Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Serv-U Managed File Transfer & Serv-U FTP Server > Serv-U Gateway on a DMZ

Serv-U Gateway on a DMZ

Table of contents
Created by Dhalia Turiaga, last modified by MindTouch on Jun 23, 2016

Views: 989 Votes: 2 Revisions: 4

Overview

Serv-U Gateway by default does not listen for Serv-U control connections on 1180 on any public IP addresses as most customers use private IPs combined with static NAT rules in their DMZ.

The following gateway configuration setups are supported:

  • Serv-U with Public IP --> Gateway with a different Public IP with CIDR
  • Serv-U with Private IP --> Gateway with Public IP with CIDR
  • Serv-U with Private IP --> Gateway with Private IP

Environment

  • Serv-U version 15.x
  • Windows Vista/7/8, Server 2008/2012 - C:\ProgramData\RhinoSoft\Serv-U (Folder is Hidden in Windows by default)
  • Windows 2000/XP, Server 2000/2003 - C:\Program Files\RhinoSoft\Serv-U
  • Linux - /usr/local/Serv-U

Detail

If Serv-U is on a NATted set up, use the IP that is in the gateway’s interface therefore it is the private IP address and not the public one as seen on the screenshot below:

 

 

Last modified

Tags

Classifications

Public