<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ftps/ftpes in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/71227#M40731</link>
    <description>&lt;P&gt;I just faced the ftps issue and was searching the community articles. For me the problem was not resolved by adding SSL. The data connection did not work. The app was using range of high ports which I ended up allowing as service and solved the issue. I did not attempt ssl decryption since I had to fix it ASAP :).&lt;/P&gt;</description>
    <pubDate>Wed, 20 Jan 2016 00:37:17 GMT</pubDate>
    <dc:creator>Sly_Cooper</dc:creator>
    <dc:date>2016-01-20T00:37:17Z</dc:date>
    <item>
      <title>ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50306#M37040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I allow an FTPS (FTPES) connection?&amp;nbsp; I assume the PA tracks an FTP connection and understands the related data connection.&amp;nbsp; Does it understand FTPS?&amp;nbsp; If I set a policy for ftp, it fails when it tries to open a data connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 01:32:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50306#M37040</guid>
      <dc:creator>kjh</dc:creator>
      <dc:date>2012-09-12T01:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50307#M37041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to allow ftps or ftpes we need to do ssl decryptioin. We identify the FTPS control connection as SSL.Since it FTPS is over SSL we donot have any visibility into application and we identify it as SSL connection. If we allow only SSL in our security than we will allow only control connection for the FTPS but not the data connection.&lt;/P&gt;&lt;P&gt;The control session will work fine by just allowing the ssl application but the actual data session (the file transfer) will not work because Paloalto will block that file transfer as that transfer takes on a different set of ports rather than the port 990 that is used for FTPS control connection. So for you to get the FTPS working you will have to do SSL decryption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a doc about SSL decryption which I found in the discussions and its really good. Please have a look at it&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sandeep T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 02:00:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50307#M37041</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-12T02:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50308#M37042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe this is working in 5.0.4 without decryption. I have a single policy that permits the ftp and ssl applications to my IIS7 FTP server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At first I thought I'd made a mistake, so I checked the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; Is the ftp server allowing unencrypted traffic? Tested: No (it will not accept regular FTP connections)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; Is my policy erroneously allowing ALL traffic? Tested: No&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3)&amp;nbsp; Is only the control channel encrypted and data is unencrypted? I wiresharked my traffic while transferring an ASCII file, and the data stream definitely looks encrypted. That and IIS is configured to encrypt both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone confirm that recent firmware does indeed "understand" the FTPS protocol when you specify both ftp and ssl as permitted applications?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 21:50:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/50308#M37042</guid>
      <dc:creator>steve.chupack</dc:creator>
      <dc:date>2013-05-23T21:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/71227#M40731</link>
      <description>&lt;P&gt;I just faced the ftps issue and was searching the community articles. For me the problem was not resolved by adding SSL. The data connection did not work. The app was using range of high ports which I ended up allowing as service and solved the issue. I did not attempt ssl decryption since I had to fix it ASAP :).&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2016 00:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/71227#M40731</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2016-01-20T00:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/71239#M40733</link>
      <description>&lt;P&gt;you'll need to enable ssl decryption as those high ports are negotiated in the initial ftp (control) connection. only by looking inside the encrypted session can the firewall determine which ports will be used for the data session and will a predict session be created to properly handle the high port session&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2016 08:45:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/71239#M40733</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-01-20T08:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: ftps/ftpes</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/338283#M85077</link>
      <description>&lt;P&gt;Hi, what about when the inbound traffic is explicit FTPS where the control channel is over port 21 and data is high ranged ports as SSL.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;In our case port 21 is being seen as FTP app-id and the high-ranged ports are seen as SSL. &amp;nbsp; We need a way to detect this and restrict regular FTP. &amp;nbsp;Any suggestions? TIA...&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2020 01:27:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-ftpes/m-p/338283#M85077</guid>
      <dc:creator>JonHoSee</dc:creator>
      <dc:date>2020-07-14T01:27:41Z</dc:date>
    </item>
  </channel>
</rss>

