Server Configuration

You can configure TIBCO MFT Platform Server to act as a responder.

See the following default server (responder) configuration for TIBCO MFT Platform Server.
# [ SERVER ]
ListenAdapterIP:         All                        { All, IpName/Address }
ListenAdapterIPv6:       All                    { All, IpName/AddressIPv6 }
Port:                    46464 
PortIPv6:                N                                 { N, IPv6 Port } 
TraceLevel:              N                   { N, Low|L, Medium|M, High|H }
TracePath:               /mftps/trace/Responder                 { N, Path }
TraceSizeServer:         N                                   { N, # of Kb }
ConvTbl:                 N                                  { N, FileName }
ExitPrgm:                N                                  { N, FileName }
RequiredNodeDefinition:  N                                         { N, Y }
AcceptVerifiedUser:      N                                         { N, Y }
ResponderProfile:        N                                      { N, Y, D }
AllowRoot:               N                             { N, All, Password }
Umask_Default:           N                            { N, 3 digit number }
Uperm_Default:           N                            { N, 3 digit number }
Timeout:                 120                    { Transfer timeout in min }
RunCyberRespAsNonRoot:   N                                         { Y, N }
ClassOfService:          Default                         { from cfcos.cfg }
PamAuth:                 N                              { N, service_name }
# When RunCyberRespAsNonRoot is set to Y ResponderProfile must be set to Y

# SSL Communication Additional Parameters.  
SSLPort:                56565 
SSLPortIPv6:            N                                  { N, IPv6 Port } 
TunnelPort:             58585                                          
TunnelPortIPv6:         N                                  { N, IPv6 Port }
ClientVerification      Y                                          { N, Y }
CertificateKeyFileName: 
PrivateKeyFileName: 
PrivateKeyPwdFileName: 
TrustedAuthorityFileName: 
AuthorizationFileName:  N                                   { N, FileName }
SSLTraceLevel:          N                                          { N, Y } 
SSLTracePath:           /mftps/trace/SSLResponder               { N, Path }
CheckCRL:               N                                          { N, Y }
CAPath:                                                            
SSLEnabledProtocols:    TLSV1,TLSV1.1,TLSV1.2     { TLSV1,TLSV1.1,TLSV1.2 }
Ciphers:                HIGH                        { openssl_cipher_list }