FTP - Configuration

The MOVEit DMZ Configuration Utility program is used to configure the MOVEit DMZ FTP server. (Users, groups, folder settings and the like are generally maintained through the Web Interface or MOVEit DMZ API.) Run the configuration program by choosing the Start menu shortcut "MOVEit DMZ Config" This program uses a tabbed dialog to group the settings by function.

MOVEit DMZ FTP will immediately apply configuration changes the next time a new connection is received.

Exception: If changes are made to the FTP explicit or implicit ports, the MOVEit DMZ FTP service must be restarted for these changes to take effect.

FTP Ports Tab

configutil_ftpports.png (43646 bytes)

Control Ports

Data Ports

Miscellaneous Settings

FTP Certs Tab

configutil_ftpcerts.png (33388 bytes)

Server Certification Selection List

configutil_certselector.png (13124 bytes)

Clicking any of the "..." server certificate browse buttons will pop up a list of server certificates to select. Be sure to pick a certificate with an "Expires" date later than today. To select a certificate, double-click it, or select it and click the OK button.

FTP IPs Tab

configutil_ftpips.png (33443 bytes)

NAT for Passive FTP

Whether to map IP addresses for Network Address Translation (NAT) is an advanced feature for sites that use a firewall to do "NAT'ing". It applies only to passive mode transfers. If you choose to use this feature, you should provide a list of NAT rules in most-specific-to-least-specific order with a "catch-all" at the bottom. Each NAT rule consists of an IP mask, and the external IP address to use for clients matching that mask. Each mask has the form "m.m.m.m", where each m is a decimal number like 208, or a * wildcard. Each external IP address is the usual dotted decimal number and should be the external IP address to which the firewall maps your FTP server.

The most common configuration resembles the following example. This provides an internal IP address (10.2.1.33) to clients connecting from internal clients (10.*.*.*), but provides an external IP address to all other (external) clients.

ServerIP=*.*.*.*, NatIP=10.2.1.33, ClientIPs=10.*.*.*
ServerIP=*.*.*.*, NatIP=66.170.5.130, ClientIPs=*.*.*.*

Another configuration involves "multihoming" where different hostnames have been mapped to different external IP addresses 66.170.5.130 and 66.170.5.131) which come in to two different internal IP addresses (10.2.1.33 and 10.2.1.34) on the same MOVEit DMZ machine. In this case we want to return the correct IP address for each external connection while still returning the correct address for internal clients.

ServerIP=10.2.1.34, NatIP=10.2.1.34, ClientIPs=10.*.*.*
ServerIP=*.*.*.*, NatIP=10.2.1.33, ClientIPs=10.*.*.*
ServerIP=10.2.1.34, NatIP=66.170.5.131, ClientIPs=*.*.*.*
ServerIP=*.*.*.*, NatIP=66.170.5.130, ClientIPs=*.*.*.*

If your NAT rules consist solely of the rule:

ServerIP=*.*.*.*, NatIP=208.33.33.33, ClientIPs=208.*.*.*

...then a client accessing any IP address your machine from 208.122.3.4 will be told to perform passive transfers to 208.33.33.33, even though the actual internal IP address of your FTP server may be something completely different, for example, 192.168.1.10. Clients accessing your FTP server from outside the 208.* domain will be given the actual address of your FTP server (192.168.1.10).

If you have more than one NAT rule, you can change the order of evaluation by using the up- and down-arrow buttons to the right side of the list.

Rules to handle "localhost" or "127.0.0.1" addresses are not necessary. Connections from these addresses will always be instructed to connect their data channels to the same address.

Non-Secure FTP

Whether to allow access from Non-Secure FTP clients. This feature lets you open the FTP server up to clients that do not use secure FTP (encrypted) transfers. This significantly reduces the security of MOVEit DMZ because data can potentially be "sniffed" on the network. But in some circumstances, such as inside a company's intranet, that level of security is not important. Or, in other cases, there is simply no other way to transfer securely from a certain client. In order to open FTP up to non-secure transfers, you need to not only check the enabling box, you also need to add the specific IP addresses or IP masks that are allowed to perform these non-secure transfers. Non-secure mode is enabled using pairs of IP addresses. Each pair consists of a local IP address (or mask) on the MOVEit DMZ server, (corresponding perhaps to a specific network interface), and an external IP address or mask corresponding to a network FTP client. As with the NAT list, you can move entries up and down within the list.

Before any of the configured IP addresses will be allowed to connect insecurely, the "Non-Secure FTP Enabled" checkbox MUST be checked (and confirmed).

This option MUST be enabled before any user-level "allow non-secure FTP" interface setting can be used.

WARNING: Non-Secure FTP carries the security risk of exposing usernames, passwords, file data, file names, folder paths and other control information to anyone listening.

Diagnostic Logs

The MOVEit DMZ FTP server's diagnostic log settings can be changed on the Status tab of the configuration utility. See the "Configuration Utility" document for more information about this tab.

Paths Tab

The MOVEit DMZ FTP server communicates with MOVEit DMZ using the "Machine URL" configured on this tab. See the "Configuration Utility" document for more information about this tab.

Initial Banner Language

In multi-language systems, the initial security banner and notice will be provided in the default language of the default organization, or the system, if no default organization exists (see the Miscellaneous system settings page for more information about default organizations). To change this language, if there is a default organization on the system, log on to that organization as an org admin and change the org's default language using the International settings page. If there is no default organization on the system, the system default language would need to be changed. This setting is available only to SysAdmins, and can be found in the System Languages settings page.