It's Apple Filing Protocol (used to be called AppleTalk Filing Protocol). 
It's built into Macintoshes. Third-party vendors such as Thursby Systems 
have it for PCs. It's a typical client/server file sharing solution.

It's not really a great solution unless you have a lot of Macs. Well, 
technically, it is a good solution, but for the PCs you would have to buy 
the software (~$180) and PC bigots might object (just out of ignorance 
though! ;-]

But there are other alternatives to FTP. You could use the built-in PC file 
sharing SMB over TCP/IP. You could use WebDav.

But, to be honest, FTP is pretty ingrained, despite its shortcomings. 
Replacing it could be a hard sell.

Priscilla

At 12:27 AM 11/2/01, J. Johnson wrote:
>Priscilla,
>
>So you used AFP instead of FTP.   Do you mind sending the info on AFP such
>as vendor name,  web site, phone number, etc.?
>
>Thanks.
>
>Jill
>
>""Priscilla Oppenheimer""  wrote in message
>[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Thanks for carrying it through. It's very helpful.
> >
> > And to reiterate what you said in your first message, this one (for
>passive
> > mode when the 192.3.10.10 server is on the local network) is risky
because
> > it has to be non-specific:
> >
> > access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
> >
> > So maybe it's best to tell the users not to use passive mode. But then
>they
> > better not have personal firewalls that don't allow the session setup
from
> > the server! I have actually run into situations where there were so many
> > firewalls (network-wide and personal) that we couldn't use FTP. We used
>AFP
> > over TCP instead. (which by the way is much more secure for another
>reason,
> > which is that it encrypts a random number provided by the server with the
> > password. FTP sends the password in clear text.)
> >
> > Anyway, thanks again.
> >
> > Priscilla
> >
> > At 12:49 AM 11/1/01, Jonathan Hays wrote:
> > >Priscilla Oppenheimer wrote:
> > >
> > > > From a book that I am working on. The figures would help, but you'll
>have
> > > > to buy the book for that! ;-)
> > >
> > >
> > >
> > >Thanks. Good info! And a good reminder for people like me who have been
> > >working on
> > >non-Cisco projects and are getting rusty on our access list skills.  8-)
> > >
> > >For closure (often synonymous with "getting the last word"   ) I will
>work
> > >through
> > >the typical FTP access list entries in light of Priscilla's excellent
> > >description.
> > >Experienced folks will probably be bored reading this and I tend to be
> > >repetitive for
> > >the sake of beginners (but I welcome comments of any type from anyone).
> > >
> > >Recall that our scenario involves giving Internet users access to the
FTP
> > >server sitting
> > >on our LAN. Let's assume the access list will be applied with
>"access-group
> > >in"  to the
> > >router's WAN connection, say serial 0.
> > >
> > >Let's start with the Active mode case.
> > >
> > >Referring to Priscilla's description, in step 1 the FTP conversation is
> > >initiated from
> > >the Internet client using an ephemeral source port (greater than 1023)
to
> > >the FTP server
> > >(192.3.10.10) listening on port 21 (destination port). Since we need to
> > >allow that first
> > >TCP SYN to come through we cannot use the "established" keyword. The
>"any"
> > >in our access
> > >list is for the Internet client and "192.3.10.10" is the FTP server. The
> > >first access
> > >list entry is
> > >
> > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 21
> > >
> > >Now for the ftp data connection. In step 4 the client sends the PORT
>command
> > >to the FTP
> > >server along with the ephemeral port number to be used for the FTP data
> > >(port 20)
> > >connection. In step 5 the FTP server on the LAN initiates the TCP
>connection
> > >(SYN) to
> > >the Internet-based client. This initial packet will not need an access
>list
> > >entry since
> > >there is no access list on packets going _out_ serial 0, only for those
> > >coming in.
> > >However, we must let the client SYN ACK response through (and other port
>20
> > >packets from
> > >the Internet). At this point, the client's packets will obviously have
>the
> > >ACK (or RST)
> > >bit set and will use source port gt 1023, destination port 20. The
>necessary
> > >access list
> > >entry is
> > >
> > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 20
established
> > >
> > >In the case of Passive mode, the client initiates the data connection so
>we
> > >can't use
> > >the "established" keyword, as I mistakenly did in a previous post. In
> > >passive mode step
> > >4 the Internet client issues the PASV command and the server supplies an
> > >ephemeral port
> > >to initiate the connection. To let this packet into serial 0 on our
>router
> > >the access
> > >list entry is
> > >
> > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
> > >
> > >-----
> > >Let's look at the reverse scenario, which is also very common. Suppose
we
> > >were trying to
> > >allow FTP access from clients on an internal network (say 192.3.10.0/24)
>to
> > >FTP servers
> > >outside on the Internet. Let's keep our focus on the packets coming in
>and
> > >use the same
> > >"access-group in" on serial 0 as before. In this case "any" refers to
the
> > >responding
> > >Internet FTP servers and "192.3.10.0  0.0.0.255" refers to the
initiating
> > >FTP clients on
> > >our LAN. The access lists would look like this
> > >
> > >access-list 110 permit tcp any  eq 21 192.3.10.0 0.0.0.255 gt 1023
> > >established
> > >access-list 110 permit tcp any  eq 20 192.3.10.0 0.0.0.255 gt 1023
> > >access-list 110 permit tcp any gt 1023 192.3.10.0 0.0.0.255  gt 1023
> > >established
> > >
> > >Compared to the previous scenario, notice that the source and
destination
> > >haven't
> > >changed (athough I changed "host 192.3.10.10" to "192.3.10.0 
0.0.0.255")
> > >but the ports
> > >are swapped between source and destination in each access list. Also,
the
> > >lack of or
> > >existence of the "established" keyword is reversed.
> > >
> > >In the first list entry the client on the LAN has initiated the
>connection
> > >and we need
> > >to allow FTP control (port 21) packets from Internet FTP servers through
>if
> > >they have
> > >the ACK or RST bit set. The second entry allows the FTP server to
>initiate a
> > >data
> > >connection (source port 20) to the client's ephemeral port on the LAN,
so
>we
> > >drop the
> > >"established" keyword. For the third entry, since the client is
>initiating
> > >passive mode
> > >FTP we let "established" FTP data connection packets from the server
> > through.
> > >
> > >Hope no one fell asleep.  ;-)
> > >
> > >Jonathan
> > ________________________
> >
> > Priscilla Oppenheimer
> > http://www.priscilla.com
________________________

Priscilla Oppenheimer
http://www.priscilla.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=25032&t=24525
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to