HOWTO: Enter License-Code from Command-Line

In some Windows configurations, it might be necessary to enter the license-code via the command-line. Specifically, in Windows Server where “Internet Explorer Enhanced Security” is turned on (More Info: here, here, here, here and here). When IE ESC is turned on, you’ll need to turn it off; this is because the dialog-box that appears for entering your registration code uses the IE WebKit and as a result the links won’t work correctly.

However, you don’t have to disable IE ESC, you can also enter it via the command-line:


1) Start -> Run -> "cmd" (enter)
2) c:
3) cd "C:\Program Files (x86)\BulletProof FTP Server"
4) Working with a license-code that looks like...

Name:John Doe
Key:00012X-8d7DJF2-6F323F-JVQBUA-8DJF3F-28RR4E-02Z6PC-ZXG37G-QBFDH2-NPDPBM-9XS9D9-MPH56G

Enter the following command:

bpftpserver.exe QUIETREGISTER John Doe 00012X-8d7DJF2-6F323F-JVQBUA-8DJF3F-28RR4E-02Z6PC-ZXG37G-QBFDH2-NPDPBM-9XS9D9-MPH56G

FEATURE: IP-Based Access-Control: Server Wide

- Navigate to Management -> Security -> IP Access Control-Lists - Right-click and choose "Add IP/ACL" PLEASE NOTE: All rules should be added as a DENY rule ("-" minus) sign. Entering a ALLOW rule ("+" plus) will override the default rule of "+*.*.*.*" and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
– Navigate to Management -> Security -> IP Access Control-Lists
– Right-click and choose “Add IP/ACL”
PLEASE NOTE: All rules should be added as a DENY rule (“-” minus) sign. Entering a ALLOW rule (“+” plus) will override the default rule of “+*.*.*.*” and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
Enter the IP Address to be banned. Please note that the "Refuse IP Address Access" should be chosen. PLEASE NOTE: All rules should be added as a DENY rule ("-" minus) sign. Entering a ALLOW rule ("+" plus) will override the default rule of "+*.*.*.*" and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
Enter the IP Address to be banned. Please note that the “Refuse IP Address Access” should be chosen.
PLEASE NOTE: All rules should be added as a DENY rule (“-” minus) sign. Entering a ALLOW rule (“+” plus) will override the default rule of “+*.*.*.*” and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
- Navigate to Server Monitor -> Log Watch In this example, you'll see the DENY rule being made for "-54.153.69.28" and you'll see the ftp-client disconnect and then attempt to reconnect again, only to be refused access.
– Navigate to Server Monitor -> Log Watch
In this example, you’ll see the DENY rule being made for “-54.153.69.28” and you’ll see the ftp-client disconnect and then attempt to reconnect again, only to be refused access.

FEATURE: IP Based Access-Control for Users/Groups

- Navigate to User/Group Manager -> Edit User/Group -> Restrictions - Right-click and choose "Add IP/ACL" PLEASE NOTE: All rules should be added as a DENY rule ("-" minus) sign. Entering a ALLOW rule ("+" plus) will override the default rule of "+*.*.*.*" and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
– Navigate to User/Group Manager -> Edit User/Group -> Restrictions
– Right-click and choose “Add IP/ACL”
PLEASE NOTE: All rules should be added as a DENY rule (“-” minus) sign. Entering a ALLOW rule (“+” plus) will override the default rule of “+*.*.*.*” and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
Enter the IP Address to be banned. Please note that the "Allow IP Address Access" should be chosen, in order to restrict a user|group to a specific IP Address (aka whitelist) PLEASE NOTE: All rules should be added as a DENY rule ("-" minus) sign. Entering a ALLOW rule ("+" plus) will override the default rule of "+*.*.*.*" and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
Enter the IP Address to be banned. Please note that the “Allow IP Address Access” should be chosen, in order to restrict a user|group to a specific IP Address (aka whitelist)
PLEASE NOTE: All rules should be added as a DENY rule (“-” minus) sign. Entering a ALLOW rule (“+” plus) will override the default rule of “+*.*.*.*” and turn IP/ACL into whitelist only, where all IPs are rejected unless an ALLOW rule is created.
- Navigate to Server Monitor -> Log Watch In this example, you'll see the ftp-client from "-54.153.69.28" is denied. This is because the IP/ACL was converted to a "whitelist" with a single ALLOW rule and "+192.168.0.*" does not match the incoming ftp-client.
– Navigate to Server Monitor -> Log Watch
In this example, you’ll see the ftp-client from “-54.153.69.28” is denied. This is because the IP/ACL was converted to a “whitelist” with a single ALLOW rule and “+192.168.0.*” does not match the incoming ftp-client.

NEW RELEASE: BulletProof FTP Server 2014.1.2.21

New Release: BulletProof FTP Server 2013.1.2.21

Today, we are proud to announce a new release of our BulletProof FTP Server for Windows. This release contains several fixes and improvements to the Events Manager -> SMTP and the handling of %VARIABLES when sending emails during OnEvents; like OnFileUpload. This version is a maintenance version of v2014.1.0.21, while v2015.1.0.22 is still in testing (which allows for Secure-FTP and includes a new ftp-engine).

Demo Version (Free 15-Day Trial)
http://bpftpserver.com/products/bpftpserver/windows/download

Product Information
http://bpftpserver.com

Purchasing Information
http://bpftpserver.com/products/bpftpserver/windows/buynow

What’s New aka Changelog
http://bpftpserver.com/products/bpftpserver/windows/whatsnew

Join us on Facebook
https://www.facebook.com/pages/Bpftp/17713238532

Follow us on Twitter
https://twitter.com/bpftp

Version 2014.1.2.22 - 2015-FEB-03
---------------------------------

A summary of this release comprises of:
- Fixes for Events Mgr -> SMTP and processing of %VARIABLES

VERSION DETAILS
===============
x Fixed, + Added, * Improved/Changed, i Information, ! Wish-List from Customers

Version 2014.1.2.22 - 2015-FEB-03
---------------------------------
x Fixed: Management -> Events Manager -> SMTP: Added support for %VARIABLE in TO/CC/BCC
x Fixed: Management -> Events Manager -> SMTP: TO was always using the Email address of the sender configured in Management -> Settings -> Email
x Fixed: Management -> Events Manager -> SMTP: BCC/CC was not correctly being used
x Fixed: Management -> Events Manager -> SMTP: Fixed a problem where the last-line of the email body was being duplicated
x Fixed: Management -> Events Manager -> SMTP: Added UUENCODE and max-line-length of 76
x Fixed: Management -> Events Manager -> SMTP: Resolved a problem parsing for the %VARIABLE in the message body. It was output all variables instead

HOWTO: Getting Started with BulletProof FTP Server

Thank you for your interest in BulletProof FTP Server.

Below is a list of HOWTO articles that have been written over the years to help customers in getting up and running with BulletProof FTP Server.
Note: Some of the screen-shots show older versions of the software. The UI hasn’t changed much between different versions, but you might find some of the buttons labeled differently than what appears.

  • Download, Install and Adding First User
  • Opening Your Firewall
  • Licensing
  • Upgrading
  • Windows System Service
  •  

    Download, Install and Adding First User

    HOWTO: Downloading BPFTP Server 2010
    http://blog.builtbp.com/2010/09/howto-downloading-bpftp-server-2010/

    HOWTO: Installing BPFTP Server 2010
    http://blog.builtbp.com/2010/09/howto-installing-bpftp-server-2010/

    HOWTO: Adding a User
    http://blog.builtbp.com/2010/09/howto-adding-a-user/

     

    Opening Your Firewall

    It’s VERY common that people think only one-port is needed for ftp (default: tcp/ip 21). However, this is not true.

    FTP requires at least two ports, one for the control-port (used to login and issue commands, default tcp/ip 21) and a data-port (default tcp/ip 30000 to 30100). One data-port is needed for every concurrent data-connection, for this reason we suggest using a range of 100 ports which will handle most needs.

    HOWTO: Windows Firewall and BPFTP Server 2011
    http://blog.builtbp.com/2011/06/windows-firewall-and-bulletproof-ftp-server/

    HOWTO: Windows Firewall
    http://blog.builtbp.com/2010/09/howto-windows-firewall/

    HOWTO: Setting up NAT/Passive/Firewall Support
    http://blog.builtbp.com/2010/09/howto-setting-up-natpassivefirewall-support/

     

    Licensing

    HOWTO: Enter Your Subscription-Code
    http://blog.builtbp.com/2013/05/howto-enter-your-subscription-code/

    HOWTO: Purchase an Upgrade to your License
    http://blog.builtbp.com/2014/02/howto-purchase-an-upgrade-to-your-license/

    HOWTO: Remove Your License-Code
    http://blog.builtbp.com/2013/05/howto-remove-your-license-code/

     

    Upgrading

    FAQ: Can I Upgrade and retain all my Users, Groups and Settings?
    http://blog.builtbp.com/2011/12/faq-can-i-upgrade-and-retail-all-my-users-groups-and-settings/

    FAQ: Where does BPFTP Server store the Users, Groups and Settings?
    http://blog.builtbp.com/2011/12/faq-where-does-bpftp-server-store-the-users-groups-and-settings/

    HOWTO: Overridding the Storage-Path for Settings, Users and Groups
    http://blog.builtbp.com/2011/10/howto-override-storage-path-for-settings-users-and-groups/

     

    Windows System Service

    HOWTO: Windows System-Service
    http://blog.builtbp.com/2011/09/howto-windows-system-service/

     

    FEATURE: “reload” command-line parameter

    This HOWTO video shows the process of executing the “reload” command at the command line to reload changes made to the USERS file.

    1) BPS currently running as a SERVICE
    2) Logging into BPS using “ftp.exe”
    3) While the ftp-client is still connected
    4) Change the “bpftpserver-users.ini” and edit the password
    5) Issue the “bpftpserver -reload” command
    6) BPS launches another instance to instruct the current instance to reload the configuration
    7) The original ftp-client is still connected
    8) Disconnect original ftp-client and try to login as old password (doesn’t work, since it was changed)
    9) Try to login as the new password, it works.

    NEW RELEASE: BulletProof FTP Server 2014.1.0.20

    New Release: BulletProof FTP Server 2013.1.0.20

    Today, we are proud to announce a new release of our BulletProof FTP Server for Windows.

    Demo Version (Free 15-Day Trial)
    http://bpftpserver.com/products/bpftpserver/windows/download

    Product Information
    http://bpftpserver.com

    Purchasing Information
    http://bpftpserver.com/products/bpftpserver/windows/buynow

    What’s New aka Changelog
    http://bpftpserver.com/products/bpftpserver/windows/whatsnew

    Join us on Facebook
    https://www.facebook.com/pages/Bpftp/17713238532

    Follow us on Twitter
    https://twitter.com/bpftp

    Version 2014.1.0.20 - 2014-AUG-26
    ---------------------------------

    A summary of this release comprises of:
    - Fix for ftp-client unable to open data-connection on heavily used environments

    VERSION DETAILS
    ===============
    x Fixed, + Added, * Improved/Changed, i Information, ! Wish-List from Customers

    Version 2014.1.0.20 - 2014-AUG-26
    ---------------------------------
    * Improved: Management -> Settings -> NAT/Firewall -> Passive Data-Port Range: Symptom, sometimes a ftp-client unable to retrieve a directory or file-transfer as the result of a bad port sent with "227 Entering Passive Mode (1,2,3,4,0,21)" (where ip=1.2.3.4 and port=21 (0*256+21)). Resolved a problem in which it was possible for an incorrect data-port (tcp/ip 21) to be returned to the ftp-client on heavily used ftp-servers (or ones configured with minimal data-ports). This was due to the method in which a data-port was selected from the pool, after 5 attempts of randomly picking a port and finding it busy; the software returned 21, which is bad and not in the data-port range. Rewrote this portion of the program to pick ports and try them for a period of 30 seconds, before returning an exception in the software. Example of bad return "227 Entering Passive Mode (1,2,3,4,0,21)". In sampling, the error occurred 58 times out of 38608 with a pool of 100 ports during a 20 hour run-time on Aug 25th.