User Connection

Select the protocol to be used for the user connection choosing among FTP, FTPS, HTTP, HTTPS, PR5 and SFTP. The same fields as the Custom connection options appear, with these additional fields for all protocols: Credential, Remote path, Local destination path (optional).

Below, you will find the fields for each protocol.

  • FTP:

    • Name and Description: enter the name and description of the server. They will appear on the card.

    • Host and Port: specify the host and port where the server is installed.

    • Connection Timeout: enter the number of seconds to wait without network activity before closing a session due to inactivity.

    • Max retry: if this field is empty or set to 0, no retries will occur, and the connection will fail if the first attempt is unsuccessful. The higher the value, the greater the number of retry attempts.

    • Retry interval: this field appears only if the maximum number of retries is set to 1 or more. It indicates the number of seconds to wait before retrying the connection. A lower value results in more frequent retry attempts. If this field is empty or set to 0, no retries will be executed.

    • Operation mode: define how the data connection is established. Possible values are:

      • ACTIVE (default): the client establishes a control connection to the server, and the server then establishes a data connection back to the client.

      • PASSIVE: the client establishes both the control connection and the data connection to the server.

    • Credential: select or enter the access credential for the remote connection. Listed Credentials are configured in SettingsSecurityCredentials.

    • Remote path: configure the remote path that will be used during the connection. By clicking the Choose icon, a connection will be established to the server using the credentials provided in the previous field. Once connected, the server's folders will be displayed. Select the folders you want to be listed in the actions of the Rules (for example in the Push to remote action) and in the File Event Listeners Remote option. Then, click Confirm.

    • Local destination path: optionally select a local destination path.

  • FTPS: same as FTP with additional fields:

    • Client key: select the Key identifier for the SSL connection or create a new Key. Listed Keys are configured in SettingsSecurityKey Store.

    • Data Protection: force data channel protection. Possible values:

      • PROTECTED (default value)

      • CLEARTEXT

    • SSL IMPLICIT: enable this toggle button if the partner decides if the data channel must be protected or not.

    • AUTHENTICATION PROTOCOLS: select All or Only specific values:

      • SSLv3

      • TLSv1

      • TLSv1.1

      • TLSv1.2

    • Accepted cipher suites: select All or Only specific values to load the list of values available.

    • Match Server Hostname: By default, it is disabled. Enable the toggle button if the client must verify that the Distinguished Name (DN) certificate contains the IP that has been contacted (i.e., the HOST value above).

  • HTTP:

    • Name: this is the name that will be displayed on the card.

    • Port and Host: specify the port and host where the server is installed.

    • Description: provide a brief description of the server. It will appear on the card.

    • Timeout: this is the duration, in seconds, that the system will wait without network activity before closing the connection due to inactivity.

    • Max retry: if this field is empty or set to 0, no retries will occur, and the connection will fail if the first attempt is unsuccessful. The higher the value, the greater the number of retry attempts.

    • Credential: select or enter the access credential for the remote connection. Listed Credentials are configured in SettingsSecurityCredentials.

    • Remote path: configure the remote path that will be used during the connection. By clicking the Choose icon, a connection will be established to the server using the credentials provided in the previous field. Once connected, the server's folders will be displayed. Select the folders you want to be listed in the actions of the Rules (for example in the Push to remote action) and in the File Event Listeners Remote option. Then, click Confirm.

    • Local destination path: optionally select a local destination path.

  • HTTPS: same as HTTP with an additional Client key field to set the Key identifier for the SSL connection or to create a new Key.

  • SFTP: same as HTTP with these additional fields:

    • Session Timeout: seconds without network activity to wait before closing a session due to inactivity.

    • Allowed client authentication modes: possible values:

      • PUBLICKEY

      • PASSWORD

      • PASSWORD_AND_PUBLICKEY

      • PUBLICKEY_AND_PASSWORD

    • Client key: select the Key identifier for the SSL connection or create a new Key. Listed Keys are configured in SettingsSecurityKey Store.

    • Accepted cipher suites: select All or Only specific values to load the list of values available.

    • Key Exchange Algorithms: select All or Only specific values to load the list of values available.

    • Mac Algorithm: select All or Only specific values to load the list of values available.

    • Read buffer size: dimension of the buffer when reading a file on the SSH Channel. Default: 65536 bytes. The values accepted are 32, 64 and 128 kb.

    • Write buffer size: dimension of the buffer when writing a file on the SSH Channel. Default: 32768 bytes. The values accepted are 32, 64 and 128 kb.

    • Auxiliary buffer size: dimension of the auxiliary buffer when reading or writing a file in the VFS. Default: 8192 bytes.

A card or a row for the configured connection will appear. The card or row is provided with the following options appearing when clicking the 3-dot icon:

  • Test: test the connection. You can click the Test button to start the test without credential. By enabling the Use Credential toggle button, you can select the credential from the drop-down list or enter the username and the password manually.

  • Clone: create a copy of the connection. The -copy suffix will be added to the name but you can change the full name as needed.

  • Navigate: access the remote server either with a configured credential or entering the username and password. Then, you can explore the folders and files in the VFS.

  • Disable: turn off the remote server, without removing it from the list.

  • Delete: remove the remote server from the list.

Last updated