Table of Contents

Search

  1. Preface
  2. Document Processing
  3. Operation Console
  4. Partners and Profiles
  5. On-Boarding Checklists
  6. Endpoints
  7. MFT Connections
  8. MFT Web Users
  9. Events
  10. Event Monitors
  11. Reconciliations
  12. Event Resubmission
  13. Audit and Authorization
  14. Advanced Exception Handling
  15. Dashboard and Reports
  16. Service Level Agreement Management
  17. Glossary

FTPS MFT Connection Properties

FTPS MFT Connection Properties

Create an FTPS MFT Connection to define communications using the FTPS protocol for an MFT Remote endpoint. Informatica Managed File Transfer can connect to FTPS (FTP over SSL) servers for secure file exchange. When you define an FTPS MFT Connection, you need to indicate the FTPS connection properties such as the host name or IP address, user and password. Optionally you can specify the certificates to use for authentication.
The following table describes the properties in the
Basic
tab:
Property
Description
Name
Name of the MFT Connection.
Description
Provide a description for the MFT Connection.
Host
The host name or IP address of the server.
Port
The port number to use for connecting to the server. If left blank, the default port number is 21.
User
The user name to use for connecting to the server.
Password
The password to use for connecting to the server.
The following table describes the properties in the
Connection
tab:
Property
Description
Use passive mode
Indicates whether or not the MFT Connection will use
Passive
or
Active
mode. Specify
Yes
to use
Passive
mode. Specify
No
to use
Active
mode. If you do not select either value, the default
Active
is applied.
In Active mode, the server will attempt to connect back to a port on the Managed File Transfer client in order perform the data transfer. The challenge with Active mode is that your firewall might block the server from trying to open a port back into your network.
In Passive mode, the server does not need to connect back to a port on the Managed File Transfer client, which is a more firewall-friendly mode. Therefore, if you have problems with connecting to the server, you might want to change the mode to Passive by selecting Yes for this option.
Data Connection Start Port
The starting port number to use for the data connection. This should be used when Active mode is specified and there is a limited range of open ports on your firewall allowed for data connections.
Data Connection End Port
The ending port number to use for the data connection. This should be used when Active mode is specified and there is a limited range of open ports on your firewall allowed for data connections.
Timeout
The number of seconds to wait when attempting to connect to the server. A timeout will occur if the connection cannot be established in the specified amount of time. If left blank, the default timeout is 120 seconds.
Connection Retry Attempts
The number of times to retry the FTPS connection if it cannot be established. This setting is used for both the initial connection and any reconnect attempts due to lost connections. If left blank, then no retries will be attempted.
Connection Retry Interval
The number of seconds to wait between each connection retry attempt.
For instance, if you want Managed File Transfer to retry the connection up to 10 times with a 5 second delay between retries, then specify 10 for the Connection Retry Attempts and 5 for the Connection Retry Interval.
Initial Remote Directory
The initial directory to start in after connecting to the server. If left blank, then the initial directory will be the home directory assigned to the user on the server.
Control Encoding
If left blank, Managed File Transfer uses the ISO standard ISO-8859-1. If supported by the server, other encodings like UTF-8 can be specified to support more international characters.
Throttle Bandwidth
Limit the inbound and outbound bandwidth used for file transfers.
The server is considered trusted and validation will not be attempted using digital certificates.
If enabled, Managed File Transfer uses the default certificate that is defined in the Managed File Transfer default key store.
Client Certificate Alias
Select a Managed File Transfer client certificate using the client certificate alias. A particular key within the Managed File Transfer default key store can be used for client authentication by indicating the key alias. The specified key will be used when required by the FTPS server.
The following table describes the properties in the
Directory Listing
tab:
Property
Description
List Parser
The list parser to use for the server connection. If the field is blank, Managed File Transfer will try to use the MLSD parser. If the server does not support the MLSD parser, the UNIX parser is used. If you experience problems listing directories, select a different list parser.
Date Format
Use this field if the server returns a date that is different from the selected list parser's default. If your location requires a different date format (for example, d MMM yyyy), specify the date format in this field. Not all list parsers support the date format setting. List parsers that do not support the Date Format setting will ignore any User specified values.
Recent Date Format
Specify the date format to use when parsing the recent last modified date for each file. The recent date format is primarily used on UNIX-based systems and appears on entries less than a year old. If your location requires a different recent date format (for example, d MMM HH:mm), specify that pattern in this field. Not all list parsers support the recent date format setting. List parsers that do not support the recent date format setting will ignore any User specified values.
The following table describes the properties in the
Proxy
tab:
Property
Description
Proxy Type
Managed File Transfer supports SOCKS (version 4 and 5), HTTP tunneling through an HTTP proxy and Managed File Transfer Gateway. HTTP tunneling requires that the HTTP proxy supports the CONNECT HTTP method. Not all HTTP proxy servers might support the CONNECT method and some might only allow HTTPS traffic. When using an HTTP proxy that requires authentication, Basic and Digest authentication schemes are supported. Check with the network administrator for the correct proxy type.
Host
The host name or IP address of the proxy server.
If the Proxy Type or Host fields are blank, a direct connection to the target host is implied.
Alternate Host
The host name or IP address of an alternate proxy server. The alternate proxy server is used when the primary proxy server is unavailable.
Port
The port number to use for connecting to the proxy server. If left blank, the default port for an HTTP connection is 80 and SOCKS is 1080.
User
The user name to use for connecting to the proxy server.
Password
The password to use for connecting to the proxy server.
The following table describes the properties in the
SSL
tab:
Property
Description
Connection Type
Indicates if the connection type is Implicit SSL or Explicit SSL. The preferred connection type is the more modern Explicit SSL standard, however some trading partners might still require Implicit SSL. If this field is left blank, then the default connection type of Explicit SSL will be used.
Security Protocol
Indicates whether SSL or TLS should be used for Explicit SSL connections. TLS is the latest security protocol standard, however many trading partners still use the SSL protocol for Explicit SSL connections. If this field is left blank, then the default security protocol of SSL will be used.
Clear Command Channel
Indicates whether or not to use a clear command channel (CCC) for the FTPS connection. Specify
No
to keep the command channel encrypted. Specify
Yes
to not encrypt the control command channel (however, the actual data transfers will remain encrypted). If neither value is selected, then the default value of
No
will be used.
SSL connections require a Clear Command Channel (CCC) when connecting from behind a NAT firewall.
Data Channel Protection Level
The data channel protection level indicates if the data channel is encrypted. Select
Private
to keep the data channel encrypted. If the FTPS server does not support an encrypted data channel, select
Clear
to leave the data channel unencrypted. The default setting is Private.
Send SSL Close Notify
After the command channel is closed, most servers automatically close the SSL/TLS connection, however some servers do not understand the "close_notify" command. Select
No
to keep Informatica Managed File Transfer from sending the "close_notify" command. The default value is
Yes
.
SSL Context Protocol
Specify the protocol to use when creating the SSLContext. The value you need to specify here depends on the security providers you have installed in the JRE (Java Runtime Environment). In most cases, the default value (TLS) should just work fine. However, on some IBM JRE implementations the default value would not work if the server you are connecting to does not support TLS 1.0.

0 COMMENTS

We’d like to hear from you!