
22-30
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 22 Applying Application Layer Protocol Inspection
FTP Inspection
FTP Inspection
This section describes how the FTP inspection engine works and how you can change its configuration.
This section includes the following topics:
•
FTP Inspection Overview, page 22-30
•
Using the strict Option, page 22-30
•
The request-command deny Command, page 22-31
•
Configuring FTP Inspection, page 22-32
•
Verifying and Monitoring FTP Inspection, page 22-34
FTP Inspection Overview
The FTP application inspection inspects the FTP sessions and performs four
tasks:
•
Prepares dynamic secondary data connection
•
Tracks
ftp
command-response sequence
•
Generates an audit trail
•
NATs embedded IP address
FTP application inspection prepares secondary channels for FTP data transfer. Ports for these channels
are negotiated through PORT or PASV commands. The channels are allocated in response to a file
upload, a file download, or a directory listing event.
Note
If you disable FTP inspection engines with the
no inspect ftp
command, outbound users can start
connections only in passive mode, and all inbound FTP is disabled.
Using the strict Option
Using the
strict
option with the
inspect ftp
command increases the security of protected networks by
preventing web browsers from sending embedded commands in FTP requests.
Tip
To specify FTP commands that are not permitted to pass through the FWSM, create an FTP map and
enter the
request-command deny
command in FTP map configuration mode.
After you enable the
strict
option on an interface, FTP inspection enforces the following behavior:
•
An FTP command must be acknowledged before the FWSM allows a new command.
•
The FWSM drops connections that send embedded commands.
•
The 227 and PORT commands are checked to ensure they do not appear in an error string.
Caution
Using the
strict
option may cause the failure of FTP clients that are not strictly compliant with FTP
RFCs.
Содержание 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Страница 35: ...P A R T 1 Getting Started and General Information ...
Страница 36: ......
Страница 297: ...P A R T 2 Configuring the Security Policy ...
Страница 298: ......
Страница 521: ...P A R T 3 System Administration ...
Страница 522: ......
Страница 613: ...P A R T 4 Reference ...
Страница 614: ......