Table of Contents

Search

  1. Preface
  2. Introduction
  3. Pre-Installation Notes
  4. Installation and Configuration
  5. Customizing Installation Settings
  6. Product Administration
  7. Upgrade Overview
  8. Active-Passive: Backups and Replication
  9. Active-Active: Clustering and Automatic Failover
  10. Uninstalling Managed File Transfer

Informatica Managed File Transfer Installation Guide

Informatica Managed File Transfer Installation Guide

Firewall Configuration

Firewall Configuration

In order to administer
Managed File Transfer
from any workstations in the private network, ports 8000 and 8002 will need to be opened (through the backend firewall) from the private network to
Managed File Transfer
in the DMZ.
If external trading partners need access to the file transfer protocols (e.g. SFTP, FTP, HTTPS, AS2, FTPS) in
Managed File Transfer
, those port numbers (e.g. 21, 22, 443, 990) need to be opened through the frontend firewall to
Managed File Transfer
in the DMZ.  Additionally, if employees (on the private network) need to access those file transfer protocols in
Managed File Transfer
, the port numbers will need to be opened through the backend firewall from the private network to
Managed File Transfer
in the DMZ. 
If trigger events in
Managed File Transfer
need to call Remote Projects , then ports 8000 and 8002 need to be opened (through the backend firewall) from
Managed File Transfer
to another
Managed File Transfer
server in the private network.

0 COMMENTS

We’d like to hear from you!