[Last updated on June 13, 2019] There may be instances when you'd want external users to access HTTP servers located behind your corporate firewall. A secure way of doing this is by allowing access to those servers through an HTTP reverse proxy. In this short tutorial, we'll show you the basic steps of achieving this using JSCAPE MFT Gateway.Read More
Managed File Transfer and Network Solutions
[Last updated June 10, 2019] An SFTP reverse proxy adds another layer of security to SFTP services. In addition to SFTP's ability to encrypt data in transit and provide 2-factor authentication, an SFTP reverse proxy brings in several other security-related benefits such as hiding user credentials and the identities of your internal servers. An SFTP reverse proxy can be easy to set up and this post will show you how.Read More
This is a video version of the tutorial "How To Block Suspicious IP Addresses When MFT Server Is Behind MFT Gateway". Here, you'll learn how to configure MFT Server so that it blocks IP addresses at MFT Gateway.Read More
If you've been using JSCAPE MFT Server, you probably already know it has a built-in feature that enables it to block suspicious IP addresses. However, if your MFT Server instance is placed behind a NAT or reverse proxy like JSCAPE MFT Gateway, there can be a bit of a problem.Read More
This post was originally published on July 8, 2012 but was updated on October 27, 2018
In this post, I'm going to take you through the steps of setting up JSCAPE MFT Gateway to establish load balancing across two FTP servers. Load balanced FTP servers can help you achieve high availability for mission critical file transfer services. We're going to start by creating a new FTP cluster consisting of two FTP servers. Once that FTP cluster is ready, we'll then make it accessible to clients by creating an FTP reverse proxy service that will forward client requests to that cluster.
Do you have an FTP server behind the firewall that you need to make accessible via the Internet? Here is a short tutorial on how to setup a reverse proxy to your FTP service using JSCAPE MFT Gateway as shown in Figure 1.
Note: This tutorial was originally published on July 2014 but was updated and re-published on October 15, 2018
An active-active high availability SFTP cluster can greatly reduce the chances of downtime by allowing two or more SFTP servers share the load. If you'd like to learn an easy way of setting up this kind of cluster, check out this post.
Note: This post was originally published on Sept 2016 but was updated and re-published on Oct 2018.Read More
Note: This blog post was originally published on July 19, 2012 but was updated and republished on September 19, 2018
I'm now going to show you how to enable a reverse proxy service on JSCAPE MFT Gateway. By setting up a DMZ-based JSCAPE MFT Gateway to reverse proxy for one or more file transfer servers in your internal network, you can employ DMZ streaming. This will allow you to provide trading partners and other external users access to your sensitive data without placing the data on any DMZ-based server.
One of the challenges of setting up a high availability environment for transfer servers is in making sure the servers involved have the same configurations. But if you're using JSCAPE MFT Server, there are easy ways to do it. One option is to set up your MFT Server instances to use an external RDBMS as a shared global datastore. The second is to use the Failover module. In this post, we'll focus on the latter. MFT Server's Failover module will enable you to synchronize your servers either automatically or manually with a single click.