# Server Connection: SFTP

Fields with the asterisk \* are mandatory.

<table><thead><tr><th width="230">Value</th><th>Description</th></tr></thead><tbody><tr><td><strong>SERVER NAME *</strong></td><td>Enter a unique name for the server.</td></tr><tr><td><strong>DESCRIPTION *</strong> </td><td>Provide a brief description of the server.</td></tr><tr><td><strong>PORT *</strong></td><td>Enter the port to connect to the server. This is the TCP/IP port the server will listen to in the STENG node.</td></tr><tr><td><strong>SERVER KEYLABEL *</strong></td><td>Enter the Key identifier of the key store to select Private Key and Certificate to create SSL connection.<br>The ecda-sha2-nistp25 key algorithm is supported. </td></tr><tr><td><strong>MAX SESSION</strong></td><td>Specify the maximum number of active sessions.</td></tr><tr><td><strong>CONNECTION TIMEOUT</strong></td><td>Define the number of seconds without network activity to wait before closing a session due to inactivity. Default value: 60.</td></tr><tr><td><strong>ALLOW SCP</strong></td><td>Set this toggle to ON to enable the SCP protocol.</td></tr><tr><td><strong>ALLOWED CLIENT AUTHENTICATION MODES *</strong></td><td>This field refers to the SSH client authentication mechanism. Possible values:<br>- PUBLICKEY<br>- PASSWORD<br>- PASSWORD_AND_PUBLICKEY<br>- PASSWORD_OR_PUBLICKEY</td></tr><tr><td><strong>ACCEPTED CIPHER SUITES</strong></td><td>Select the cipherSuites accepted to establish SSL connection.<br>For a list of all accepted Cipher Suites, follow this <a href="/pages/bXblCQPvaPonLHqKDwk2#accepted-cipher-suites">link</a>.</td></tr><tr><td><strong>MAC ALGORITHMS</strong></td><td><p>Possible values:</p><ul><li>HMAC_MD5</li><li>HMAC_SHA1</li><li>HMAC_SHA1_ETM</li><li>HMAC_MD5_96</li><li>HMAC_SHA1_96</li><li>HMAC_SHA256</li><li>HMAC_SHA2_256</li><li>HMAC_SHA2_256_ETM</li><li>HMAC_SHA2_512</li><li>HMAC_SHA2_512_ETM</li></ul></td></tr><tr><td><strong>KEY EXCHANGE ALGORITHMS</strong></td><td><p>Possible values:</p><ul><li>DIFFIE_HELLMAN_GROUP1_SHA1</li><li>DIFFIE_HELLMAN_GROUP14_SHA1</li><li>DIFFIE_HELLMAN_GROUP14_SHA256</li><li>DIFFIE_HELLMAN_GROUP15_SHA512</li><li>DIFFIE_HELLMAN_GROUP16_SHA512</li><li>DIFFIE_HELLMAN_GROUP17_SHA512</li><li>DIFFIE_HELLMAN_GROUP18_SHA512</li><li>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA1</li><li>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA256</li><li>ECDH_SHA2_NISTP256</li><li>ECDH_SHA2_NISTP384</li><li>ECDH_SHA2_NISTP521</li><li>CURVE25519_SHA256</li><li>CURVE25519_SHA256_LIBSSH_ORG</li><li>ECDA-SHA2-NISTP256</li></ul></td></tr></tbody></table>

<table><thead><tr><th width="229.99993896484375">DMZ mode</th><th></th></tr></thead><tbody><tr><td><strong>NONE (default)</strong></td><td>No session proxying through DMZ Gateway applied.</td></tr><tr><td><strong>PORT_FORWARDING</strong></td><td>Incoming/Outgoing connections to/from STENG server will be proxied inside an SSL tunnel without being validated in advance.<br><strong>DMZ PROXY PORT *</strong>: This port represents the tunnel that is opened for connection with the STENG Server.<br><strong>SERVER KEYLABEL</strong>: Select the label of private key to be used by the SFTP server exposed in the DMZ Gateway.<br><strong>CLIENT AUTHENTICATION MODES</strong>: This field refers to the SSH client authentication mechanism. Possible values:<br><strong>PUBLICKEY</strong><br><strong>PASSWORD</strong><br><strong>PASSWORD_AND_PUBLICKEY</strong><br><strong>PASSWORD_OR_PUBLICKEY</strong><br><br><strong>MAC ALGORITHMS</strong>: Possible values:<br><strong>HMAC_MD5</strong><br><strong>HMAC_SHA1</strong><br><strong>HMAC_MD5_96</strong><br><strong>HMAC_SHA1_96</strong><br><strong>HMAC_SHA256</strong><br><strong>HMAC_SHA2_256</strong><br><strong>HMAC_SHA2_512</strong><br><br><strong>KEY EXCHANGE ALGORITHMS</strong>: Possible values:<br><strong>DIFFIE_HELLMAN_GROUP1_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP14_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP14_SHA256</strong><br><strong>DIFFIE_HELLMAN_GROUP15_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP16_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP17_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP18_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA256</strong><br><strong>ECDH_SHA2_NISTP256</strong><br><strong>ECDH_SHA2_NISTP384</strong><br><strong>ECDH_SHA2_NISTP521</strong><br><br><strong>ACCEPTED CIPHER SUITES</strong>: It lists SSL/TLS cipher suites available in the SFTP server and exposed in the DMZ Gateway. Select the cipherSuites accepted. For a list of all accepted Cipher Suites, follow this <a href="/pages/bXblCQPvaPonLHqKDwk2#accepted-cipher-suites">link</a>. </td></tr><tr><td><strong>SESSION_TERMINATION</strong></td><td>The server session will be terminated inside the DMZ Gateway, before data is sent to STENG server.<br><strong>DMZ PROXY PORT *</strong>: This port represents the tunnel that is opened for connection with the STENG Server.<br><br><strong>SERVER PORT *</strong>: Enter the DMZ server port to be used for the connection.<br><br><strong>SERVER KEYLABEL</strong>: Select the label of private key to be used by the SFTP server exposed in the DMZ Gateway.<br><br><strong>CLIENT AUTHENTICATION MODES</strong>: This field refers to the SSH client authentication mechanism. Possible values:<br><strong>PUBLICKEY</strong><br><strong>PASSWORD</strong><br><strong>PASSWORD_AND_PUBLICKEY</strong><br><strong>PASSWORD_OR_PUBLICKEY</strong><br><br><strong>ACCEPTED CIPHER SUITES</strong>: It lists SSL/TLS cipher suites available in the SFTP server and exposed in the DMZ Gateway. Select the cipherSuites accepted. For a list of all accepted Cipher Suites, follow this <a href="/pages/bXblCQPvaPonLHqKDwk2#accepted-cipher-suites">link</a>.<br><br><strong>MAC ALGORITHMS</strong>: Possible values:<br><strong>HMAC_MD5</strong><br><strong>HMAC_SHA1</strong><br><strong>HMAC_MD5_96</strong><br><strong>HMAC_SHA1_96</strong><br><strong>HMAC_SHA256</strong><br><strong>HMAC_SHA2_256</strong><br><strong>HMAC_SHA2_512</strong><br><br><strong>KEY EXCHANGE ALGORITHMS</strong>: Possible values:<br><strong>DIFFIE_HELLMAN_GROUP1_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP14_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP14_SHA256</strong><br><strong>DIFFIE_HELLMAN_GROUP15_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP16_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP17_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP18_SHA512</strong><br><strong>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA1</strong><br><strong>DIFFIE_HELLMAN_GROUP_EXCHANGE_SHA256</strong><br><strong>ECDH_SHA2_NISTP256</strong><br><strong>ECDH_SHA2_NISTP384</strong><br><strong>ECDH_SHA2_NISTP521</strong><br><br><strong>ACCEPTED CIPHER SUITES</strong>: It lists SSL/TLS cipher suites available in the SFTP server and exposed in the DMZ Gateway. Select the cipherSuites accepted. For a list of all accepted Cipher Suites, follow this <a href="/pages/bXblCQPvaPonLHqKDwk2#accepted-cipher-suites">link</a>. </td></tr></tbody></table>

{% hint style="info" %}
The rsa-sha2-256 and rsa-sha2-512 signing algorithms (also called HostKeyAlgorithms) are included in the list of supported ssh-rsa and ssh-dss algorithms.\
They are hard-coded, so they cannot be configured.
{% endhint %}

To change any DMZ port of an SFTP server that belongs to a peer, select the server you want to update. Next, click the pencil icon in the top-right corner of the server card. Enter the new port or ports in the appropriate fields. Finally, click the **SAVE** button to confirm your changes. Remember that the new port number will only affect the peer's selected server.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.primeur.com/data-mover-1.21/transfer-protocols-and-connectors/server-connections/server-connection-sftp.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
