03-13-2008 09:22 AM
03-14-2008
01:44 PM
- last edited on
09-17-2025
03:11 PM
by
Content Cleaner
03-17-2008 07:30 AM
03-18-2008
11:58 AM
- last edited on
09-17-2025
03:12 PM
by
Content Cleaner
03-19-2008 12:37 PM
03-20-2008
12:01 PM
- last edited on
09-17-2025
03:11 PM
by
Content Cleaner
Hi Nate,
Here is another try. This KB talks about Windows Firewall and Networking. Let us know!
03-20-2008 12:28 PM - edited 03-20-2008 12:29 PM
FTP is a fancy protocol that uses secondary connections on "relatively" arbitrary ports for the data connection. The control connection is on port 21. There are also two modes, active (PORT) mode and passive and some work better under some conditions than the other. They differ in the direction in which the data connection is established.
Stateful firewalls are supposed to listen to the control connection for PORT and PASV commands and open the secondary ports for the data connection automatically. In additions, you should be able to give certain executables full access on any server ports they use. Since this is now application based and not port based, there should be no problem. It seems you tried that, though).
Have you tried manual ftp (e.g. via commandline or internet explorer)? Does that work?
(I don't have the internet toolkit so I don't know how much control you have over ftp modes.)
What is your network topology? e.g. is there a router in-between that does NAT? Most newer models should have full ftp alg support, but some ancients ones have incomplete implementation. How about a corporate firewall? Or are all sides on the same subnet?
If you're up to it, run a packet sniffer to see what's going on in detail. Try wireshark. (www.wireshark.org)
03-24-2008 08:18 PM