What Is Ipswitch WS FTP Server?

What Is Ipswitch WS FTP Server?

User Guide Contents CHAPTER 1 WS_FTP Server Overview What is Ipswitch WS_FTP Server? ........................................................................................................................... 1 System requirements .................................................................................................................................................. 1 How FTP works .............................................................................................................................................................. 2 How SSH works.............................................................................................................................................................. 3 Sending feedback......................................................................................................................................................... 3 CHAPTER 2 Learning about WS_FTP Server Manager Understanding the server architecture ................................................................................................................ 5 Understanding the relationship between listeners and hosts..................................................................... 6 Accessing the WS_FTP Server Manager ............................................................................................................... 7 Managing WS_FTP Server remotely.......................................................................................................... 7 Navigating the WS_FTP Server Manager ............................................................................................................. 8 Using the top menu ........................................................................................................................................ 9 CHAPTER 3 Configuring and Managing WS_FTP Server Setting global options ..............................................................................................................................................13 Starting and stopping the server ..........................................................................................................................13 Changing the default host ......................................................................................................................................14 Changing the host separator..................................................................................................................................15 Configuring DNS for hosts.......................................................................................................................................15 CHAPTER 4 Configuring Hosts About hosts...................................................................................................................................................................17 Choosing host configuration..................................................................................................................................18 Creating hosts..............................................................................................................................................................18 Associating hosts with listeners ............................................................................................................................19 Configuring an external user database...............................................................................................................20 Microsoft Windows user database...........................................................................................................21 Ipswitch IMail Server user database ........................................................................................................22 ODBC user database......................................................................................................................................22 Synchronizing external user databases .................................................................................................23 Using Windows file permissions...............................................................................................................24 Changing user context via user impersonation..................................................................................25 Changing user context on the services..................................................................................................25 Microsoft Active Directory user database..........................................................................................................26 Setting host options ..................................................................................................................................................27 i Setting folder listings to use local time..................................................................................................27 Setting maximum number of connections...........................................................................................28 Enabling anonymous access......................................................................................................................28 Controlling access by IP address...............................................................................................................29 Using firewalls with WS_FTP Server ........................................................................................................31 Enabling disabled users ...............................................................................................................................32 Using banner, welcome and exit messages .........................................................................................32 Setting timeouts for connections.............................................................................................................34 Limiting connections to a host..................................................................................................................34 Deleting hosts..............................................................................................................................................................35 Renaming hosts...........................................................................................................................................................35 Managing hosts from the command line ..........................................................................................................35 Configuring SITE commands..................................................................................................................................37 Creating a SITE command...........................................................................................................................37 Securing SITE commands............................................................................................................................39 CHAPTER 5 Configuring Listeners About listeners.............................................................................................................................................................41 Configuring listeners for SSH..................................................................................................................................42 Configuring listeners for SSL ..................................................................................................................................43 CHAPTER 6 Managing User Accounts How user accounts work..........................................................................................................................................45 Setting user options for hosts................................................................................................................................45 Changing user passwords...........................................................................................................................48 Enabling disabled users from the command line...............................................................................48 Resetting a user's failed login count........................................................................................................48 Understanding administrator privileges............................................................................................................49 Granting administrative privileges ..........................................................................................................50 Creating user accounts.............................................................................................................................................50 Setting users' home folders ....................................................................................................................................53 Renaming a user account ........................................................................................................................................53 Deleting user accounts.............................................................................................................................................53 Disabling user accounts ...........................................................................................................................................54 Managing users from the command line...........................................................................................................54

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    121 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us