Server Configuration
You can configure TIBCO MFT Platform Server to act as a responder.
See the following default server (responder) configuration for
TIBCO MFT Platform Server.
# [ SERVER ] ListenAdapterIP: All { All, IpName/Address } ListenAdapterIPv6: All { All, IpName/AddressIPv6 } Port: 46464 PortIPv6: N { N, IPv6 Port } TraceLevel: N { N, Low|L, Medium|M, High|H } TracePath: /mftps/trace/Responder { N, Path } TraceSizeServer: N { N, # of Kb } ConvTbl: N { N, FileName } ExitPrgm: N { N, FileName } RequiredNodeDefinition: N { N, Y } AcceptVerifiedUser: N { N, Y } ResponderProfile: N { N, Y, D } AllowRoot: N { N, All, Password } Umask_Default: N { N, 3 digit number } Uperm_Default: N { N, 3 digit number } Timeout: 120 { Transfer timeout in min } RunCyberRespAsNonRoot: N { Y, N } ClassOfService: Default { from cfcos.cfg } PamAuth: N { N, service_name } # When RunCyberRespAsNonRoot is set to Y ResponderProfile must be set to Y # SSL Communication Additional Parameters. SSLPort: 56565 SSLPortIPv6: N { N, IPv6 Port } TunnelPort: 58585 TunnelPortIPv6: N { N, IPv6 Port } ClientVerification Y { N, Y } CertificateKeyFileName: PrivateKeyFileName: PrivateKeyPwdFileName: TrustedAuthorityFileName: AuthorizationFileName: N { N, FileName } SSLTraceLevel: N { N, Y } SSLTracePath: /mftps/trace/SSLResponder { N, Path } CheckCRL: N { N, Y } CAPath: SSLEnabledProtocols: TLSV1,TLSV1.1,TLSV1.2 { TLSV1,TLSV1.1,TLSV1.2 } Ciphers: HIGH { openssl_cipher_list }
Copyright © 2022. Cloud Software Group, Inc. All Rights Reserved.