<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTPS connections are not working in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/230225#M66187</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15381"&gt;@AnalysisMan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;While creating a specific rule like you've mentioned would certaintly be an option, a better troubleshooting method would always be enabling logging on the default rules so that you capture all denied traffic and can filter as needed. Since there are additional considerations when using Active FTP&amp;nbsp;its likely that this connection would actually fail prior to ever hitting the recommended security policy.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Sep 2018 18:29:48 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-09-10T18:29:48Z</dc:date>
    <item>
      <title>FTPS connections are not working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/229941#M66108</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a inbound NAT for FTPS but the connections are not working. We can not see any deny in FWs.&lt;/P&gt;&lt;P&gt;We dont have decrypt SSL configured. I think it shouldnt be necessary, right?&lt;/P&gt;&lt;P&gt;Policy configures has "ssl" and "ftp" allowed. this is the ftp log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Logs ftps.JPG" style="width: 343px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16472iFD8E696E8209C787/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Logs ftps.JPG" alt="Logs ftps.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Why ftps connections are not working?? any dynamic port or something like that?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 09:34:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/229941#M66108</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2018-09-07T09:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: FTPS connections are not working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/229952#M66109</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I assume you are using active FTP. In this case TLS decryption is required for the firewall to be able to see the negotiated port and to open the connection dynamically. But there might also be some more problems: As the data connection is initiated by the server towards the client in active FTP, the source NAT IP needs to be the same as the destination NAT IP from the inbound NAT rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But to make your situation easier, just use passive FTP and the connection (assuming that the required security policies are in place) will work without TLS decryption.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 10:28:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/229952#M66109</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-07T10:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: FTPS connections are not working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/230072#M66157</link>
      <description>&lt;P&gt;You won't be able to see the deny logs for the implicitly denied rule, unless you set to log it with a specific rule. You may try two options.&lt;/P&gt;&lt;P&gt;1) Add two Services Objects with TCP/20 and 21, and allow it on the Security Policies.&lt;/P&gt;&lt;P&gt;2) Do a packet capture while you are testing an FTP connection.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Sep 2018 02:21:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/230072#M66157</guid>
      <dc:creator>AnalysisMan</dc:creator>
      <dc:date>2018-09-08T02:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: FTPS connections are not working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/230225#M66187</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15381"&gt;@AnalysisMan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;While creating a specific rule like you've mentioned would certaintly be an option, a better troubleshooting method would always be enabling logging on the default rules so that you capture all denied traffic and can filter as needed. Since there are additional considerations when using Active FTP&amp;nbsp;its likely that this connection would actually fail prior to ever hitting the recommended security policy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Sep 2018 18:29:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftps-connections-are-not-working/m-p/230225#M66187</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-09-10T18:29:48Z</dc:date>
    </item>
  </channel>
</rss>

