08-10-2007 05:32 AM - edited 03-03-2019 06:16 PM
If I want to define an access list to prevent any host on subnet 10.0.1.0/24 from obtaining FTP access to server 10.0.2.5 can I use the single access list statement :-
access-list 101 deny tcp 10.0.1.0 0.0.0.255 host 10.0.2.5 eq ftp
or, because ftp uses both ports 20 and 21, do I have to enter two seperate statements :-
access-list 101 deny tcp 10.0.1.0 0.0.0.255 host 10.0.2.5 eq 20
and
access-list 101 deny tcp 10.0.1.0 0.0.0.255 host 10.0.2.5 eq 21
08-10-2007 05:49 AM
single statement would suffice.
However, the acl is on port based, if ftp server is using port other than 21 than ftp still would be allowed.
Better to use NBAR which actually inspect the protocol and can identify ftp data even if ftp service is hosted on different ports.
Here's the link for NBAR:-
http://www.cisco.com/en/US/products/ps6616/products_ios_protocol_group_home.html
Solution purely depends on ur infra. if the destination ftp access also resides in your domain, than u migh t be having knowleged of the port the ftp service is running on...
08-10-2007 06:01 AM
hi there
i think u'd better try the next ACLs which contain the tow ports 20 and 21 of ftp to adviod the standard and passive modes of ftp connections
Marwan
08-10-2007 06:18 AM
Not needed bcos 21 is used by server to client..which any will be dropped if not explictly allowed in acl
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide