About the FTP-Proxy

FTP (File Transfer Protocol) is used to send files from one computer to a different computer over a TCP/IP network. The FTP client is usually a computer. The FTP server can be a resource that keeps files on the same network or on a different network. The FTP client can be in one of two modes for data transfer: active or passive. In active mode, the server starts a connection to the client on source port 20. In passive mode, the client uses a previously negotiated port to connect to the server. The FTP-proxy monitors and scans these FTP connections between your users and the FTP servers they connect to.

With an FTP-proxy policy, you can:

The TCP/UDP proxy is available for protocols on non-standard ports. When FTP uses a port other than port 20, the TCP/UDP proxy relays the traffic to the FTP-proxy. For information on the TCP/UDP proxy, see About the TCP-UDP-Proxy.

For detailed instructions on how to add the FTP-proxy to your XTM device configuration, see Add a Proxy Policy to Your Configuration.

If you must change the proxy definition, from the Firewall Polices / Edit page, you can modify the definition. .This page is separated into several tabs: Settings, Application Control, Traffic Management, Proxy Action, Scheduling, and Advanced.

Settings Tab

On the Settings tab, you can set basic information about a proxy policy, such as whether it allows or denies traffic, create access rules for a policy, or configure policy-based routing, static NAT, or server load balancing. The Settings tab also shows the port and protocol for the policy, as well as an optional description of the policy. You can use the settings on this tab to set logging, notification, automatic blocking, and timeout preferences.

Application Control Tab

If Application Control is enabled on your device, you can set the action this proxy uses for Application Control.

  1. Select the Application Control tab.
  2. From the Application Control Action drop-down list, select an application control action to use for this policy, or create a new action.
  3. Click Save.

For more information, see Enable Application Control in a Policy.

Traffic Management Tab

On the Traffic Management tab, you can select the Traffic Management action for the policy. You can also create a new Traffic Management action. For more information about Traffic Management actions, see Define a Traffic Management Action in v11.8.x and Lower and Add a Traffic Management Action to a Policy.

To apply a Traffic Management action in a policy:

  1. Select the Traffic Management tab.
  2. From the Traffic Management Action drop-down list, select a Traffic Management action.

    Or, to create a new Traffic Management action, select Create new and configure the settings as described in the topic Define a Traffic Management Action in v11.8.x and Lower.
  3. Click Save.

Proxy Action Tab

You can choose a predefined proxy action or configure a user-defined proxy action for this proxy. For more information about how to configure proxy actions, see About Proxy Actions.

To configure the proxy action:

  1. Select the Proxy Action tab.
  2. From the Proxy Action drop-down list, select the proxy action to use for this policy.

    For information about proxy actions, see About Proxy Actions.
  3. Click Save.

For the FTP-proxy, you can configure these categories of settings for a proxy action:

Scheduling Tab

On the Scheduling tab, you can specify an operating schedule for the policy. You can select an existing schedule or create a new schedule.

  1. Select the Scheduling tab.
  2. From the Schedule Action drop-down list, select a schedule.

    Or, to create a new schedule, select Create New and configure the settings as described in the topics Create Schedules for XTM Device Actions and Set an Operating Schedule.
  3. Click Save.

Advanced Tab

The Advanced tab includes settings for NAT, QoS, multi-WAN, and ICMP options.

To edit or add a comment to this proxy policy configuration, type the comment in the Comment text box.

For more information on the options for this tab, see:

See Also

About Proxy Policies and ALGs

Give Us Feedback  •   Get Support  •   All Product Documentation  •   Knowledge Base