How To Setup Filezilla Secure FTP Server on Google Cloud Server 2016

How To Setup Filezilla Secure FTP Server on Google Cloud Server 2016

This guide explains the steps required to get Filezilla FTP Server running on Google GCP using our virtual machine app from the cloud launcher marketplace.

 

Once your GCP VM has been deployed there are some post configuration steps to complete to start using the Filezilla FTP Server

 

Login

 

First you’ll need to create a login username and password. Within the GCP console, navigate to your newly deployed Filezilla FTP VM.  

 

Select Set Windows Password, this will allow you to setup a local admin users so you can login to the virtual machine via RDP

SET-windows-password

 

Launch Filezilla Server Instance

 

Once you’ve logged into the server, Launch the Filezilla server instance app, found on the desktop.  On the launch screen press connect as shown below (password is blank):

Filezilla server instance

 

Passive Mode

 

You should now be connected. You may see connection errors and NAT errors, this is normal as we need to complete some configuration.  From the menu select > Edit > Settings > Passive Mode Settings

 

You’ll need to set a passive mode port range. Usually (50000-51000). These ports are used for data transfers to the server.

 

Set Public IP Address

 

For this next part you’ll need to make sure the VM has a public IP address to allow external clients to connect as shown in yellow. 

 

To attach a public IP address to your VM, follow Googles guide.

 

In short, from the Google console, edit the VM instance and under Network Interfaces, select External IP / Ephemeral. As shown below

set-external-ip

 

Once you have a public IP address associated with the NIC on your GCP VM, add the ip address to the passive mode settings as shown below highlighted in yellow and also the passive port range:

 

 

Create Certificate (FTP over TLS)

 

The next step is to create a new private key and a self signed certificate, needed by FileZilla server to accept TLS connections. 

 

Within the FileZilla server options, click on SSL/TLS settings.  Check the Enable FTP over TLS support (FTPS).

 

Next click on Generate New Certificate > Fill in your company information.

 

SSL-TLS-Certificate

 

IMPORTANT – In the common name (Server address) field make sure to add the public IP address of your Google instance VM. 

 

Save the key locally on the server and then press Generate certificate.  No need to add a password.

 

Setup Users

 

There are 2 options:

 

  1. Create local users and assign access 
  2. Integrate Active Directory and allow users to use thier domain logins to authenticate

 

Option 1 (Local Users)

 

To setup local users and give access to directories locally on your server navigate to Edit > Users

 

Here you can add users and generate their passwords.

 

Then give the users access to your local folders you would like them to have access to.  The VM has a pre-configured folder on the C:\FTPDirectory that can be used or you can setup as many folders as you like.  Groups can also be setup and permissions applied at a group level.

 

shared-ftp-folders

 

Option 2 (Active Directory Integrated)

 

Open settings > LDAP and select enable LDAP support. Beta.

 

Add your private ip address of your local domain controller. Add port 389 and write the name of your domain name.

 

Select Enable TLS/SSL

Active-Directory-FTP-Filezilla

 

Next you need to add the users who need access to your FTP directories. 

 

Select Edit > Users and here you’ll need to add the users full UPN that they use to logon to AD, for example if their name is jsmith@yourdomain.com or yourdomain\jsmith we need to make sure we add this so it matches their login UPN jsmith@yourdomain.com. We don’t need to add their password here as it authenticates against Active Directory, so make sure the password checkbox is unchecked.

 

Next check the boxes LOCAL and LDAP as in the screenshot below.

 

In the screenshot below i’ve added a test user from our AD called ftpuser and our AD domain is called yourdomain.com

FTP ad

 

Next is to assign these users to your FTP directories they need access to. Click on Shared Folders within the Users menu and add the local folders and assign permissions they need:

ADPermissions

 

Now would be a good time to test if you can connect using an FTP client.  If you can’t connect, try the next step and to configure any Google GCP Firewall rules.

 

Configure GCP Firewall Rules

 

If you have GCP firewall rules or any firewall appliances in Google you will need to open access to the following ports:

 

  • Port: 21 (Used for FTP)
  • Port: 990 (Used for FTPS)
  • Passive Port Range: 50000 – 51000 (Used for data transfer)

 

Google documentation – Using firewall rules

 

Within the Google console navigate to Networking / VPC Network / Firewall Rules

 

  1. Create Firewall Rule

create-gcp-firewall-rule

 

Give the rule a name, select Ingress for the direction of traffic

 

Action – Allow

 

Targets – This will be the Filezilla FTP Server: Specified target tags, All instances or specified service account

 

Service account scope – Select the correct option, default is in this project

 

Target service account – Select an option, default is no service account

 

Source filter – enter the IP ranges of your clients that will be connecting. For example:

 

0.0.0.0/0 – (everyone)

192.168.2.0/24 – (example ip range)

 

Protocols and ports

 

Select tcp: 21,990,50000-51000

vpc-firewall-rules

 

FTP-Architecture

 

Client FTP Software

 

To allow clients to connect, users can use any FTP client.  You can use FileZillas FTP Client

 

Support

 

For issues regarding the FileZilla software use the FileZilla community forum

 

Any other questions about the setup of the VM in Google, leave your comments below

 

Want some help (hire us)?

 

If you would like us to implement the Filezilla server into your environment and fully configure it and get it up and running, get in contact with us and we will get you up and running asap

Andrew Fitzgerald

Cloud Solution Architect. Helping customers transform their business to the cloud. 20 years experience working in complex infrastructure environments and a Microsoft Certified Solutions Expert on everything Cloud

No Comments

Post a Comment

Comment
Name
Email
Website