Home

Serv-U Distributed Architecture Guide

image

Contents

1. SSH HTTP and HTTPS Serv U Gateway stitches el bh a N incoming client connection D to listener from Serv U aa d Serv U MFT Web Farm wi Redundant Gateways Q Rh j n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 10 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Firewall Configuration The primary firewall supports FTP FTPS SSL TLS SFTP SSH HTTP and or HTTPS inbound connections from the Internet into Serv U This firewall may also be configured to allow outbound connections for support FTP S active mode data connections or may be FTP aware enough to open FTP data channels dynamically The firewall between the DMZ segment and the internal network only needs to allow outbound connections from each of the Serv U servers to each of the Serv U Gateways over TCP port 1180 Load Balancer A network load balancer must be used to distribute incoming connections to each Serv U Gateway Load balancers should be configured to preserve original IP addresses if you want to use Serv U s IP lockout protection Load balancers should also use sticky sessions that lock all incoming connections from a particular IP address to a specific Serv U server to allow FTP and FTPS connections to work properly No load balancer is required between the Serv U Gateway tier and the Serv U server tie
2. SSH HTTP and or HTTPS inbound connections from the Internet into Serv U This firewall may also be configured to allow outbound connections for support FTP S active mode data connections or may be FTP aware enough to open FTP data channels dynamically Load Balancer A network load balancer must be used to distribute incoming connections to each Serv U server Q Rh i n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 8 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Load balancers should be configured to preserve original IP addresses if you want to use Serv U s IP lockout protection Load balancers should also use sticky sessions that lock all incoming connections from a particular IP address to a specific Serv U server to allow FTP and FTPS connections to work properly Remote Storage All user home folders virtual folders and other Serv U folders must be configured to use remote storage e g NAS or file shares rather than local hard drives Serv U must be able to make a CIFS Windows networking connection to those resources Remote Authentication All Serv U domains must use remote authentication provided by an ODBC compliant database or Microsoft Active Directory AD e If Serv U accesses an ODBC compliant database for remote authentication then Serv U must be
3. but Serv U Gold or Serv U Platinum should be used if you support SFTP SSH or HTTPS transfers or plan to leverage external authentication sources A No connections are N made from the DMZ to the internal network DB Server or Active Directory ll g 7 Serv U A Gateway for authentication optional Firewall Tun Le 4 Firewall Remote storage including NAS and file shares optional Serv U connects to Serv U Gateway to CH listen for new traffic Serv U connects to back end as needed q Serv U Gateway stitches w N incoming client connection gt to listener from Serv U Clients connect to Serv U 8 Gateway with FTP FTPS SFTP SSH HTTP and HTTPS WA Basic Serv U MFT Deployment Technically Serv U Bronze can also be deployed in this architecture but Serv U Bronze does not support any secure protocols Firewall Configuration The firewall between the Internet and the DMZ segment supports FTP FTPS SSL TLS SFTP SSH HTTP and or HTTPS inbound connections from the Internet into Serv U This firewall may also be configured Q Rh i n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 6 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide to allow outbound connections for support FTP S active mode data connections or may be FTP a
4. Serv U may be deployed on different operating systems e g your Internet facing Serv U Gateway can be deployed on Linux even if you have deployed your Serv U server on Windows However all Serv U Gateways should use the same operating system and all Serv U Servers should use the same operating system whenever possible Advantages Active redundancy means that your Serv U application servers are not single points of failure Completely satisfies MFT requirement that no data at rest exists in the DMZ Satisfies most security policy requirements by ensuring direct connections to internal storage internal databases or Active Directory domain controllers are only made between computers on your trusted internal network No CIFS AD or DB connections are ever made across a firewall Disadvantages More difficult to set up than single node or single tier systems Must install Serv U on each application server and point to the same shared resources Must also configure a load balancer and configure Serv U Gateways on both Serv U servers Live user statistics may be unreliable for individual users who sign on to multiple servers simultaneously This can be partially mitigated for end users who sign on from a single IP at a time by using sticky sessions on your load balancer Q Rh in oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 12 of 15 the global leader in affordable file transfer Copyright 2012 Rhino S
5. instructions to set up an authentication database in support of Serv U web farms Supported databases include SQL Server Oracle Database MySQL PostGres and several other ODBC compliant relational databases The use of RhinoSoft Premium Support is recommended for all HA or multi tier deployments This level of support was developed for customers who use Serv U in mission critical situations and includes e Live phone support e 2 4 hour priority response via email f H Serv U Distributed Architecture Guide v12 0 0 0 Page 15 of 15 RhinoSoft E Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer
6. single firewall It may be connected to remote storage or remote authentication sources All editions of Serv U Bronze Silver Gold and Platinum may be deployed in this architecture but only Serv U Gold and Serv U Platinum may leverage external authentication sources DB Server or Active Directory W s Serv U for authentication optional T m Remote storage including NAS and file shares optional Clients connect to Serv U Serv U connects to with FTP FTPS SFTP back end as needed SSH HTTP and HTTPS Basic Serv U Deployment Firewall Configuration The primary firewall supports FTP FTPS SSL TLS SFTP SSH HTTP and or HTTPS inbound connections from the Internet into Serv U This firewall may also be configured to allow outbound connections for support FTP S active mode data connections or may be FTP aware enough to open FTP data channels dynamically Variations e If Serv U accesses remote storage e g NAS or file shares then Serv U must be able to make a CIFS Windows networking connection to those resources Q Rh j n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 4 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide e If Serv U accesses an ODBC compliant database for remote authentication then Serv U must be able to make a database
7. Serv U Distributed Architecture Guide Serv U Distributed Architecture Guide Horizontal Scaling and Application Tiering for High Availability Security and Performance Q Rh j n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 1 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Introduction Serv U is a high performance secure file transfer server for Windows and Linux It supports FTP FTPS SSL TLS SFTP SSH HTTP and HTTPS connections and includes optimized interfaces for web browsers and mobile devices e g iPad iPhone BlackBerry Android and Kindle Fire To support stringent redundancy security and performance requirements Serv U supports both multi tier and high availability architectures This document describes Serv U s support for these distributed architectures and their relative advantages and disadvantages No Data in DMZ for Managed File Transfer A multi tier Serv U Serv U Gateway deployment allows you to meet a common managed file transfer requirement never store data at rest in a DMZ Our Serv U Gateway safely proxies incoming connections from the Internet to your Serv U server without opening any connections from the Internet or your DMZ segment into your trusted networked High Availability through Horizontal Scaling Both our core Serv
8. U server and our Serv U Gateway can be deployed in N 1 configurations to achieve high availability through horizontal scaling This allows you to avoid single points of failure or scale up to meet your needs Q Rh j n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 2 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Table of Contents DIE OCLUCHION EE 2 No Data in DMZ for Managed File Transfer 2 High Availability through Horizontal Scalinmg 2 Basic Deployment cede ee ceil See tei ee Een 4 Basic Multi Tier MFT Deplovment 6 Basic High Availability N 1 Deployment cccccccsccccceessececeesecececuecececseeeeceesaeeeeecsaeeeceesaeeeeeesaeeeseesaeeeeeses 8 Highly Available Multi Tier MFT Deployment ccccccessccecssscesecssscececssecececeseececseesececesaeseeseeseeeceseaeees 10 Gateway Communication D tailSissss rer eseese eseten excess eege deed edeedte ged 13 Additional Ee 15 g H Serv U Distributed Architecture Guide v12 0 0 0 Page 3 of 15 RhinoSoft v12 000 Page 30 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Basic Deployment When Serv U is deployed as a standalone server it is typically protected from the Internet by a
9. able to make a database appropriate connection to that database For example SQL Server connections are often made over TCP port 1433 e If Serv U accesses Active Directory AD for remote authentication then your Serv U server must be part of the AD domain and on the same network segment Variations e On Windows Server the built in Windows Network Load Balancer service may be used instead of a physical load balancer Advantages e Active redundancy means that your Serv U application servers are not single points of failure Disadvantages e More difficult to set up than single node systems Must install Serv U on each application server and point to the same shared resources e Direct connections from Serv U to internal storage internal databases or Active Directory domain controllers are not permitted by many security policies e Live user statistics may be unreliable for individual users who sign on to multiple servers simultaneously This can be partially mitigated for end user statistics not group statistics for end users who sign on from a single IP at a time via sticky sessions on your load balancer f H Serv U Distributed Architecture Guide v12 0 0 0 Page 9 of 15 RhinoSoft HE Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Highly Available Multi Tier MFT Deployment S
10. appropriate connection to that database For example SQL Server connections are often made over TCP port 1433 e If Serv U accesses Active Directory AD for remote authentication then your Serv U server must be part of the AD domain and on the same network segment Advantages e Easiest configuration to set up This configuration is recommended during functional evaluation of Serv U software Disadvantages e No active redundancy means the Serv U server is a single point of failure e Direct connections from Serv U to internal storage internal databases or Active Directory domain controllers are not permitted by many security policies Q Rh in oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 5 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Basic Multi Tier MFT Deployment The Serv U Gateway allows you to deploy Serv U in a multi tier architecture that meets or exceeds most managed file transfer MFT security requirements This architecture allows you to e Terminate all incoming transfer connections on a hardened server located in your DMZ segment e Ensure no data is ever stored in your DMZ segment e Avoid opening any inbound connections from your DMZ segment to the internal network Serv U Silver Serv U Gold and Serv U Platinum may all be deployed in this architecture
11. e Guide Additional References The Serv U User s Manual describes how to set up domains groups user and folders to support a Serv U HA deployment The following sections are particularly pertinent e Mapping home folders and virtual folders to Windows Shares o Virtual Paths section Physical Path subsection o User Information section Home Directory subsection o Directory Access Rules section Access as Windows Users subsection e Using a common share to handle SSH keys SSL certificates server welcome message FTP message files event command executables and log files o User Information section SSH Public Key Path subsection o Encryption section Configuring SSL for FTPS and HTTPS subsection o Encryption section SFTP Secure File Transfer over SSH2 subsection o FTP Settings section Server Welcome Message subsection o FTP Settings section Message Files subsection o Serv U Events section Execute Command Actions subsection o Configuring Domain Logs section Log File Path subsection e Using external authentication o Domain Settings to set database based or Active Directory authentication o Serv U Database Integration Guide for database based authentication o Serv U Windows Groups section for Active Directory authentication The Serv U Database Integration Guide contains detailed information and
12. erv U can be deployed as a web farm of application servers to provide highly available HA services through horizontal scaling a k a N 1 It can also be deployed in a multi tier architecture that meets or exceeds most managed file transfer MFT security requirements Together this sophisticated architecture allows you to e terminate all incoming transfer connections on a hardened server located in your DMZ segment e ensure no data is ever stored in your DMZ segment e avoid opening any inbound connections from your DMZ segment to the internal network e avoid single points of failure e scale up or down to meet actual demand Serv U Gold and Serv U Platinum are the only Serv U editions that support HA multi tier deployments because Serv U s HA configuration requires the use of external authentication sources Up to five Serv U servers and three Serv U Gateways are currently allowed in this configuration x No connections are N made from the DMZ K to the internal network a a serv u Serv U d En i Gateway a EEN H DB Server or Active Directory D serv u for authentication D d S u w Serv U com Gateway e O me D 2 E m e A Serv U Remote storage including NAS and file shares Serv U connects to Serv U Gateway to A listen for new traffic Clients connect to Serv U Serv U connects to Gateway with FTP FTPS SFTP back end as needed
13. oftware Inc RhinoSoft com All Rights Reserved Serv U Distributed Architecture Guide Gateway Communication Details Serv U Gateway is able to act as a secure reverse proxy by avoiding direct connections from the Internet or the DMZ into the internal network Behind the scenes all inbound connections are served by Serv U Gateway by tying them to outbound connections from the internally based Serv U server This allows Serv U Gateway to perform its duty without ever making an inbound connection from the DMZ segment to the trusted network Ki No connections are N made from the DMZ N gt to the internal network M Serv U Gateway serv u Firewall Firewall Serv U connects to Serv U Gateway and tells it to listen for client connections on specific IP addresses and ports This connection is held open as the gateway control channel or GCC Step 1 A client connects to Serv U Gateway tells Serv U about new connection Step 2 Gateway gt over existing GCC Serv U checks client s IP address and performed other authentication as necessary If client is approved Serv U opens a new Step 3 lt connection to use as the gateway data channel or GDC to the Serv U Gateway St 4 Gateway stitches the client connection to ep the new GDC created for this connection Data transfer occurs safely between client and Serv U Serv U Gateway Communication Technical Details Assumption
14. r Remote Storage All user home folders virtual folders and other Serv U folders must be configured to use remote storage e g NAS or file shares rather than local hard drives Each Serv U server must be able to make a CIFS Windows networking connection to those resources Remote Authentication All Serv U domains must use remote authentication provided by an ODBC compliant database or Microsoft Active Directory AD e If Serv U accesses an ODBC compliant database for remote authentication then each Serv U server must be able to make a database appropriate connection to that database For example SQL Server connections are often made over TCP port 1433 e If Serv U accesses Active Directory AD for remote authentication then your Serv U server must be part of the AD domain and on the same network segment Variations e On Windows Server the built in Windows Network Load Balancer service may be used instead of a physical load balancer to provide load balancing services to Serv U Gateway e The two firewalls represented in the diagram are sometimes two legs of a single firewall controlling access between multiple segments f H Serv U Distributed Architecture Guide v12 0 0 0 Page 11 of 15 RhinoSoft v12 000 Page 11 0 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Serv U Gateway and
15. rms any necessary IP checks and authentication against its own database or internal resources 3 If Serv U approves the incoming connection Serv U makes a new outbound connection from Serv U to the Serv U Gateway This second connection can be thought of as the gateway data channel or GDC If Serv U denies the incoming connection Serv U tells Serv U Gateway to deny the connection via the GCC and Serv U Gateway terminates the requesting client s connection 4 Serv U Gateway stitches the original client connection and the GCD created for the approved connection together From that point forward data transfer occurs between the client and Serv U until either side terminates the session Security e Use of protocols that encrypt data in transit e g FTPS SFTP over SSH and HTTPS is supported and encouraged when clients connect to Serv U Gateway e The communication channels between Serv U and Serv U Gateway always encrypt all traffic between those two machines regardless of the protocol the client used to connect This provides end to end secure transport when clients use a secure protocol e No data or authentication information is ever stored at rest in the DMZ f H Serv U Distributed Architecture Guide v12 0 0 0 Page 14 of 15 RhinoSoft v12 000 Page 140 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architectur
16. s e The firewall guarding access from the Internet to the DMZ segment is configured to allow standard file transfer services e g FTP S SFTP via SSH HTTPS etc to Serv U Gateway e The firewall guarding access from the DMZ segment to the trusted internal network does not permit any connections from the DMZ to the internal network e Serv U Gateway is powered up and listening for connections in the DMZ segment e Serv U is installed in the trusted internal network Q Rh j n oSoft Serv U Distributed Architecture Guide v12 0 0 0 Page 13 of 15 Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Communication Walkthrough 1 When a Serv U server starts up it tries to connect to all its configured Serv U Gateways As it connects to each one Serv U provides specific instructions to each Serv U Gateway about the protocols IP addresses and ports it should use to serve connections from the Internet The connection Serv U uses to provide this information is opened and reestablished as necessary so Serv U Gateway can send messages back to Serv U This connection can be thought of as the gateway control channel or GCC 2 When a file transfer client e g web browser iPad or FTP client opens a connection to Serv U Gateway Serv U Gateway will ask about the connection over the existing GCC Serv U perfo
17. ware enough to open FTP data channels dynamically The firewall between the DMZ segment and the internal network only needs to allow outbound connections from Serv U to Serv U Gateway over TCP port 1180 Variations e If Serv U accesses remote storage e g NAS or file shares then Serv U must be able to make a CIFS Windows networking connection to those resources e If Serv U accesses an ODBC compliant database for remote authentication then Serv U must be able to make a database appropriate connection to that database For example SQL Server connections are often made over TCP port 1433 e If Serv U accesses Active Directory AD for remote authentication then your Serv U server must be part of the AD domain and on the same network segment e The two firewalls represented in the diagram are really often two legs of a single firewall controlling access between multiple segments e Serv U Gateway and Serv U may be deployed on different operating systems e g your Internet facing Serv U Gateway can be deployed on Linux even if you have deployed your Serv U server on Windows Advantages e Still easy to set up Install Serv U Gateway define Serv U Gateway define Serv U listeners test and go e Completely satisfies MFT requirement that no data at rest exists in the DMZ e Satisfies most security policy requirements by ensuring direct connections to internal storage internal databases or Active Director
18. y domain controllers are only made between computers on your trusted internal network e No CIFS AD or DB connections are ever made across a firewall Disadvantages e No active redundancy means the Serv U server and Serv U Gateway are single points of failure f H Serv U Distributed Architecture Guide v12 0 0 0 Page 7 of 15 RhinoSoft EE Copyright 2012 Rhino Software Inc RhinoSoft com All Rights Reserved the global leader in affordable file transfer Serv U Distributed Architecture Guide Basic High Availability N 1 Deployment Serv U can be deployed as a web farm of application servers to provide highly available HA services through horizontal scaling a k a N 1 Serv U Gold and Serv U Platinum are the only Serv U editions that support HA deployments because Serv U s HA configuration requires the use of external authentication sources Up to five Serv U servers are currently allowed in this configuration serv u Kc d D DB Server or Active Directory for authentication serv u Load Balancer Firewall Serv U Load Balancer distributes NAS and file shares incoming connections to Serv U nodes Remote storage including Clients connect to Serv U ia with FTP FTPS SFTP SSH HTTP and HTTPS Serv U connects to back end as needed HI Serv U Web Farm Firewall Configuration The primary firewall supports FTP FTPS SSL TLS SFTP

Download Pdf Manuals

image

Related Search

Related Contents

HP CV720 Reference Guide  ELECTRIC LOCOMOTIVES OPERATING INSTRUCTIONS  Sennheiser PX 200-II  Scarica l`allegato  2080-QR002 - Rockwell Automation  Valueline VLAP22200B10  MASTER YOUR DEVICE DOMINA TU APARATO  Revolabs 05-TBLMICEX-DR-11  Philips LCD monitor with LED backlight 190V4LSB  Guida di avvio rapida Vodafone Smart 4G  

Copyright © All rights reserved.
Failed to retrieve file