• How to add debug logging to Edge Gateway

    If you are having trouble configuring Edge Gateway in your environment, adding debug logging could help to diagnose and repair any problems. For example, firewall issues blocking access to various ports, or load balancers closings sockets unexpectedly, or port conflicts for listening sockets. SLF4J By default, Edge Gateway does not…

  • Diplomat MFT 9.2 Release Notes

    *************** IMPORTANT **************** ****************************************** New and Added Changed and Updated Numerous bug fixes and performance improvements.

  • Diplomat MFT 9.2 User Guide

    The attached guide provides detailed administrator documentation for Diplomat MFT 9.2

  • SSL Cryptography in Diplomat MFT 8.1.1 and later

    The following SSH cryptography is supported in Diplomat MFT 8.1.1 and later: TLS_AES_128_GCM_SHA256TLS_AES_256_GCM_SHA384TLS_DHE_DSS_WITH_AES_128_CBC_SHATLS_DHE_DSS_WITH_AES_128_CBC_SHA256TLS_DHE_DSS_WITH_AES_128_GCM_SHA256TLS_DHE_DSS_WITH_AES_256_CBC_SHATLS_DHE_DSS_WITH_AES_256_CBC_SHA256TLS_DHE_DSS_WITH_AES_256_GCM_SHA384TLS_DHE_RSA_WITH_AES_128_CBC_SHATLS_DHE_RSA_WITH_AES_128_CBC_SHA256TLS_DHE_RSA_WITH_AES_128_GCM_SHA256TLS_DHE_RSA_WITH_AES_256_CBC_SHATLS_DHE_RSA_WITH_AES_256_CBC_SHA256TLS_DHE_RSA_WITH_AES_256_GCM_SHA384TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHATLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHATLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384TLS_ECDHE_RSA_WITH_AES_128_CBC_SHATLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256TLS_ECDHE_RSA_WITH_AES_256_CBC_SHATLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHATLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHATLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384TLS_ECDH_RSA_WITH_AES_128_CBC_SHATLS_ECDH_RSA_WITH_AES_128_CBC_SHA256TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256TLS_ECDH_RSA_WITH_AES_256_CBC_SHATLS_ECDH_RSA_WITH_AES_256_CBC_SHA384TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384TLS_RSA_WITH_AES_128_CBC_SHATLS_RSA_WITH_AES_128_CBC_SHA256TLS_RSA_WITH_AES_128_GCM_SHA256TLS_RSA_WITH_AES_256_CBC_SHATLS_RSA_WITH_AES_256_CBC_SHA256TLS_RSA_WITH_AES_256_GCM_SHA384

  • Importing Putty SSH Private Keys

    Diplomat MFT can import SSH KeyPairs for use with SFTP communications. Under some conditions, you might have to reformat your existing SSH KeyPair in order to import into Diplomat MFT, which uses the “OpenSSH” format for import. If Diplomat MFT cannot import an SSH KeyPair for you, please open that…

  • SFTP Performance

    Overview The SFTP protocol is very thorough in verifying data integrity. A file transfer involves taking a portion of the file, referred to as a “packet” (typically 32KiB), encrypting it, adding a signed checksum, and delivering the packet to the SFTP Server. Then, it waits for a verification of that…

  • Importing SSH Public Keys

    Overview If you wish to import SSH public keys into Diplomat MFT (for example, to use as an authentication mechanism for an SFTP Server user), then those key files have to be in SSH2 format. This format is easy to discern because the file will begin with a line reading:…