# Client Connection: SFTP

Fields with the asterisk **\*** are mandatory.

<table><thead><tr><th width="229.99993896484375">Properties</th><th>Description</th></tr></thead><tbody><tr><td><strong>STATUS</strong></td><td><p>Enable or disable the client connection. Possible values:</p><ul><li>Enabled (default)</li><li>Disabled</li></ul></td></tr><tr><td><strong>NAME *</strong></td><td>Name of the SFTP connection you are creating. The maximum number of characters is 128. Blanks and the ' " | special characters are not supported.</td></tr><tr><td><strong>DESCRIPTION</strong></td><td>Description of the SFTP connection you are creating. The maximum number of characters is 2048.</td></tr><tr><td><strong>HOST *</strong></td><td>Remote host IP Address or hostname.</td></tr><tr><td><strong>PORT *</strong></td><td>Port to connect to the remote host (1 to 65535).</td></tr><tr><td><strong>USERNAME *</strong></td><td>Username to be used for the connection. The maximum number of characters is 320.</td></tr><tr><td><strong>PASSWORD *</strong></td><td>User password.</td></tr><tr><td><strong>CONNECTION TIMEOUT</strong></td><td>Number of seconds without network activity to wait before closing a session due to inactivity.<br>Default value: 60.</td></tr><tr><td><strong>CLIENT AUTHENTICATION MODE *</strong></td><td><p>Possible values:</p><ul><li>PUBLICKEY</li><li>PASSWORD</li><li>PASSWORD_AND_PUBLICKEY</li><li>KEYBOARD_INTERACTIVE</li><li>PUBLICKEY_AND_PASSWORD</li></ul></td></tr><tr><td><strong>CONNECTION MODE *</strong></td><td><p>How data connection is established. Possible values:</p><ul><li>ACTIVE (default): the client opens the control connection to the server.<br>When a data transfer is required, the server initiates the data connection back to the client.</li><li>PASSIVE: the client opens the control connection and, when needed, also initiates the data connection to the server.</li></ul></td></tr><tr><td><strong>CONNECT THROUGH DMZ</strong></td><td><p>Enable or disable DMZ proxy. Possible values:</p><ul><li>Enabled</li><li>Disabled (default )</li></ul></td></tr><tr><td><strong>SELECT DMZ CLUSTER</strong></td><td>When the <strong>Connect through DMZ toggle</strong> is enabled, this drop-down list displays all DMZ Clusters configured in <strong>Setup</strong> → <a href="/pages/4oSvqNmGyG9JKaK1PoxP">DMZ Clusters</a>. When you select one or more DMZ clusters, they will be applied to the client connection. If one of the selected DMZ clusters is unavailable, the remaining DMZ clusters will be used in <strong>RUNTIME</strong> or <strong>ROUNDROBIN</strong> mode. If no DMZ cluster is selected, all configured DMZ clusters will be used automatically.</td></tr><tr><td><strong>CLIENT KEY LABEL</strong></td><td>Key identifier to create the SSL connection.<br>Enter a key configured in the Key Store. <br>The ecda-sha2-nistp25 key algorithm is supported. </td></tr><tr><td><strong>ACCEPTED CIPHER SUITES</strong></td><td><p>Select the cipher suites. Possible values:</p><ul><li>ALL</li><li>ONLY SPECIFIC VALUES. See <a href="/pages/bXblCQPvaPonLHqKDwk2#accepted-cipher-suites">ACCEPTED CIPHER SUITES</a> for details.</li></ul></td></tr><tr><td><strong>MAC ALGORITHMS</strong></td><td><p>Select the MAC SSH algorithms: ALL or specific values in the drop-down list.</p><ul><li>ALL </li><li><p>ONLY SPECIFIC VALUES:</p><ul><li>HMAC_MD5</li><li>HMAC_SHA1</li><li>HMAC_SHA1_ETM</li><li>HMAC_MD5_96</li><li>HMAC_SHA1_96</li><li>HMAC_SHA256</li><li>HMAC_SHA2_256</li><li>HMAC_SHA2_512</li><li>HMAC_SHA2_256_ETM</li><li>HMAC_SHA2_512_ETM</li></ul></li></ul></td></tr><tr><td><strong>KEY EXCHANGE ALGORITHMS</strong></td><td><p>Select the SSH Key Exchange algorithms: ALL or specific values in the drop-down list.</p><ul><li>ALL</li><li><p>ONLY SPECIFIC VALUES</p><ul><li>DIFFIE_HELLMAN_GROUP1_SHA1</li><li>DIFFIE_HELLMAN_GROUP14_SHA1</li><li>DIFFIE_HELLMAN_GROUP14_SHA256</li><li>DIFFIE_HELLMAN_GROUP15_SHA512</li><li>DIFFIE_HELLMAN_GROUP16_SHA512</li><li>DIFFIE_HELLMAN_GROUP17_SHA512</li><li>DIFFIE_HELLMAN_GROUP18_SHA512</li><li>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA1</li><li>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA256</li><li>ECDH_SHA2_NISTP256</li><li>ECDH_SHA2_NISTP384</li><li>ECDH_SHA2_NISTP521</li><li>CURVE25519_SHA256</li><li>CURVE25519_SHA256_LIBSSH_ORG</li></ul></li></ul></td></tr><tr><td><strong>SESSION TIMEOUT</strong></td><td>Define the number of seconds without network activity to wait before closing a session due to inactivity. Default value: 60.</td></tr><tr><td><strong>READ BUFFER SIZE</strong></td><td>Dimension of the buffer when reading a file on the SSH Channel.<br>Default: 65536 bytes<br>The values accepted are 32, 64 and 128 kb.</td></tr><tr><td><strong>WRITE BUFFER SIZE</strong></td><td>Dimension of the buffer when writing a file on the SSH Channel.<br>Default: 32768 bytes<br>The values accepted are 32, 64 and 128 kb.</td></tr><tr><td><strong>AUXILIARY BUFFER SIZE</strong></td><td>Dimension of the auxiliary buffer when reading or writing a file in the DataOne VFS<br>Default: 8192 bytes</td></tr><tr><td><strong>MAX RETRIES *</strong></td><td>Maximum number of retries. If this field is empty or set to 0, no retries will be executed and the job will be set to Failed if the first attempt is not successful. A high value corresponds to a high number of retrying attempts.</td></tr><tr><td><strong>RETRY INTERVAL</strong></td><td>This field will appear only if you have set the maximum numbers of retries to 1 or greater.<br>Time (in seconds) waited before retrying executing a job. The lower the value, the more frequent the retrying attempts. If this field is empty or set to 0, no retries will be executed and the job will be set to Failed if the first attempt is not successful.</td></tr><tr><td><strong>CONFIGURATION TEST</strong></td><td>Use this section to test that the <strong>Cluster</strong> and the <strong>STENG</strong> are connected correctly. Select a <strong>Cluster</strong> and a <strong>STENG</strong> you want to test and click the <strong>TEST</strong> button. Data One <strong>automatically</strong> selects a <strong>Cluster</strong> and a <strong>STENG</strong> to test the connection. Note that a Cluster will be selected only if it is the only one available.<br>A message with a green check will confirm a successful connection. A message with a red exclamation mark will warn about an unsuccessful connection. The message also details the reason why the connection fails.<br>The connection might not be successful for different reasons, each of them depending on the transport type and the configuration.<br>The first time you try to test the connection, if trusting certificates are missing, an error message detailing the unsuccessful connection will appear. In this case, go to <strong>Setup</strong> → <strong>Untrusted Cache</strong> → <strong>Certificates</strong> tab and trust the relevant certificates.<br>Note that trusting certificates in the Untrusted Cache page may not be sufficient to establish a successful connection. Refer to the <a href="/pages/riYYXT6YPDLkxQCEKrVk">Untrusted Cache</a> section of this documentation for all the details.</td></tr></tbody></table>

The rsa-sha2-256 and rsa-sha2-512 signing algorithms (also called HostKeyAlgorithms) are included in the list of supported ssh-rsa and ssh-dss algorithms.\
They are hard-coded, so they cannot be configured.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.primeur.com/data-mover-1.21/transfer-protocols-and-connectors/client-connections/client-connection-sftp.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
