitive for
> >the sake of beginners (but I welcome comments of any type from anyone).
> >
> >Recall that our scenario involves giving Internet users access to the FTP
> >server sitting
> >on our LAN. Let's assume the access list will be applied with
"access-group
> >in"  to the
> >router's WAN connection, say serial 0.
> >
> >Let's start with the Active mode case.
> >
> >Referring to Priscilla's description, in step 1 the FTP conversation is
> >initiated from
> >the Internet client using an ephemeral source port (greater than 1023) to
> >the FTP server
> >(192.3.10.10) listening on port 21 (destination port). Since we need to
> >allow that first
> >TCP SYN to come through we cannot use the "established" keyword. The
"any"
> >in our access
> >list is for the Internet client and "192.3.10.10" is the FTP server. The
> >first access
> >list entry is
> >
> >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 21
> >
> >Now for the ftp data connection. In step 4 the client sends the PORT
command
> >to the FTP
> >server along with the ephemeral port number to be used for the FTP data
> >(port 20)
> >connection. In step 5 the FTP server on the LAN initiates the TCP
connection
> >(SYN) to
> >the Internet-based client. This initial packet will not need an access
list
> >entry since
> >there is no access list on packets going _out_ serial 0, only for those
> >coming in.
> >However, we must let the client SYN ACK response through (and other port
20
> >packets from
> >the Internet). At this point, the client's packets will obviously have
the
> >ACK (or RST)
> >bit set and will use source port gt 1023, destination port 20. The
necessary
> >access list
> >entry is
> >
> >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 20 established
> >
> >In the case of Passive mode, the client initiates the data connection so
we
> >can't use
> >the "established" keyword, as I mistakenly did in a previous post. In
> >passive mode step
> >4 the Internet client issues the PASV command and the server supplies an
> >ephemeral port
> >to initiate the connection. To let this packet into serial 0 on our
router
> >the access
> >list entry is
> >
> >access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
> >
> >-----
> >Let's look at the reverse scenario, which is also very common. Suppose we
> >were trying to
> >allow FTP access from clients on an internal network (say 192.3.10.0/24)
to
> >FTP servers
> >outside on the Internet. Let's keep our focus on the packets coming in
and
> >use the same
> >"access-group in" on serial 0 as before. In this case "any" refers to the
> >responding
> >Internet FTP servers and "192.3.10.0  0.0.0.255" refers to the initiating
> >FTP clients on
> >our LAN. The access lists would look like this
> >
> >access-list 110 permit tcp any  eq 21 192.3.10.0 0.0.0.255 gt 1023
> >established
> >access-list 110 permit tcp any  eq 20 192.3.10.0 0.0.0.255 gt 1023
> >access-list 110 permit tcp any gt 1023 192.3.10.0 0.0.0.255  gt 1023
> >established
> >
> >Compared to the previous scenario, notice that the source and destination
> >haven't
> >changed (athough I changed "host 192.3.10.10" to "192.3.10.0  0.0.0.255")
> >but the ports
> >are swapped between source and destination in each access list. Also, the
> >lack of or
> >existence of the "established" keyword is reversed.
> >
> >In the first list entry the client on the LAN has initiated the
connection
> >and we need
> >to allow FTP control (port 21) packets from Internet FTP servers through
if
> >they have
> >the ACK or RST bit set. The second entry allows the FTP server to
initiate a
> >data
> >connection (source port 20) to the client's ephemeral port on the LAN, so
we
> >drop the
> >"established" keyword. For the third entry, since the client is
initiating
> >passive mode
> >FTP we let "established" FTP data connection packets from the server
> through.
> >
> >Hope no one fell asleep.  ;-)
> >
> >Jonathan
> ________________________
>
> Priscilla Oppenheimer
> http://www.priscilla.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=25002&t=24525
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to