Server Configuration

Quick Overview

Starting with v2.0.6, a new settings page allows the configuration of all security aspects of the product.

The old procedure is still supported, and details can be found here.

Host and Rate Limit

For configuring the host and the rate limiting visit the "Settings" -> "Security"-> "Server configuration" tab.

Fill in the desired settings in the configuration window. Detailed information about the fields is provided below.

NameDescription
HostDNS name or IP Address of the machine running the MetaDefender Managed File Transfer server. A DNS name causes the server to listen on all network interfaces, while an IP address binds the server to that particular value. Note: this value is also used to generate links in email notifications.
PortThe port used to listen for connections.
Shared Memory SizeAllocated memory for rate-limiting coordination.
RateMaximum allowed requests within a defined time period.
Burst SizeMaximum requests temporarily permitted during bursts.
No DelayUseful if imposing a rate limit without constraining the allowed spacing between requests.

Enabling HTTPS

An SSL/TLS certificate must be created before activating HTTPS. Refer to the Information Regarding Certificates for obtaining a "certificate and certificate key".

  1. After creating the SSL certificate, go to the "Settings" -> "Security"-> "Server configuration" tab.
  2. Enable HTTPS Connection
  1. Fill in the desired settings in the configuration panel. Detailed information about each field is provided below.
NameDescription
Certificate PathPath of the separately created certificate.
Private Key PathPath of the created certificate private key.
Password PathOptional path of the created certificate password file.
TLS versionTLS protocol version to use. Connections with clients that do not support at least one of the configured TLS versions will fail.

Certificate paths containing whitespaces are accepted by default; there is no need to quote the paths.

  1. Click "Update" and wait to be redirected to the new URL.

Enforcing TLS Version

Upgrading from a previous version or leaving all TLS options unchecked will revert to default as follows:

  • Outbound connections (i.e. requests made by Managed File Transfer) will use the operating system's default TLS protocol
  • Inbound web requests will default to TLS v1.2 or TLS v1.3 for Managed File Transfer's web server (NGINX)

To enforce a particular TLS version, please select only that option.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard