Special Case: Sensitive Data Detection in FTP Traffic
You usually determine which traffic to monitor for sensitive data by specifying the ports to monitor or specifying application protocols in deployments.
However, specifying ports or application protocols is not sufficient for detecting sensitive data in FTP traffic. Sensitive data in FTP traffic is found in traffic for the FTP application protocol, which occurs intermittently and uses a transient port number, making it difficult to detect. To detect sensitive data in FTP traffic, you must include the following in your configuration:
-
Specify the
FTP data
application protocol to enable detection of sensitive data in FTP traffic.In the special case of detecting sensitive data in FTP traffic, specifying the
FTP data
application protocol does not invoke detection; instead, it invokes the rapid processing of the FTP/Telnet processor to detect sensitive data in FTP traffic.
-
Ensure that the FTP Data detector, which is enabled by default, is enabled.
-
Ensure that your configuration includes at least one port to monitor for sensitive data.
-
Ensure that the file policy is enabled for the Access Control Policy.
Note that it is not necessary to specify an FTP port except in
the unlikely case where you only want to detect sensitive data in FTP traffic.
Most sensitive data configurations will include other ports such as HTTP or
email ports. In the case where you do want to specify only one FTP port and no
other ports to monitor, Cisco recommends that you specify the FTP command port
23
.