SSH Tectia  
Previous Next Up [Contents] [Index]

    About This Document >>
    Installing SSH Tectia Server for IBM z/OS >>
    Getting Started with SSH Tectia Server for IBM z/OS >>
    Configuring the Server >>
    Configuring the Client >>
    Authentication >>
    File Transfer Using SFTP >>
    File Transfer Using Transparent FTP Tunneling >>
        Configuring SOCKS Proxy >>
        Creating the SSHSP User
        Running SOCKS Proxy >>
        Using Public-Key Authentication with the SOCKS Proxy >>
        Configuring FTP >>
        Examples of Transparent FTP Tunneling>>
            System-Wide Transparent FTP Tunneling with Fallback
            JCL-Specific Transparent FTP Tunneling
    Tunneling on the Command Line >>
    Troubleshooting SSH Tectia Server for IBM z/OS >>
    Advanced Information >>
    Man Pages >>
    Log Messages >>

System-Wide Transparent FTP Tunneling with Fallback

In this example transparent FTP tunneling is configured to secure file transfers to three different subnets (10.70.20.0/24, 172.16.8.0/21, and 192.168.93.0/25). Configuration is done system-wide affecting all FTP batch jobs and interactive sessions to those three subnets. FTP connections to other addresses are not affected.

In this example SSH Tectia SOCKS Proxy is configured to fall back to plain FTP if securing the connection fails. Fallback is a usable feature during the migration phase but must be turned off once all connections are working correctly.

Do the following steps:

  1. Copy the /etc/ssh2/ssh-socks-proxy-config-example.xml configuration file to /etc/ssh2/ssh-socks-proxy-config.xml (if it does not exist yet), and edit the file to enable fallback to plaintext FTP:
      <filter-engine>
         <dns id="id1_dns"
              ip-address=".*"
              pseudo-ip="NO" />
         <filter dns-id="id1_dns"
                 ports="21"
                 action="ftp-tunnel"
                 profile-id="id1"
                 fallback-to-plain="YES" />
      </filter-engine>
    
  2. Start the SOCKS Proxy if it is not already running.

    If the SOCKS Proxy is already running, take the updated configuration in use as instructed in Section Reconfiguring ssh-socks-proxy.

  3. Edit the system-wide FTP configuration file SYS1.TCPPARMS(FTPDATA) to include the following lines:
    SOCKSCONFIGFILE  EXAMPLE.SYSTEM.SOCKS.CONF
    FWFRIENDLY       TRUE
    
  4. Create a new SOCKS configuration dataset EXAMPLE.SYSTEM.SOCKS.CONF with the following contents:
    sockd @=127.0.0.1 10.70.20.0 255.255.255.0 
    sockd @=127.0.0.1 172.16.8.0 255.255.248.0 
    sockd @=127.0.0.1 192.168.93.0 255.255.255.128 
    direct 0.0.0.0 0.0.0.0
    

Previous Next Up [Contents] [Index]


[ Contact Information | Support | Feedback | SSH Home Page | SSH Products ]

Copyright © 2007 SSH Communications Security Corp.
This software is protected by international copyright laws. All rights reserved.
Copyright Notice