Skip to main content

Inbound Nodes

An Inbound Node defines the virtual server that handles incoming partner connections. It includes several key settings that control how connections are matched, authenticated, and secured:

  • The priority and address filter determine how USP Server selects the appropriate node for an incoming connection.
  • The associated Rule specifies the authentication policies applied to the connection.
  • The assigned Certificates or Keys establish the identity of the server and the partner during TLS or SSH handshakes.
  • The Advanced Configuration options allow customization of cryptographic parameters, supported cipher suites, and other protocol-level security controls.

Before You Begin

Priority and IP Address Filter

When an inbound connection is received, USP Server performs the following matching process:

  1. Sort by Priority: All Inbound Nodes that belong to the Route are ordered by Priority, highest to lowest.
  2. Evaluate each Inbound Node: The connection's source IP is checked against the Node's assigned IP Address Filter List.
  3. Select the first match: The first Inbound Node that matches the connection is used. If no Inbound Nodes match, the connection is rejected.

Unlike USP Admin UI IP Filtering, Inbound Nodes must always reference an IP Filter and may reference an empty one.

The effect of an empty IP Filter depends on its Default Action:

  • If it is Block, all connections are denied. This can be used intentionally to shut down access to an Inbound Node.
  • If it is Allow, all connections are permitted, effectively disabling IP-based restrictions for that node.
info

For more information on empty IP Filters use cases, refer to the Empty Filters.

Advanced Flow

When a Route contains multiple Inbound Nodes, the evaluation flow becomes more complex, as the USP Server must account for both node Priority and each Node's assigned IP Filter.

Connections are always processed in descending Priority order, and the first node whose filter criteria are satisfied determines the outcome. The following example (and diagram) illustrates how different source IPs are evaluated across three Inbound Nodes.

Diagram showing Priority and IP Filtering Logic

Example

Consider a Route with three Inbound Nodes:

Inbound NodePriorityIP Filter (Block Rule)IP Filter (Allow Rule)IP Filter (Default Action)
Node A100 (highest)10.0.0.510.0.0.0/24Block
Node B50172.16.1.1172.16.0.0/16Block
Node C10 (lowest)192.168.1.42192.168.1.0/24Block

Evaluation follows the Priority and IP Address Filter rules: highest Priority first, Block before Allow, stop at the first match.

Source IPNode ANode BNode CResult
10.0.0.25
  1. Not on Block list.
  2. Matches Allow list.
Accepted by Node A
172.16.1.2
  1. Not on Block list.
  2. Not match Allow list.
  3. Goes to Inbound Node B.
  1. Not on Block list.
  2. Matches Allow list.
Accepted by Node B
10.0.0.5
  1. Matches Block rule.
  2. Goes to Inbound Node B.
  1. Not on Block list.
  2. Not on Allow list.
  3. Goes to Inbound Node C.
  1. Not on Block list.
  2. Not on Allow list.
Rejected

USP and Partner Verification Credentials

The TLS Certificate and CA Certificate fields control whether TLS is used and, when enabled, how the USP Server authenticates itself and (optionally) validates partner certificates during the TLS handshake.

TLS CertificateCA CertificateResulting Behavior
Connection uses plain FTP with no TLS encryption.
USP establishes a standard one-way TLS connection. The USP Server is authenticated, but partner certificates are not requested nor validated.
USP enforces mutual TLS (mTLS). Both the USP Server and the partner present and validate certificates during the TLS handshake.
Invalid configuration. A CA Certificate cannot be used without a TLS Certificate; USP returns a configuration error.

Partner Authentication Credentials

Regardless of the protocol used, the credentials required from the partner to authenticate to USP depend on the Inbound Authentication Method defined in the associated Rule.

Advanced Configuration

Optional parameters can be configured under the Advanced section. These settings provide fine-grained control over protocol behavior for inbound connections, allowing alignment with internal security policies and compliance requirements.

info

These settings are optional but recommended when stricter protocol-level security controls are required.

Advanced FTPS settings define the cryptographic parameters supported by the USP Server during TLS negotiation. These options allow administrators to align the system with internal security policies and compliance requirements.

  • TLS Version Override: Restricts the minimum and maximum TLS protocol versions accepted. By default, USP uses the most secure versions available (TLS 1.2 and TLS 1.3).
  • Curve Preferences Override: Defines which elliptic-curve algorithms are allowed for ECDHE key exchange. By default, USP enables all available curves.
  • Cipher Overrides: Specifies which cipher suites the USP Server advertises during the TLS handshake. Incompatible ciphers are ignored automatically. By default, USP uses ciphers supported by the selected TLS version.

Default Ciphers

When no Cipher Overrides are selected, by default USP uses the secure ciphers supported by each version:

TLS VersionDefault Cipher Suites
TLS 1.3
  • TLS_AES_128_GCM_SHA256 (0x1301)
  • TLS_AES_256_GCM_SHA384 (0x1302)
  • TLS_CHACHA20_POLY1305_SHA256 (0x1303)
TLS 1.0-1.2
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)
TLS 1.2 only
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca8)
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (0xcca9)

Available Ciphers

Cipher SuiteSecureReason
TLS_RSA_WITH_RC4_128_SHAUses RC4 (insecure stream cipher) and RSA key exchange (no forward secrecy).
TLS_RSA_WITH_3DES_EDE_CBC_SHAUses 3DES (obsolete, weak) and RSA key exchange (no forward secrecy).
TLS_RSA_WITH_AES_128_CBC_SHAUses RSA key exchange (no forward secrecy).
TLS_RSA_WITH_AES_256_CBC_SHAUses RSA key exchange (no forward secrecy).
TLS_RSA_WITH_AES_128_CBC_SHA256RSA key exchange (no forward secrecy) and no Lucky13 CBC countermeasures.
TLS_RSA_WITH_AES_128_GCM_SHA256Uses RSA key exchange (no forward secrecy), despite AEAD.
TLS_RSA_WITH_AES_256_GCM_SHA384Uses RSA key exchange (no forward secrecy), despite AEAD.
TLS_ECDHE_ECDSA_WITH_RC4_128_SHAUses RC4 (insecure stream cipher).
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHAECDHE + ECDSA provides forward secrecy; AES-128-CBC is acceptable here.
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHAECDHE + ECDSA provides forward secrecy; AES-256-CBC is acceptable here.
TLS_ECDHE_RSA_WITH_RC4_128_SHAUses RC4 (insecure stream cipher).
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHAUses 3DES (obsolete, weak).
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHAECDHE + RSA provides forward secrecy; AES-128-CBC is acceptable here.
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHAECDHE + RSA provides forward secrecy; AES-256-CBC is acceptable here.
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256Lacks Lucky13 mitigations for CBC-mode AES.
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256Lacks Lucky13 mitigations for CBC-mode AES.
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256AEAD cipher (AES-GCM) plus ECDHE forward secrecy.
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256AEAD cipher (AES-GCM) plus ECDHE forward secrecy.
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384AEAD cipher (AES-GCM) plus ECDHE forward secrecy.
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384AEAD cipher (AES-GCM) plus ECDHE forward secrecy.
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256AEAD cipher (ChaCha20-Poly1305) plus ECDHE forward secrecy.
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256AEAD cipher (ChaCha20-Poly1305) plus ECDHE forward secrecy.

Inbound Nodes Administration via USP Admin UI

Adding an Inbound Node

To add an Inbound Node, follow these steps:

  1. From the Sidebar, click Configuration > Routes.
  2. Click the row of the Route where you want to add the Inbound Node.
  3. Go to the Inbound Nodes tab.
  4. Click Add Inbound Node.
  5. Complete the Inbound Node details using the Field Descriptions table as a guide.
  6. Click Save.

Field Descriptions

NameDescriptionSpecificationsRequired
NameThe name of the Inbound Node.Must be unique.Yes
DescriptionThe description of the Inbound Node.No
IP Address Filter ListThe name of the IP Filter that an incoming connection must surpass to be accepted.Must reference an already-created IP Filter.Yes
Priority NumberAn integer that defines the priority of the Inbound Node. Nodes with higher values are evaluated first when matching inbound connections.Must be within 1 and 100000.Yes
RuleThe Rule associated with the node, which defines the authentication behavior for external incoming connections.Must reference an already-created Rule.Yes
Passive IP AddressThe public IP address returned to the client along with the PASV port address.This IP must be reachable by the client (typically your load balancer IP).Yes
Passive Port Start RangeThe lowest TCP port value that the server can use for passive (PASV) data connections.
  • Must be within 1024 and 65535.
  • Must be less than or equal to the Passive Port End Range.
  • Recommended value between 20000 and 30000.
Yes
Passive Port End RangeThe highest TCP port value that the server can use for passive (PASV) data connections.
  • Must be within 1024 and 65535.
  • Must be greater than or equal to the Passive Port Start Range.
  • Recommended value between 20000 and 30000.
Yes
BannerAn optional welcome banner that is displayed to FTP clients.No
Encryption Mode

The encryption mode that will be used.

Options (multi-select):

  • None (FTP)
  • Implicit (FTPS)
  • Explicit (FTPES)
Yes
TLS CertificateThe TLS certificate presented by the USP Server during the TLS handshake.Must reference an already-created TLS Certificate.Yes, if Encryption Mode is Implicit (FTPS) or Explicit (FTPES).
CA CertificateThe CA certificate used to validate client certificates during mTLS authentication.Must reference an already-created CA Certificate.No
TLS Version Override

USP automatically uses the most secure TLS version available (1.2 or 1.3). To specify a version, set two versions (smallest is minimum, highest is maximum).

Options (multi-select):

  • TLS 1.0
  • TLS 1.1
  • TLS 1.2
  • TLS 1.3
No
Curve Preferences Override

USP uses all available curve preferences by default unless you specify otherwise.

Options (multi-select):

  • CurveP256
  • CurveP384
  • CurveP521
  • X25519
  • X25519MLKEM768
No
Cipher Overrides

Available ciphers depend on the selected TLS version. Select the ciphers you want to use.

Options (multi-select), see Available Ciphers.

USP will ignore any ciphers incompatible with your TLS version.

See Default Ciphers.

No

Editing an Inbound Node

To edit an Inbound Node, follow these steps:

  1. From the Sidebar, click Configuration > Routes.
  2. Click the row of the Route where the Inbound Node is added.
  3. Go to the Inbound Nodes tab.
  4. Click the row of the Inbound Node you want to edit.
  5. Click the Edit button above the Inbound Nodes details.
  6. Edit the Inbound Node details using the Field Descriptions table as a guide.
  7. Click Save.
warning

If you modify a Inbound Node that is currently in use by a USP Server instance, the changes will not take effect until you manually apply the updated configuration by pushing it to the server. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Updated Configuration column.
  5. If the changes are correct, click Push Configuration.

Inbound Node Metadata

Inbound Nodes details include all parameters given in the Field Descriptions table above, plus the following read-only metadata:

NameDescription
IDUniversally Unique Identifier of this Inbound Node.
Route IDThe ID of the Route where the node belongs.
Created AtDate and time this Inbound Node was created.
Updated AtDate and time this Inbound Node was last updated.

Deleting an Inbound Node

To delete an Inbound Node, follow these steps:

  1. From the Sidebar, click Configuration > Routes.
  2. Click the row of the Route where the Inbound Node is added.
  3. Go to the Inbound Nodes tab.
  4. Click the row of the Inbound Node you want to delete.
  5. Click Delete.
  6. You will be asked to confirm the deletion. Click Delete.
warning

USP Manager prevents deletion of an Inbound Node if it is currently referenced by a Route.

Additionally, if the Inbound Node is used by a USP Server instance, the updated configuration must be manually applied. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Candidate Configuration - Preview section.
  5. If the changes are correct, click Push Configuration.

The changes do not take effect on the server until this step is completed.