Cisco ASA FTP application inspection examines the FTP sessions to provide the following features:
Use the inspect ftp command to enable FTP inspection. The strict keyword (optional) allows the Cisco ASA to prevent client systems from sending embedded commands in FTP requests:
inspect ftp [strict] ftp-map-name
ftp-map-name is the name of an FTP map used to define FTP request commands to be denied. Example 8-8 demonstrates how to use the inspect ftp strict command in conjunction with an FTP map, called myftpmap, to deny several FTP commands.
Example 8-8. Denying Specific FTP Commands
ftp-map myftpmap deny-request-cmd cdup rnfr rnto stor stou ! class-map inspection_default match default-inspection-traffic ! policy-map asa_global_fw_policy class inspection_default inspect ftp strict myftpmap
Caution
The strict option may break FTP sessions from clients that do not comply with the RFC standards; however, it provides more security features.
When the strict option is enabled, the following anomalous activities in FTP commands and replies are denied:
The FTP map request-command deny subcommand is used to deny specific FTP commands on the Cisco ASA. Table 8-3 lists all the request-command deny subcommand options that can be restricted under an FTP map.
Option |
Description |
---|---|
all |
Denies all supported FTP commands |
appe |
Denies the ability to append to a file |
cdup |
Denies a user request to change to parent of current directory |
help |
Restricts the user to access the help information from the FTP server |
retr |
Denies the retrieval of a file from the FTP server |
rnfr |
User is not allowed to rename from a filename |
rnto |
User is not allowed to rename to a specific filename |
site |
User not allowed to specify server-specific command |
stor |
Denies the user permission to store a file |
stou |
Denies the user permission to store a file with a unique name |
The SYST FTP command allows a system to ask for information about the server's operating system. The server accepts this request with code 215 and sends the requested information. The Cisco ASA replaces the FTP server response to the SYST command with an X for each character sent, to prevent FTP clients from seeing the FTP server systemtype information. You can use the no mask-syst-reply subcommand in FTP map configuration mode to disable this default behavior, as shown in Example 8-9.
Example 8-9. mask-syst-reply Subcommand
ftp-map myftpmap no mask-syst-reply
Part I: Product Overview
Introduction to Network Security
Product History
Hardware Overview
Part II: Firewall Solution
Initial Setup and System Maintenance
Network Access Control
IP Routing
Authentication, Authorization, and Accounting (AAA)
Application Inspection
Security Contexts
Transparent Firewalls
Failover and Redundancy
Quality of Service
Part III: Intrusion Prevention System (IPS) Solution
Intrusion Prevention System Integration
Configuring and Troubleshooting Cisco IPS Software via CLI
Part IV: Virtual Private Network (VPN) Solution
Site-to-Site IPSec VPNs
Remote Access VPN
Public Key Infrastructure (PKI)
Part V: Adaptive Security Device Manager
Introduction to ASDM
Firewall Management Using ASDM
IPS Management Using ASDM
VPN Management Using ASDM
Case Studies