Server 2008 R2 Standard, IIS 7.5. Trying to set up SFTP (SSL) site for a single vendor. I want to open ports on ASA, for only their IP address. However, during testing I see that SFTP uses two ports, TCP 22 and then a randomly generated TCP port (Data Channel) in the 57K plus range (at least from logs so far).
I've gone into IIS and set Data Channel port range, but when I'm testing it is not using this 5 port range I configured, it is still randomly generated.
Obviously this sort of creates a problem from the Firewall point of view, as I do not know what ports will be used for the data channel.
Thoughts?
set security alg ftp ftps-extension
I know it is not Cisco ASA, but I would start there if your FTPS works properly locally when using a FTPS Client such as CoreFTP LE.
Some details
FTPS (FTP-SSL) is just like any FTP Server that runs over port 21. The main difference is that it uses TSL/SSL protocols to encrypt the control & data channels.
When the CONTROL channel is encrypted, the authentication is protected - therefore passwords are secure.
When the DATA channel is encrypted, the file transfers are secure while in transit.
Please do not confuse this with SFTP.
SFTP is FTP Services over SSH which runs on tcp/22.
FTPS runs over SSL or TLS on tcp/21 or tcp/990.
Setup your FTPS in IIS Manager
http://www.iis.net/learn/publish/using-the-ftp-service/using-ftp-over-ssl-in-iis-7
Setup the custom data port channels under IIS Manager - Server Level
http://www.iis.net/learn/publish/using-the-ftp-service/configuring-ftp-firewall-settings-in-iis-7
Sample Core FTP Log
Welcome to Core FTP, release ver 2.2, build 1747 (x64) — © 2003-2012
WinSock 2.0
Mem — 8,339,356 KB, Virt — 8,589,934,464 KB
Started on Saturday September 8, 2012 at 12:44:PM
Connect socket #976 to 192.168.56.101, port 21…
220 Microsoft FTP Service
AUTH TLS
234 AUTH command ok. Expecting TLS Negotiation.
TLSv1, cipher TLSv1/SSLv3 (AES128-SHA) – 128 bit
USER ftpuser
331 Password required
PASS **********
230 User logged in.
SYST
215 Windows_NT
Keep alive off…
PWD
257 “/” is current directory.
PBSZ 0
200 PBSZ command successful.
PROT P
200 PROT command successful.
PASV
227 Entering Passive Mode (192,168,56,101,192,23).
LIST
Connect socket #864 to 192.168.56.101, port 49175…
150 Opening ASCII mode data connection.
TLSv1, cipher TLSv1/SSLv3 (AES128-SHA) – 128 bit
226 Transfer complete.
Transferred 0 bytes in 0.011 seconds
Let us know if it works locally first over the proper data channels.
Hades666