General Features |
- jftpgw is free in the sense of the GNU General Public
License
|
|
Features related to the daemon |
- jftpgw uses a powerful and flexible configuration model
instead of cryptic commandline switches. See the page on the
configuration for further details
- Regular users can run the proxy server on unprivileged ports
as well
- jftpgw runs as a daemon or from the inetd/xinetd
superserver.
- If run as root, it drops the privileges.
(anybody familiar with writing programs run as root? I am not!)
- Active as well as passive FTP transfers (the mode between the
client and the proxy may differ from the mode between proxy and
real ftp server). You may specify port ranges to use for active and
passive transfers. This accounts for ports jftpgw listens on as well
as for source ports jftpgw uses when connecting to the server/client
- jftpgw is able to act as a transparent proxy. You may also
configure the proxy to display the welcome message of the remote
server you want to connect to
- You can cache transfers from an FTP server. This is pretty nice
if several computers fetch the same file from an FTP server (e.g. if
you're updating your distribution)
|
|
User authentication features |
- Various login strings are possible. You can even use another ftp
proxy between jftpgw and the real FTP server
- You can pretend to run a real ftp server and forward the
connection to another server (see forward/passallauth option)
- Other forward (UserAlias) features are also possible. So you may
specify an alias for a user with a password and jftpgw logs in to
the real server as another user with another password. That way you
are able to create accounts on the real machine by adding accounts
to the jftpgw proxy.
- There is a variety of proxy authentication styles so you can use
the proxy with almost every client that supports proxy mode since it
is quite probable that jftpgw supports the one the client supports.
(See option loginstyle).
|
|
Possibilities to restrict users |
- Access control features: Use any combination of user name,
client IP, destination host, destination port and the time of day to
create access/deny lists.
- Specify how many users are allowed to log in at the same time
- The throughput rate can be throttled
- Logging of connection attempts
- Several logfile options are provided: You can specify the
issued commands that you want to have logged in one or more files
(with different sets of commands for each file) as well as one
logfile for each ftp session
|
|
|