FTPS ALG 2.0 for support for encryption
Guru Member
So here is the deal the reason ALG for FTP works is because it can read into the packets and with FTPS the USG can't read the packets in order to allow FTPS it has a known port maybe 21 or 990 normally then in Active Mode the server connects to you incoming and Passive random ports outgoing.
So here is how you support FTPS
If your outgoing to port 21 say to IP 173.248.150.164 which you allow by firewall rule then FTPS ALG 2.0 then auto makes two firewall rules till session ends
So if your from LAN1 to WAN one rule would be
from LAN1
to WAN
destination IP 173.248.150.164
Service any TCP
The other rule which can be disabled if you only want to use Passive would auto make a NAT rule till session ends
incoming WAN
source IP 173.248.150.164
external WAN IP
internal IP that made the outgoing FTP
service any-TCP
Firewall rule till session ends
from WAN
to LAN1
source IP 173.248.150.164
Service any TCP
Comments
-
Hi @PeterUK
I'm trying to understand the specific use case for this 'FTPS ALG 2.0' concept.
It seems designed to support Active Mode FTPS, where the server has to initiate an inbound data connection to the client.
Could you describe on the scenario where this is necessary? Most firewalled environments rely on Passive Mode FTPS (where the client initiates both connections) specifically because it avoids this exact inbound rule-making problem and works with standard stateful tracking.
Zyxel Melen0 -
Thanks for your reply Melen
If you was to try FTP with the way ALG works you only have to allow port 21 from LAN to WAN and then do a block all rule and go to say 173.248.150.164 in Active or Passive everything works! no need to allow any other ports the ALG does it all.
The problem then is how do you do the same for encryption because going to 173.248.150.164 has the problem of you don't know in Passive mode the outgoing ports it will need such that if you only allow from LAN to WAN TCP ports 21, 80, 443 then you can't get FTPS to work and everyone running a FTPS could have a different port ranges to another site so you end up opening more outgoing ports unless you firewall every destination IP same deal with Active on incoming.
So in short the idea I said above will not need to look into the packets the FTP Signaling Port is all you need to auto allow FTPS based on destination IP.
0 -
Hi @PeterUK
Thanks for the details. I will let our product team know this idea, and we will monitor the comments and votes of this post to evaluate it.
Zyxel Melen0
Categories
- All Categories
- 439 Beta Program
- 2.8K Nebula
- 202 Nebula Ideas
- 126 Nebula Status and Incidents
- 6.3K Security
- 508 USG FLEX H Series
- 327 Security Ideas
- 1.7K Switch
- 84 Switch Ideas
- 1.3K Wireless
- 49 Wireless Ideas
- 6.8K Consumer Product
- 288 Service & License
- 458 News and Release
- 89 Security Advisories
- 31 Education Center
- 10 [Campaign] Zyxel Network Detective
- 4.3K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 85 About Community
- 96 Security Highlight
Zyxel Employee