Configuring TFTP Server v3

The TFTP Server runs in a background mode, it does not have any user interface. There are number of ways to monitor and configure your server:

  • TFTP Server Configuration Manager
  • Service Manager
  • Log Files
  • Windows NT/2000 EventLog

TFTP Server Configuration Manager

TFTP Server Configuration Manager is a special utility intended for TFTP Server configuration. You can run the TFTP Server Configuration Manager from the WinAgents TFTP Server group in Start menu. The main window of the application contains four property sheets allowing you to manage different aspects of the service configuration.

TFTP Server
Figure 1. TFTP Software Configuration (page 1).

The first page allows to configure basic parameters of the TFTP software. You can specify TFTP root directory, port which the TFTP Server will listen, timeout and number of retries here. On the first page you can specify if the server will overwrite existing files during write requests. In addition you can increase base priority of the server process usgin the 'High priority level' checkbox. It will make the server more efficient under heavy load. Finaly, you can specify TFTP options supported by the server. Currently, the following options are available:

  • timeout - allows the server to accept tftp timeout setting from tftp clients.
  • blocksize - allows the server to accept size of transfer blocks setting from tftp clients. TFTP protocol uses 512-byte blocks to transfer data by default. However, tftp clients can request to use large blocks in order to increase performance.
  • tsize - if this option supported, tftp clients can request size of fiel before the transfer will start.

Figure 2. TFTP Server Configuration (page 2).

The second page allows you to configure access rights based on the clients IP addresses. There are two sorts of access rights available: default rights and per-client rights. The server applies default rights until the client has per-client rights.

The following rights are available:

  • No access - client does not have access to TFTP server
  • Read - client can only read files from TFTP server
  • Write - client can only write files to TFTP server.
  • Read/Write - client have both Read and Write access to TFTP server

We recommend to specify No Access by default and grant neccessary access rights only to restricted set of TFTP clients.

Also, you can add exceptions to the default rule. After you click 'Add' button at the bottom of the exceptions list, you will get the rule editing dialog. It allows you to configure custom access right for specified network or single IP address. The Figure 3 illustrates the rule editing dialog.

TFTP Security
Figure 3. Editing IP-based access rule.

The fourth page allows network administrators to specify UDP port range used by TFTP Server to transfer data. TFTP protocol uses fortuitous UDP ports for client sessions. It makes hard to specify firewall rules permitting traffic to TFTP Server. This page helps to restrict port range and makes possible to describe incoming TFTP traffic on firewall.

TFTP software configuration
Figure 4. TFTP Server Configuration (page 3).

The fifth page allows you to define logging options. You can turn logging on by clicking 'Write Log' checkbox on the first page. In case you want to log server messages, you should specify directory where the logfiles would be stored. Also, you can specify the number of logfiles in the directory, logging level and timestamp type. The service rotates logfiles if the number of logfiles you specified are exceeded.

TFTP Server logging option
Figure 5. TFTP Server Configuration (page 4).

Service Manager

Service Manager allows you to manage the state of your TFTP Server. Please see special page for more information related to Service Manager.

Log Files

During the operation time, the TFTP Server writes information messages into the logfiles. You can view these logfiles using any text viewer. The logfiles contain timestamped text messages. The server uses UNC timestamps, so you should apply timezone offset in order to get local time related to appropriate message.

For example, the text log can contain the following strings:

2002/10/15 12:03:41 UTC [1896/1776]: Listener stopped.
2002/10/15 12:04:44 UTC [2248/1896]: Starting TFTP listener...
2002/10/15 12:04:44 UTC [2248/1896]: Listening for requests...
2002/10/15 12:18:27 UTC [2248/1896]: Processing TFTP request...
2002/10/15 12:18:27 UTC [2248/1896]: Request from
2002/10/15 12:18:27 UTC [2248/1204]: Write request for border-config;
2002/10/15 12:18:27 UTC [2248/1204]: Write request for border-config
                                     completed successfully. 2759
                                     bytes received from the client.

Each string corresponds to the following format:

yyyy/mm/dd hh:mm:ss timezone [ProcessID/ThreadID]: message

You can quickly access to TFTP Server log files through the 'Log Files' shortcut located in 'Start->Programs>WinAgents TFTP Service' group.

Windows NT/2000 EventLog

The TFTP Server uses Windows NT/2000 EventLog to write most critical messages. You can view EventLog using EventLog Viewer utility. TFTP Server messages have source named 'TFTPd'. Please refer to EventLog if you do not have any messages in TFTP Server logfiles - it will help you to solve the problem.

Explore Our Site
TFTP Server
TFTP Client (free)
TFTP ActiveX
Buy Now!
Version History

TFTP Server Help
TFTP Protocol
TFTP Service
Server Manager
Server Settings
TFTP Folders
Installing License
How to...

TFTP Server v3
TFTP Server
Service Manager

Other Products
WinAgents MIB Browser
Convenient SNMP MIB browser with SNMPv3 support
WinAgents HyperConf
Software for Cisco config editing and backup with TFTP server embedded
Copyright (c) Tandem Systems, Ltd., 2002-2019