![]() For information about Globalscape, visit www.globalscape.com. |
A Site is similar to a virtual FTP server bound to one or more IP addresses. In EFT hierarchy, a Server consists of one or more physical hardware devices (servers) running the EFT executable as a system service. Server Groups are at the top of EFT's setting hierarchy and allow you to group multiple Servers from a management or administrative perspective. Each EFT service, running as a single service on a single hardware device, can support multiple Sites.
You cannot run multiple Sites on the same IP address and port. Each Site requires an IP address and port combination that is not already claimed by other process or Site. To avoid conflicts, when the same protocol is used, each Site requires a distinct IP address (and same port), or the same IP address, but different ports. For example, use port 8080 for HTTP instead of 80, or 2121 for FTP instead of 21. You cannot have two Sites trying to use port 21 on the same IP address. The two Sites will conflict; the Site that starts first claims the contested port.
The hardware in EFT's computer does not limit the number of Sites you can set up, at least regarding how many NICs (Network Interface Cards) you have. In Windows, you can assign any number of IP addresses to a single NIC.
In the above example, your internal users could connect to site 1A using the Site's internal IP address (192.168.20.134:21) while external users can access site 1C using the host address you designate, such as partners.globalscape.com, which resolves to a different IP address on the same port).
Sites can each have a unique authentication provider type, the same authentication provider type, or even share the same authentication provider database. For example, Site 1A could use Globalscape Authentication, Site 1B could use Active Directory (AD), and Site 1C could share the AD database.
|
The EFT service runs under a user account, which must have full administrative rights to the folder in which you installed EFT. With administrative rights, the EFT service can save all your settings. If the EFT service does not have administrative rights, you lose settings and user accounts whenever you restart the EFT service, and you need to reset permissions on the computer where the EFT service is running. |
You will need the following information to create and configure a Site:
Site name, listening IP address, and administrator port
Root folder path
DMZ Gateway IP address and port, if used
SSL/SFTP keys/certificate/ciphers/version information
To create a Site
The Site Setup wizard appears automatically after you complete the Server Setup wizard; otherwise, do one of the following:
In the administration interface, click Configuration > Create New Site.
Right-click anywhere in EFT's tree, then click Create New Site.
The EFT Site Setup Wizard appears.
You are asked to choose the default security level for the Site. If PCI DSS compliance is not a requirement, you can use the default security settings and then manually configure advanced security options individually, as needed. Do one of the following:
To create a Site that complies with PCI DSS, refer to Creating a PCI DSS Site.
To create a standard Site, click Default security settings.
Click Next. The Site Label and Listening IP page appears.
In the Site label box, type a distinguishing name for the Site. MySite appears by default, but you can change this to anything you want.
The Site name cannot have a period at the end of the name or use any characters that are not allowed in Windows file naming. When you create a Site, EFT creates a file named site_name.aud in the Application Data directory (e.g., C:\Documents and Settings\All Users\Application Data\Globalscape\EFT Enterprise\MySite.aud; On Windows 2008, Application Data files for all users are in a hidden folder named %systemroot%\ProgramData instead of under Documents and Settings\All Users\Application Data). The Site label is also used in the Virtual File System (e.g., C:\Inetpub\EFTRoot\MySite\Usr) and in logs and reports.
Next to the Listening IPs box, click Configure. The Listening IP Settings dialog box appears.
The dialog box displays the IP addresses that are available on the computer, in addition to All Incoming (IPv4) and All Incoming (IPv6).
You cannot type in an address.
IPv6 is not enabled by default for security reasons; IPv4 is enabled by default.
The "All" options are exclusive. That is, you can't select All Incoming (IPv4) and then one or more specific IP addresses. However, you can select multiple individual addresses if none of the "All" options are selected.
"Link local" appears next to certain IPv6 addresses. Routers do not forward packets with link-local addresses. In IPv6, link-local addresses are always assigned, automatically or by configuration, and are required for the internal functioning of various protocol components. IPv6 requires operating systems to assign link-local addresses to network interfaces even when routable addresses are also assigned. A link-local unicast address has the prefix fe80::/10 in standard IPv6 CIDR notation.
Select one or more check boxes for the IP address(es) on which the Site is to listen for connections, and then click OK. The selected address(es) appear in the Listening IPs box.
You can copy the addresses in the Listening IPs box: Right-click in the box, click Select All, then right-click again and click Copy or use CTRL+V. (Unicode-related items on the right-click menu are a Windows feature and do not apply to EFT.)
Click Next. The Site Root Folder page appears.
In the Site root box, click Browse to specify the root folder or keep the default displayed in the box. If you type a folder name that does not exist, it will be created.
In the Additional folder options area, select the check boxes as needed:
Select the Automatically create UNIX-style subfolders check box to create Usr, Pub, Bin, and Incoming folders with appropriate permissions under the Site's root folder. This is only necessary if you are trying to mimic a typical default *nix EFT setup. It is selected by default.
Select the Automatically create and assign home folders to newly created users check box to automatically create a user folder under \Site Root\Usr\ when a new user is added. The folder name is the same as the username. For example, username jbite would have the folder C:\InetPub\EFTRoot\MySite\Usr\jbite.
|
On an AD-authenticated Site, if Automatically create and assign home folders to newly created users is enabled, EFT creates a virtual folder under the Site's physical root that points to the user's home folders assigned in AD. If Automatically create and assign home folders to newly created users is disabled, the functions for creating virtual or physical folders for AD users are disabled. |
Click Next. The User Authentication Provider page appears.
(Skip this step if you are creating an AD-authenticated Site or not using RADIUS or RSA; RADIUS/RSA available in EFT Enterprise only.) If EFT is connecting to a server using RADIUS or RSA SecurID, select Enable RADIUS support or Enable RSA SecurID support, then click Configure. The applicable Settings dialog box appears:
In the RADIUS Server box, provide the name of the RADIUS Server (host name or IP address).
In the RADIUS Server Port box, provide the port the RADIUS Server is bound to. The default port is 1812.
In the NAS Identifier box, provide EFT’s NAS identifier for the RADIUS Server.
In the Shared secret box, provide the shared secret used to encrypt and sign packets between EFT and the RADIUS Server.
In the Connection Retries box, specify the number of times a RADIUS packet will be submitted to the server before giving up. The packet is resubmitted if there is no response from the server. (RADIUS runs over UDP, so packets may be dropped or ignored by the server). The default is 3 retries.
In the Timeout box, specify how long to wait for a server response, in seconds. The default is 3 seconds.
Click the folder icon to specify the location of the RSA Server configuration file (SDConf.rec), and then click OK.
In the Authentication provider list, specify the type of user authentication this Site is to use. (Click a link below to skip to that section.)
Globalscape EFT Authentication - Does not rely on outside sources for user information. All information in the authentication database is protected from the operating system, contained within the .aud file located in EFT Application Data or ProgramData folder and encrypted, and can only be modified through the administration interface. (e.g., C:\Documents and Settings\All Users\Application Data\Globalscape\EFT Enterprise; On Windows 2008, Application Data files for all users are in a hidden folder named %systemroot%\ProgramData instead of under Documents and Settings\All Users\Application Data.)
Windows Active Directory (AD) Authentication - Connects to an AD server for user information.
LDAP Authentication - Connects to an LDAP server for user information.
ODBC Authentication - Connects to an ODBC database for user information.
For Globalscape
|
|
||||||||||||
|
|||||||||||||
|
|||||||||||||
|
|
Specify whether to connect the Site to DMZ Gateway.
If you choose to connect to DMZ Gateway, specify its IP address and port, and then click Test Connection. If the DMZ Gateway is properly configured, the test is successful. If the test is not successful, click I'm not using the DMZ Gateway - or I'll configure it later.
If you have not yet installed or configured DMZ Gateway Server, click I'm not using the DMZ Gateway - or I'll configure it later.
Click Next. The Connection Protocols page appears.
Select one or more check boxes for the protocol(s) that this Site will use to connect to EFT and specify the port number for each protocol. The default ports appear in the boxes.
|
By default, the FTP server in Microsoft IIS binds to port 21 on all IP addresses. If you want to run both the IIS FTP server and EFT, you need to disable socket pooling for the IIS FTP server. |
If you selected FTPS, HTTP, or AS2, define the allowed SSL versions and ciphers. Click SSL options, or skip this step and leave the defaults.
In the Allowed SSL versions list, keep the default of TLS 1.0 and SSL 3.0, or click Auto Negotiable.
In the Allowed ciphers list, select the ciphers in the list or click Manually specify ciphers and provide the ciphers in the Command box. (Manually defining ciphers should only be done by advanced users.)
|
Refer to Using Ciphers for SSL Connections with EFT for a detailed explanation of SSL versions and ciphers. If EFT is in FIPS mode, only FIPS-approved ciphers are available. |
If you selected FTPS, HTTP, or AS2, specify the SSL certificate to use for this Site. Click SSL certs. The SSL Certificate Options page appears.
To create a certificate, click Create certificate and follow the prompts in the wizard. (Refer to Creating Certificates for details, if necessary.)
To use an existing certificate:
In the Certificate box, type the path to the .crt file or click the folder icon to find and select it.
In the Private key box, type the path to the .key file or click the folder icon to find and select it.
In the Certificate passphrase and Confirm passphrase boxes, type and confirm the passphrase for the certificate pair.
|
If you do not enable SSL, you will not be able to connect to EFT from a remote administration interface. Refer to SSL Certificate-Based Login, Creating Certificates and Importing a Certificate into the Trusted Certificate Database for information regarding certificates. If you are using Secure Ad Hoc Transfer, you need to configure remote access to EFT. |
Click Next to return to the Protocols page.
If you chose SFTP, click SFTP options, and specify the algorithms this Site will use for SFTP. If FIPS mode is enabled on EFT for SFTP, only the FIPS-approved algorithms are available (i.e., fewer options will appear in the lists of algorithms).
Click Next to return to the Protocols page, and then click SFTP keys to configure an SFTP key pair. The Create SSH2 Public/Private Keypair wizard appears.
Specify a name, location, format, and bit length of the key pair, and then click Next.
Specify and confirm the passphrase to encrypt the private key, and then click Next.
Specify whether to use this key as the default host key and whether to copy the public key to the SSH key manager, and then click Finish.
After the key is generated, click Finish. You care returned to the Site Setup wizard.
Click Next to return to the Protocols page.
If you chose AS2 over HTTP/S, click Configure. The AS2 Setup Wizard appears.
Click Next.
Specify Your AS2 identifier. There is no standard for the AS2 Identifier. You can use your name, your company's name, or some other unique name. EFT validates the AS2 identifier to determine whether it is unique (not used by another partner on this EFT). If you type an ID that is not unique, the field resets to blank.
Click Next.
Specify the AS2 certificate path for signing/encryption, populated by default with the SSL certificate paths (if present) for EFT SSL communications. Click the folder icons to specify a certificate pair or click the blue create link to open the SSL certificate wizard to create a new certificate pair. (You can use the same SSL certificate that you are using for the Site.)
Click Next, then click Finish.
Click Next. The Site Setup Completed page appears.
If you specified Globalscape authentication, you are offered the option of running the user creation wizard or quitting the Site Setup wizard and creating users later. Click an option, then click Finish.
If you chose Run New User Creation wizard, the User Creation wizard Welcome page appears. Continue to Creating User Accounts for the procedure.
You can run the Site Setup wizard again at any time to create additional Sites.
You can view and modify individual Site settings in the administration interface.