FTP 530 Error Access Denied

Posted on 2011-04-26
Last Modified: 2013-11-12
I run 8 FTP servers behind one firewall and those servers can be accessed globally. There are no firewally rules that specify incoming IP ranges. Recently, one of the 8 FTP servers became inacessible from one location. Attempts to FTP from that location return 530 Access Denied errors. It  is a curious phenonomenon for two reasons:

1. It is only from that one location that a 530 access denied error occurs. From all other locations, you can FTP to the blocked server.
2. From the blocked location, only 1 FTP server is blocked, the other 7 FTP servers are still accessible.

I have spoken to the firewall admin at the location in question and he insists that a 530 error indicates something is blocking the connection on the FTP server side. On the FTP server side however:

1. There are no firewall rules that  distinguish between incoming  IP ranges.

2. The ISP provider of the FTP server network says that the blocking does not emanate from them.

Any ideas?
Question by:notcjw
    LVL 7

    Accepted Solution

    What software is running the Servers, IIS or ?
    Are they domain named servers or are they ip addressed based (virtual or separate physical servers)?

    Author Comment

    The servers are running IIS.
    They are Microsoft Virtual 2005 servers running Server 2003.
    Each server has a dedicated IP.
    LVL 16

    Assisted Solution

    530 means the server rejected the user authentication.  Probably accidentally change the password or just mistyped it.  

    If it is a secure FTPS site using a client certificate for authenticaiton perhaps the server has the wrong cert loaded for this user.
    LVL 11

    Assisted Solution

    the 530 is fired by the FTP server when an FTP user autentication fails;
    it is not affected by Firewall configurations...

    Expert Comment

    I created a video in You Tube that can walk you through this. I almost pulled the rest of my hair out trying to figure this out so I hope it helps some people.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Join & Write a Comment

    SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
    We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
    Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    24 Experts available now in Live!

    Get 1:1 Help Now