First of all if possible do not use FTP, it is unsafe and a stupid protocol anyway you look at it.
Go with something like SFTP instead, that will make your life less vulnerable and configuration much easier.
Why not ftp ?
well first of all anyone on the way out can sniff your username and password since it is in cleartext. FTP is directly firewall hostile. and you do not know your data will be sent from A to B without information changing.
If possible do not use the standard SFTP port.
FTP needs to be looked at from the firewalls and routers with access-lists point of view, It needs some form of deep packet inspection or ALG to know what to open and how.
So do yourself a favour and use something different than FTP.
If nothing else it will make your configuration much easier. (no FTPS is not the answer)
If you need a reply ACL or not is entierly up to how you have setup your routers before.
global configuration command on the client router. Overall I agree with the other suggestions that FTP is not the best protocol to use, something like SCP, SFTP, or enabling IPSec for the particular FTP traffic would be preferable.
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...