Thank you very much, Priscilla.

We have a lot of MAC users.  But, I am not fond of MACs.  I tried to learn,
but can
never remember anything about the MACs.   Thanks again.

Jill

Priscilla Oppenheimer wrote:

> It's Apple Filing Protocol (used to be called AppleTalk Filing Protocol).
> It's built into Macintoshes. Third-party vendors such as Thursby Systems
> have it for PCs. It's a typical client/server file sharing solution.
>
> It's not really a great solution unless you have a lot of Macs. Well,
> technically, it is a good solution, but for the PCs you would have to buy
> the software (~$180) and PC bigots might object (just out of ignorance
> though! ;-]
>
> But there are other alternatives to FTP. You could use the built-in PC file
> sharing SMB over TCP/IP. You could use WebDav.
>
> But, to be honest, FTP is pretty ingrained, despite its shortcomings.
> Replacing it could be a hard sell.
>
> Priscilla
>
> At 12:27 AM 11/2/01, J. Johnson wrote:
> >Priscilla,
> >
> >So you used AFP instead of FTP.   Do you mind sending the info on AFP such
> >as vendor name,  web site, phone number, etc.?
> >
> >Thanks.
> >
> >Jill
> >
> >""Priscilla Oppenheimer""  wrote in message
> >[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > Thanks for carrying it through. It's very helpful.
> > >
> > > And to reiterate what you said in your first message, this one (for
> >passive
> > > mode when the 192.3.10.10 server is on the local network) is risky
> because
> > > it has to be non-specific:
> > >
> > > access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
> > >
> > > So maybe it's best to tell the users not to use passive mode. But then
> >they
> > > better not have personal firewalls that don't allow the session setup
> from
> > > the server! I have actually run into situations where there were so
many
> > > firewalls (network-wide and personal) that we couldn't use FTP. We used
> >AFP
> > > over TCP instead. (which by the way is much more secure for another
> >reason,
> > > which is that it encrypts a random number provided by the server with
the
> > > password. FTP sends the password in clear text.)
> > >
> > > Anyway, thanks again.
> > >
> > > Priscilla
> > >
> > > At 12:49 AM 11/1/01, Jonathan Hays wrote:
> > > >Priscilla Oppenheimer wrote:
> > > >
> > > > > From a book that I am working on. The figures would help, but
you'll
> >have
> > > > > to buy the book for that! ;-)
> > > >
> > > >
> > > >
> > > >Thanks. Good info! And a good reminder for people like me who have
been
> > > >working on
> > > >non-Cisco projects and are getting rusty on our access list skills. 
8-)
> > > >
> > > >For closure (often synonymous with "getting the last word"   ) I will
> >work
> > > >through
> > > >the typical FTP access list entries in light of Priscilla's excellent
> > > >description.
> > > >Experienced folks will probably be bored reading this and I tend to be
> > > >repetitive for
> > > >the sake of beginners (but I welcome comments of any type from
anyone).
> > > >
> > > >Recall that our scenario involves giving Internet users access to the
> FTP
> > > >server sitting
> > > >on our LAN. Let's assume the access list will be applied with
> >"access-group
> > > >in"  to the
> > > >router's WAN connection, say serial 0.
> > > >
> > > >Let's start with the Active mode case.
> > > >
> > > >Referring to Priscilla's description, in step 1 the FTP conversation
is
> > > >initiated from
> > > >the Internet client using an ephemeral source port (greater than 1023)
> to
> > > >the FTP server
> > > >(192.3.10.10) listening on port 21 (destination port). Since we need
to
> > > >allow that first
> > > >TCP SYN to come through we cannot use the "established" keyword. The
> >"any"
> > > >in our access
> > > >list is for the Internet client and "192.3.10.10" is the FTP server.
The
> > > >first access
> > > >list entry is
> > > >
> > > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 21
> > > >
> > > >Now for the ftp data connection. In step 4 the client sends the PORT
> >command
> > > >to the FTP
> > > >server along with the ephemeral port number to be used for the FTP
data
> > > >(port 20)
> > > >connection. In step 5 the FTP server on the LAN initiates the TCP
> >connection
> > > >(SYN) to
> > > >the Internet-based client. This initial packet will not need an access
> >list
> > > >entry since
> > > >there is no access list on packets going _out_ serial 0, only for
those
> > > >coming in.
> > > >However, we must let the client SYN ACK response through (and other
port
> >20
> > > >packets from
> > > >the Internet). At this point, the client's packets will obviously have
> >the
> > > >ACK (or RST)
> > > >bit set and will use source port gt 1023, destination port 20. The
> >necessary
> > > >access list
> > > >entry is
> > > >
> > > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 eq 20
> established
> > > >
> > > >In the case of Passive mode, the client initiates the data connection
so
> >we
> > > >can't use
> > > >the "established" keyword, as I mistakenly did in a previous post. In
> > > >passive mode step
> > > >4 the Internet client issues the PASV command and the server supplies
an
> > > >ephemeral port
> > > >to initiate the connection. To let this packet into serial 0 on our
> >router
> > > >the access
> > > >list entry is
> > > >
> > > >access-list 110 permit tcp any gt 1023 host 192.3.10.10 gt 1023
> > > >
> > > >-----
> > > >Let's look at the reverse scenario, which is also very common. Suppose
> we
> > > >were trying to
> > > >allow FTP access from clients on an internal network (say
192.3.10.0/24)
> >to
> > > >FTP servers
> > > >outside on the Internet. Let's keep our focus on the packets coming in
> >and
> > > >use the same
> > > >"access-group in" on serial 0 as before. In this case "any" refers to
> the
> > > >responding
> > > >Internet FTP servers and "192.3.10.0  0.0.0.255" refers to the
> initiating
> > > >FTP clients on
> > > >our LAN. The access lists would look like this
> > > >
> > > >access-list 110 permit tcp any  eq 21 192.3.10.0 0.0.0.255 gt 1023
> > > >established
> > > >access-list 110 permit tcp any  eq 20 192.3.10.0 0.0.0.255 gt 1023
> > > >access-list 110 permit tcp any gt 1023 192.3.10.0 0.0.0.255  gt 1023
> > > >established
> > > >
> > > >Compared to the previous scenario, notice that the source and
> destination
> > > >haven't
> > > >changed (athough I changed "host 192.3.10.10" to "192.3.10.0
> 0.0.0.255")
> > > >but the ports
> > > >are swapped between source and destination in each access list. Also,
> the
> > > >lack of or
> > > >existence of the "established" keyword is reversed.
> > > >
> > > >In the first list entry the client on the LAN has initiated the
> >connection
> > > >and we need
> > > >to allow FTP control (port 21) packets from Internet FTP servers
through
> >if
> > > >they have
> > > >the ACK or RST bit set. The second entry allows the FTP server to
> >initiate a
> > > >data
> > > >connection (source port 20) to the client's ephemeral port on the LAN,
> so
> >we
> > > >drop the
> > > >"established" keyword. For the third entry, since the client is
> >initiating
> > > >passive mode
> > > >FTP we let "established" FTP data connection packets from the server
> > > through.
> > > >
> > > >Hope no one fell asleep.  ;-)
> > > >
> > > >Jonathan
> > > ________________________
> > >
> > > Priscilla Oppenheimer
> > > http://www.priscilla.com
> ________________________
>
> Priscilla Oppenheimer
> http://www.priscilla.com




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=25159&t=24525
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to