Solved

FTP files into the DMZ and execute a command

Posted on 2013-06-18
6
246 Views
Last Modified: 2013-08-25
FTP files from Windows machine(internal network) to DMZ and execute a command in the DMZ.
0
Comment
Question by:raaj4354
  • 2
  • 2
6 Comments
 

Author Comment

by:raaj4354
ID: 39256155
I have a Windows 2003 server in the internal network. I need to
1. FTP files into the DMZ from the windows machine and
2. Execute a script on the DMZ, which would create a backup of existing folders in a directory on the DMZ.

What are the secure ways of achieving the above?
0
 
LVL 16

Accepted Solution

by:
AlexPace earned 500 total points
ID: 39256598
If the folders are accessible via FTP you could use the FTP client on the inside to do it.  

Otherwise, you'll need something that runs on the DMZ computer that will detect to arrival of the file and either directly backup the folders or launch another process to back up the folders.  You could use a scriptable FTP Server program like Robo-FTP Server and create an "Upload Complete" event script that does the work in response to the arrival of the new file.
0
 

Author Comment

by:raaj4354
ID: 39260671
There is no FTP server installed on DMZ.Can cygwin be installed on windows server and on the DMZ. Then by setting up a ssh tunnel an scp followed by ssh command can do the job for me. Is this a safe option?
0
 
LVL 16

Assisted Solution

by:AlexPace
AlexPace earned 500 total points
ID: 39260695
Well sure either SCP or SFTP would be encrypted so much more secure than normal unencrypted FTP... I guess I was confused by the mention of FTP in the question topic.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Setting up SSH Cisco We are all told that you should not use Telent for connecting to devices because it is unsecure and all clear text. Much better is to use SSH, but it can seem a bit of a challenge setting it all up and especially in a small n…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now