Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

FTP-SFTP Conversion

FTP-SFTP conversion is available in the EFT Expansion Pack for SSH Tectia Client and SSH Tectia Server on Linux, HP-UX, Solaris, and Windows platforms. The server-side host can also run SSH Tectia Server for IBM z/OS. The principle of FTP-SFTP conversion is shown in Figure 4.7. The following steps happen during the conversion:

  1. An application, a script, or a user triggers an FTP file transfer.

  2. The Original FTP client in the File Transfer Client host starts opening a file transfer connection to the original destination (Original FTP server in File Transfer Server).

  3. The SSH Tectia Capture DLL captures the connection and redirects it to the FTP-SFTP Conversion module. The filter rules that specify which connections to capture are defined in the Connection Broker configuration. Connections can be captured based on the FTP application used and the destination address and/or port.

  4. The FTP-SFTP Conversion module manages the FTP connection so that it remains unchanged from original FTP client's point of view. Plaintext FTP is converted to encrypted SFTP.

  5. The SFTP connection is managed by the Connection Broker module.

  6. The Secure Shell SFTP server in the File Transfer Server host is the end point of the file transfer.

    The unsecured Original FTP server program can be eliminated from the server host.

The architecture of FTP-SFTP conversion

Figure 4.7. The architecture of FTP-SFTP conversion

For a sample use case, see FTP-SFTP Conversion.


 

 
PrivX
 

 

 
What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.



    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH



    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now