WS FTP Server 6 0 User Guide
WS FTP Server 6 0 User Guide
User Guide
CHAPTER 1 WS_FTP Server Overview
What is Ipswitch WS_FTP Server? ........................................................................................................................... 1
System requirements .................................................................................................................................................. 1
How FTP works .............................................................................................................................................................. 2
How SSH works.............................................................................................................................................................. 3
Sending feedback......................................................................................................................................................... 3
i
Managing hosts from the command line ..........................................................................................................35
Configuring SITE commands ..................................................................................................................................37
Creating a SITE command........................................................................................................................................... 37
Securing SITE commands............................................................................................................................................ 39
ii
About quota limit rules.............................................................................................................................................73
Creating quota limit rules ........................................................................................................................................... 73
About bandwidth limits ...........................................................................................................................................74
Creating bandwidth limits .......................................................................................................................................... 74
About notifications ....................................................................................................................................................75
Configuring the Notification Server.....................................................................................................................76
About email notifications ........................................................................................................................................77
Creating email notifications ....................................................................................................................................... 77
About pager notifications........................................................................................................................................78
Creating a pager notification..................................................................................................................................... 78
About SMS notifications...........................................................................................................................................79
Creating SMS notifications ......................................................................................................................................... 79
Using notification variables ....................................................................................................................................80
iii
CHAPTER 13 Maintaining the Server
Backing up WS_FTP Server......................................................................................................................................99
Restoring WS_FTP Server from backup ........................................................................................................... 100
Maintaining the WS_FTP Server data store.................................................................................................... 102
Index
iv
CHAPTER 1
WS_FTP Server is proven and reliable. It is used by administrators globally to support millions
of end users and enable the transfer of billions of files.
WS_FTP Server complies with the current Internet standards for FTP and SSL protocols. Users
can connect to the server and transfer files by using an FTP client that complies with these
protocols, such as Ipswitch WS_FTP Home or Ipswitch WS_FTP Professional.
WS_FTP Server with SSH also includes support for SFTP transfers over a secure SSH2
connection.
System requirements
WS_FTP Server requires:
An Intel Pentium® 4, 1 GHz or higher (or an equivalent processor)
512 MB RAM minimum
250 MB of drive space
NTFS formatted drive
1
Ipswitch WS_FTP Server User Guide
To access an FTP server, users must be able to connect to the Internet or an intranet (via a
modem or local area network) with an FTP client program.
A client-server session establishes two connections: a control channel that stays open for the
entire session and a data channel that opens and closes to transfer data such as folder listings
and files to or from the server as requested by the client. Normally, the control channel occurs
on port 21, but WS_FTP Server can be configured to accept connections on any port.
The server runs continuously in the background and listens on a specified port (the standard
port is 21) for a connection request from a client. When a client requests a connection, the
server verifies the username and password and, if valid, listens to the control channel for the
next command.
After a user logs on, his or her access to the host's folders and files is determined by
permissions assigned to folders.
2
CHAPTER 1 WS_FTP Server Overview
Note: The Internet Engineering Task Force (IETF) publishes Requests for Comments (RFCs) for
all Internet standards. Each RFC defines a standard. You can view RFCs online by connecting
to the IEFT Web site (http://www.ietf.org/).
SSH can be understood as a large pipe: its purpose is to carry whatever is passed through it
from one place to another without letting anything leak in or out.
WS_FTP Server with SSH uses SFTP (Secure File Transfer Protocol) over SSH2 to transfer files.
SFTP operates nearly identically to FTP, but all transmissions are secured under the SSH
protocol.
Sending feedback
We value your opinions on our products and welcome your feedback.
To provide feedback on existing features, suggest new features or enhancements or
suggest ways to make our products easier to use, fill out the online product feedback
form (http://www.ipswitch.com/feedback).
To provide feedback on this documentation, send email to
[email protected].
3
Ipswitch WS_FTP Server User Guide
4
CHAPTER 2
Note: When WS_FTP Server is installed, three listeners are created by default: one listens on
all available IP addresses on port 21 for FTP connections; one listens on port 990 for Implicit
SSL connections; and one listens on all available IP addresses on port 22 for SSH connections.
For more information about listeners, see Setting Up Listeners (on page 41). For more
information about SSL, see Configuring SSL for a Host (on page 43).
Host. A host is the portion of the server that authenticates users and grants them access
to the files and folders stored on the host. In addition to users and permissions, virtual
folders, rules, notifications and SITE commands are defined and configured as part of the
host. For more information about hosts, see Setting Up Hosts (on page 17).
5
Ipswitch WS_FTP Server User Guide
6
CHAPTER 2 Learning about WS_FTP Server Manager
7
Ipswitch WS_FTP Server User Guide
Note: If you specified an alternative virtual folder under which to install the web files, enter
that folder name in place of WSFTPSVR in the address above.
2 Enter your Username. If you have multiple hosts configured, you also may need to
enter the host separator (the default is @) and the fully qualified domain name of the
host, in the format of [email protected].
Tip: If this is your first time logging in to the WS_FTP Server Manager, use the username you
specified when you installed WS_FTP Server. If you accepted the defaults during the install,
enter admin.
The interface consists of five main regions that each perform a specific function.
Header. The header contains the top menu, an indication of which user is logged in, and
a link to log out.
8
CHAPTER 2 Learning about WS_FTP Server Manager
Navigation. The navigation area contains a link to the previous page, a contextual menu
of links to pages that are relevant to the current page, and the help box.
Help. Click to get help information about using the WS_FTP Server application.
Feedback. This portion of the page displays informational messages about the processes
you are completing. This area may display errors, helpful tips, evaluation status, and other
information.
Main. The main area contains the information and data for the selected page. If the page
allows you to modify or create data, a Save (or OK) and Cancel button are anchored to
the bottom left corner of the main area.
Footer. In addition to copyright information, the footer displays links to the Ipswitch Web
site, the help system and documentation for the product, the knowledge base, and the
iCare campaign.
Note: Some pages are designed to act as dialogs, requiring that content be saved or the
action cancelled. On these pages, the top menu in the header and the contextual menu in
the navigation area are not displayed.
Home Menu
Home. Select this option to return to the home page.
Server Menu
Listeners. Select this option to manage listeners. From the listeners, you can configure
SSH host keys and SSL certificates.
Hosts. Select this option to manage hosts.
SSL Certificates. Select this option to create, import or delete SSL certificates.
Log Viewer. Select this option to view the server log statistical information about the
server.
Notifications. Select this option to view existing notifications or create new ones.
Session Manager. Select this option to view statistics about the current sessions
connected to the server and to forcefully terminate specific sessions.
Server Settings
Server Details. Select this option to view information about the server and to
configure the host separator for all hosts.
Notification Server. Select this option to specify the information needed to connect
to the notification server.
Log Settings. Select this option to specify the information needed to connect to the
log server. You can also specify the depth of detail that is logged.
Services. Select this option to manage the WS_FTP Server services. From this page, you
can view the current status of each service and start, stop or restart any of the services.
9
Ipswitch WS_FTP Server User Guide
Host Menu
Current host name. Select this option (which displays as the host name of the current
host) to open the home page for this host.
Manage Hosts. Select this option to open the host selection page used to change the
current host.
Host Details. Select this option to configure host, user and password options for the
current host.
Users. Select this option to manage users on the current host.
User Groups. Select this option to manage user groups on the current host.
Folders. Select this option to specify permissions on folders and to manage virtual
folders.
Rules & Notifications
Failed Login Rules. Select this option to configure rules that are triggered after
multiple failed attempts to log in.
Folder Action Rules. Select this option to configure rules that are triggered when
specified actions are performed on specified folders and files.
Quota Limit Rules. Select this option to configure the amount of disk space each user
or user group can consume.
Bandwidth Limits. Select this option to configure how much bandwidth each user or
user group can consume.
SITE Commands. Select this option to configure and manage permissions to SITE
commands for the current host.
Host Settings
Access Control. Select this option to control access to the host by IP address.
Firewall Settings. Select this option to specify the IP address and port that the server
uses in response to passive connections.
Messages. Select this option to specify welcome and exit messages for the host.
SSL Settings. Select this option to configure SSL settings specific to the host.
Help Menu
Help System. Select this option to open the help file.
Support
Support Center. Select this option to open the support center pages on the Ipswitch
web site.
Knowledge Base. Select this option to open the knowledge base on the Ipswitch web
site.
About Ipswitch
Ipswitch Web Site. Select this option to open the Ipswitch web site.
iCare. Select this option to find out about iCare, Ipswitch's campaign to fight child
poverty.
10
CHAPTER 2 Learning about WS_FTP Server Manager
About this Product. Select this option to view information about the product, including
serial and activation numbers.
11
CHAPTER 3
13
Ipswitch WS_FTP Server User Guide
There are two types of default hosts: the default host for the WS_FTP Server Manager and the
default host for listeners.
2 In Default host, select the name of the host you want to serve as the default host for
the WS_FTP Server Manager.
3 Click Save.
To change the default host for a listener:
1 From the top menu, select Server > Listeners. The Listeners page opens.
2 Click the IP address of the listener you want to open. The Edit Listener page opens.
3 In the Hosts associated with this listener list, select the checkbox next to the host
name of the host you want to use as the current listener's default host. If only one host
exists in the list, it is already the default.
4 Click Set Default. The select host is made the default host for the current listener.
5 Click Save.
14
CHAPTER 3 Configuring and Managing
WS_FTP Server
Usernames cannot include the host separator. If you wish to use a different host separator (so
that usernames can match email address, for example), you must change the host separator.
2 In Host separator, enter any single character that you want to use to separate
usernames and host names.
Caution: If a username includes the character you specify as the host separator, that user will
not be able to authenticate after you change the host separator.
3 Click Save.
To create an alias, add an entry in your DNS records like the one below:
Users could then log on to ftp.ipswitch.com. The alias also allows you to move your site to
another host without changing the hostname.
For more information, consult the documentation for your DNS system or contact your
network administrator.
15
Ipswitch WS_FTP Server User Guide
16
CHAPTER 4
Configuring Hosts
In This Chapter
About hosts .......................................................................................................... 17
Choosing host configuration ......................................................................... 18
Creating hosts...................................................................................................... 18
Associating hosts with listeners .................................................................... 19
Configuring an external user database ...................................................... 20
Microsoft Active Directory user database.................................................. 26
Setting host options .......................................................................................... 27
Deleting hosts...................................................................................................... 35
Renaming hosts .................................................................................................. 35
Managing hosts from the command line .................................................. 35
Configuring SITE commands.......................................................................... 37
About hosts
To use the WS_FTP Server with a single host, the host uses the network host name and IP
address of the computer on which you are installing the program.
17
Ipswitch WS_FTP Server User Guide
When a user logs on anonymously, they are placed in the top directory of the host.
Anonymous users can access any folders for which you have granted permissions to
anonymous.
Note: Sharing a listener with the primary host may present a problem for some older clients
and Web browsers. In previous versions of Ipswitch WS_FTP Server, a host that shared a
listener with another host was referred to as a virtual host.
Using a different listener. If you configure a new host to have a dedicated listener
(either on the standard port on a different IP address or a nonstandard port on the IP
address of the listener assigned to the primary host), users need to specify only their
usernames to log in.
Setting up a host is a two step process. First you must configure the host, then you must
assign a listener or listeners to the host.
Creating hosts
To create a new host:
1 From the top menu, select Server > Hosts. The Hosts page opens.
18
CHAPTER 4 Configuring Hosts
19
Ipswitch WS_FTP Server User Guide
Important: If the listener you want to use is not in the list, you will need to configure it first.
For more information, see Configuring Listeners (on page 41).
3 Under Hosts Associated with this Listener, click Add. The Select Host page opens.
4 Select the new host you created from the list, then click OK. The Listener Details page
reopens with the new host listed under Hosts Associated with this Listener.
5 Click Save.
Note: The type of user database used by a host must be selected when the host is initially
created. User database type for a host cannot be changed after the host is created.
20
CHAPTER 4 Configuring Hosts
Using the WS_FTP Server Manager, you can display each user account and modify file transfer
settings for an account, but you cannot add or delete user accounts. You must add or delete
user accounts through Windows.
21
Ipswitch WS_FTP Server User Guide
5 For WS_FTP Server to access the Microsoft Windows user database, you must change
the user context under which WS_FTP Server is running using one of the following
methods:
Provide impersonation credentials for the host. WS_FTP Server can impersonate
any Windows user. For more information, see Changing user context via user
impersonation (on page 25).
Change the user context for WS_FTP Server services and the IIS virtual folder.
You can change the WS_FTP Server services to run as a Windows user who has access
to the Microsoft Windows user database. For more information, see Changing user
context on the services (on page 25).
Note: If you choose to change user context on WS_FTP Server services and the IIS virtual
folder, you must restart all services before the changes become active.
You can view each user and modify settings for an account, but you cannot create or delete
user accounts. You must create and delete user accounts through the IMail Server
administrator.
Important: To use this option, Ipswitch IMail Server version 2006.1 or later must be installed
on the same computer as Ipswitch WS_FTP Server.
The host name you enter for the file transfer host must be the exact name of the official
host name used by IMail Server.
You cannot use this option if IMail Server is using the Windows user database for user
authorization.
The host does not use IMail Server top folders by default, but you can set the top folders
to be the same, thus allowing users to access their mail folders via FTP or SSH.
You must configure the ODBC user database before users can authenticate using this user
database.
Before you can configure an ODBC user database, you must establish an ODBC system data
source name through the Data Sources tool (found in the Windows Control Panel).
22
CHAPTER 4 Configuring Hosts
Note: If you are configuring an external database that uses Windows credentials for
authentication, such as Microsoft SQL Server, you must enter the credentials in the host
impersonation (on page 25) fields on the Host Details page even if the credentials are already
specified in the DSN and on the User Database Configuration page.
If you create or delete a user on an external database, you must synchronize the database
before the changes appears in the WS_FTP Server Manager.
Note: If you remove a user from an external user database, the user information and
permissions remain in the WS_FTP Server database until the databases are synchronized. The
user cannot, however, authenticate to the server even if the databases have not been
synchronized. When the databases are synchronized, the user is removed and the user's
home folder is moved to the Windows Recycling Bin.
23
Ipswitch WS_FTP Server User Guide
Note: If you are viewing users on a host that does not use an external user database, the
Synchronize button is not displayed.
Tip: You can schedule ftpdbsync.exe in Scheduled Tasks in the Windows control panel to
automatically synchronize users from external databases on a regular interval.
To use ftpdbsync.exe:
1 From the Windows desktop, select Start > Run. The Run dialog appears.
2 Enter cmd.exe and click OK.
3 Change the directory to the WS_FTP Server directory. For a default installation, this
location is C:\Program Files\Ipswitch\WS_FTP Server\Utilities\.
4 Enter ftpdbsync <hostname>, replacing <hostname> with the name of the host for
which you want to synchronize users.
When this option is enabled, Windows file permissions are used in addition to the
permissions explicitly configured in WS_FTP Server, with the most restrictive permission
granted to the user.
Note: If you opt to use Windows file permissions, users cannot authenticate over SSH using
public key authentication. Since no key is associated with the Windows user account, users
must authenticate using a password.
24
CHAPTER 4 Configuring Hosts
3 Next to User database, click Configure. The User Database Plug-in page opens.
This option may also be used to specify an account to use to access a Windows domain or an
Active Directory user database.
Warning: The credentials saved to the database are encrypted. If you do not want to save
your credentials to the database, however, you can change the user that the services and the
IIS Web site run as to achieve the same effect for the entire server. For more information, see
Changing user context on the services (on page 25).
25
Ipswitch WS_FTP Server User Guide
Using the WS_FTP Server Manager, you can display each user account and modify file transfer
settings for an account, but you cannot add or delete user accounts. You must add or delete
user accounts through the Active Directory Users and Computers.
26
CHAPTER 4 Configuring Hosts
is cleared, only the users in the specified organizational unit are granted access to
WS_FTP Server; users in organizational units contained within the specified
organizational unit are not granted access.
User Group. Specify the fully distinguished name for the user groups that contain the
users you want to allow to authenticate to the file transfer server. You can specify
multiple group distinguished names separated by the pipe character ("|").
For example:
CN=Group1,OU=YourOrgUnit,DC=YourDomain,DC=com|CN=Group2,OU=AnotherOr
gUnit,DC=YourDomain,DC=com
Note: The organizational unit that a user group belongs to does not have to match or be
contained within the organizational unit entered in the first field.
Tip: For more information about distinguished names, see "LDAP Naming Model" in How
Active Directory Searches Work (http://www.ipswitch.com/adsearch) on the Microsoft Web
site.
Use Microsoft Windows file permissions. Select this option to use Microsoft
Windows file permissions in addition to any permissions set within WS_FTP Server. For
more information, see Using Windows file permissions (on page 24).
Note: If you opt to use Windows file permissions, users cannot authenticate over SSH using
public key authentication. Since no key is associated with the Windows user account, users
must authenticate using a password.
4 Click Save.
5 For WS_FTP Server to access the Microsoft Active Directory, you must change the user
context under which WS_FTP Server is running using one of the following methods:
Provide impersonation credentials. WS_FTP Server can impersonate any Windows
user. For more information, see Changing user context via user impersonation (on
page 25).
Change the user context for WS_FTP Server services and the IIS virtual folder.
You can change the WS_FTP Server services to run as a Windows user who has access
to the active directory. For more information, see Changing user context on the
services (on page 25).
Note: If you choose to change user context on WS_FTP Server services and the IIS virtual
folder, you must restart all services before the changes become active.
27
Ipswitch WS_FTP Server User Guide
Important: While limits are configured per host, they are enforced per protocol. If a host has
two listeners associated with it, one FTP and one SSH, then the host will permit the
maximum number of users and anonymous users to connect for each protocol. If Max
number of connections is set to 10, for example, then the host will permit 10 users to
connect via FTP and 10 via SSH (for a potential maximum of 20).
If a host has multiple listeners of the same protocol type, the limits are still enforced by
protocol. For example, if a host has 3 SSH listeners and 2 FTP listeners, it will permit only 10
total FTP users and 10 total SSH listeners (for a potential maximum of 20) to connect
concurrently.
Note: If the user limit is exceeded, a system administrator or host administrator can still log
on using the Ipswitch Web Admin. Also, a system administrator can always log on using a
client.
Entering zero for either option disables new connections. This provides a way to temporarily
shut off access to the host, so you can update files. New connections are not allowed, but
current connections will continue until the user logs off, the connection exceeds the timeout
value, or the connection is terminated by an administrator. Setting Max number of
28
CHAPTER 4 Configuring Hosts
connections to zero disables any new connections; setting Max number of anonymous
connections to zero disables only new anonymous connections.
When an anonymous user logs on to a host, they can perform any action which they are
granted permission, either by a direct permission on the account or by the anonymous
group, which all users marked as anonymous are automatically added to.
Tip: You also set permissions for the anonymous user on any folders. For example, you can
use folders or virtual folders to create a download or an upload folder for anonymous users.
29
Ipswitch WS_FTP Server User Guide
2 Select whether you want to grant or deny access to, by default, all computers in the list.
3 Click Create to add another computer or group of computers to the IP Address list. The
Create Access Control List Entry page opens.
4 Enter the appropriate information for each of the fields.
Define access controls for. Select the type of access control entry.
A single computer or IP address. Select this option to grant or deny access to a
single computer or IP address. If this option is selected, the Net mask field is
disabled.
A group of computers. Select this option to grant or deny access to a group of
computers or IP addresses.
IP address. Enter the IP address of the computer to be added to the access control
list.
Net mask. If you are defining access for a group of computers, enter the subnet mask
for the group. For example, if you have a class C address space of 156.21.50.0, enter a
IP address of 156.21.50.0 and a net mask of 255.255.255.0. This will deny access to the
254 systems with the IP address of 156.21.50.1 through 156.21.50.255.
5 Click Save. The Access Control page opens again with the new entry listed in the IP
Address list.
30
CHAPTER 4 Configuring Hosts
Note: If you specify an IP address and not a port, the server will use any available port above
1024, but will still use the specified IP address in the response. If you specify a port or port
range and not an IP address, the server will use its own IP address and only the specified
ports.
3 Click Save.
31
Ipswitch WS_FTP Server User Guide
Tip: If a host uses multiple listeners, you must configure the banner message on each
listener used by the host to make sure that all users connecting always get the same banner
message. Similarly, if two hosts use one listener, users connecting to both hosts are
presented the same banner message.
32
CHAPTER 4 Configuring Hosts
2 In Welcome message and Exit message, enter text for the messages. You can use
message variables (on page 33) in these messages.
3 Click Save.
33
Ipswitch WS_FTP Server User Guide
Note: Since this setting is made on the listener, it applies to all hosts that use the listener. If a
host uses multiple listeners, it is possible that there may be different timeouts set depending
on which listener the client used to connect to the host.
34
CHAPTER 4 Configuring Hosts
3 Enter the Max number of connections and Max number of anonymous connections
you want to allow to connect to this host concurrently.
4 Click Save.
Important: While limits are configured per host, they are enforced per protocol. If a host has
two listeners associated with it, one FTP and one SSH, then the host will permit the
maximum number of users and anonymous users to connect for each protocol. If Max
number of connections is set to 10, for example, then the host will permit 10 users to
connect via FTP and 10 via SSH (for a potential maximum of 20).
If a host has multiple listeners of the same protocol type, the limits are still enforced by
protocol. For example, if a host has 3 SSH listeners and 2 FTP listeners, it will permit only 10
total FTP users and 10 total SSH listeners (for a potential maximum of 20) to connect
concurrently.
Deleting hosts
If a host is no longer needed, you can delete it. Deleting a host removes the host and all data
associated with it, including users, groups and rules.
To delete a host:
1 From the top menu, select Server > Hosts. The Hosts page opens.
2 Select the checkbox next to the name of the host you want to delete.
3 Click Delete. The Delete Confirmation page opens.
4 To delete the host, click Delete. The host configuration is deleted from the server.
Note: Deleting a host only removes the host configuration from the server. Files and folders
that were created on the host by users or administrators are not removed.
Renaming hosts
You can change the name of a host in WS_FTP Server. If you rename a host without updating
the Domain Name Service records that point to the host, the host may become inaccessible.
To rename a host:
1 From the top menu, select Host > Host Details. The Host Details page opens.
2 Enter a new Host name.
3 Click Save.
35
Ipswitch WS_FTP Server User Guide
Note: All arguments are case-sensitive and must be supplied as lower case.
36
CHAPTER 4 Configuring Hosts
-hide Use to show files and folders whose names begin with the
dollar sign ($).
+lt Use the server's local time instead of Greenwich Mean Time
(GMT).
-lt Use GMT instead of the server's local time.
+ext Enable extended commands for the host (such as FEAT,
HOST, LANG, MDTM, MLST, OPTS, XAUT, AUTH SSL and
AUTH TLS).
-ext Disable extended commands for the host (such as FEAT,
HOST, LANG, MDTM, MLST, OPTS, XAUT, AUTH SSL and
AUTH TLS).
+tpt Allow third-party transfers.
-tpt Disable third-party transfers.
-rd Use to delete all files and folders associated with the host.
By default, all files and folders remain when a host is
removed.
You can configure a SITE command to execute any program or application that you could run
if you were logged onto the server.
For example, a server administrator could create a SITE command called UNZIP that could be
issued by clients to decompress ZIP archive files previously uploaded to the server.
To use this SITE command, the client sends UNZIP filename.zip to the server. Ipswitch
WS_FTP Professional can send this command using the QUOTE feature. To learn how to issue
text commands in another client, consult that client's documentation.
Note: The Windows user your file transfer services are running as (usually IPS_<WS_FTP
Server admin username>) must have permissions to the executable that is run by the SITE
command. If the user does not have permission to run the executable, the SITE command
fails.
37
Ipswitch WS_FTP Server User Guide
Note: If using a batch file, you must enter CMD.exe in the Host Command Executable dialog.
In the Program Arguments dialog, enter the full path of the batch file in quotation marks. For
example: “c:\iFtpSvc\jump.bat”
Parameters. Enter any arguments to pass to the executable when the command is
triggered. Enter %1-%5 for the allowed number of user-defined variables, as well as
any command line arguments that are to be used when the command is executed.
Spaces are delimiters for arguments, so a single argument with a space will be treated
as two, unless the entire argument is in quotation marks.
Send output to client. Select this option to return the output of the executable and
parameters to the user's client.
Permissions list. This list contains all of the users and user groups on this host. Select
the users and groups you want to grant permission to execute this SITE command by
clicking the checkbox next to user or user group name.
4 Click Save.
38
CHAPTER 4 Configuring Hosts
39
Ipswitch WS_FTP Server User Guide
40
CHAPTER 5
Configuring Listeners
In This Chapter
About listeners .................................................................................................... 41
Configuring listeners for SSH ......................................................................... 42
Configuring listeners for SSL .......................................................................... 43
About listeners
Listeners are a combination of an IP address and port number on which a server is configured
to allow connections. You can configure as many listeners as you want, up to one per port on
each available IP address.
There are two kinds of listeners: FTP and SSH. FTP listeners provide access to hosts using basic
FTP and SSL (implicit and explicit). SSH listeners provide access to hosts using the SFTP
protocol over SSH.
41
Ipswitch WS_FTP Server User Guide
3 Select a Listener type. After the listener is created, you can edit it to modify settings
specific to the type of listener selected.
4 Enter an IP address, or select All IPs to have this listener use all IP addresses configured
on the server.
5 Select a Port. By default, FTP listeners use port 21 and SSH listeners use port 22. To
configure an FTP listener for Implicit SSL, specify port 990.
6 Enter a Banner message, if desired. This message may contain message variables (on
page 33).
Tip: To configure an SSL listener, select FTP as the Listener type. After saving the listener, you
can configure specific SSL settings by editing the listener.
42
CHAPTER 5 Configuring Listeners
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
3 Under Hosts Associated with this Listener, verify that the host you want to be
accessible via SSL is listed. If it is not, add the host before proceeding to the next step.
For more information, see Associating a Host with a Listener (on page 19).
4 Verify that the listener has the SSL type set to SSL enabled or Implicit SSL.
5 Next, specify the SSL certificate for the listener to use to negotiate SSL connections.
To specify an SSL certificate:
1 From the top menu, select Server > Listeners. The Listeners page opens.
2 Click the IP address of the listener you want to open. The Edit Listener page opens.
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
43
Ipswitch WS_FTP Server User Guide
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Verify that the certificate listed in SSL certificate is the certificate you want to use. If no
certificate is listed, or if a certificate other than the one you want to use is listed, click
Select. The Select SSL Certificate page opens. From this page, you can select, create or
import a certificate to use.
Caution: The certificate applied to the listener is the SSL certificate used for all hosts
assigned to this listener when a client attempts an SSL connection. Changing the certificate
listed in SSL certificate affects all hosts assigned to this listener.
In addition to the SSL settings configured on the listener, there are several options that are
host-specific. To edit these options, select Host > Host Settings > SSL Settings from the top
menu.
44
CHAPTER 6
If you selected the Microsoft Windows, Ipswitch IMail Server, or external (ODBC) user
databases, you may already have a list of users for the host. In this case, you cannot use the
WS_FTP Server Manager to add or delete users, but you can set additional user options in the
Host Details page in the User Settings section.
If you are using a user database other than the WS_FTP Server internal database, you must
use the other database's method to add or remove user.
45
Ipswitch WS_FTP Server User Guide
Tip: You can use a network share as a host's top folder. To do this, use Windows Explorer to
map the share to a drive, then select that drive for the top folder of the host.
Auto-create users' home folders (selected by default). If selected, user folders are
automatically created when a new user is added to this host.
46
CHAPTER 6 Managing User Accounts
Caution: If Auto-create user folders is cleared, users will be connected to the root directory
even if Login location is set to Home folder. Administrators must manually create a home
folder for the user before they will be able to log in to it. If the users are logged in to the root
directory because they have no home folder, and the user is locked to his home folder, the
user will not be able to see or do anything once logged on.
List folders in /users folder. If selected, all users can view all folders in the /users
folder. If cleared, all folders except the user's home folder are hidden.
Note: System and host administrators can always see all folders in the /users folder.
Grant full home folder permissions when creating user (selected by default). When
selected, new users are granted full permissions to their user home folders when they
are created.
Max number of connections (1000 by default). Enter the total number of users who
can be logged in at any given time. This includes both anonymous and authenticated
users.
Allow anonymous access. If selected, anonymous users can access the host. If
cleared, users must authenticate with valid credentials before they can gain access to
the host.
Max number of anonymous connections (200 by default). Enter the total number of
anonymous users who can be logged in at any given time.
3 Click Save.
You can configure a host on WS_FTP Server to require user passwords to meet minimum
security standards.
47
Ipswitch WS_FTP Server User Guide
Caution: Encrypt passwords stored on server cannot be changed after a host is created.
3 Click Save.
To enable a disabled system administrator account using the command line utility:
1 Log on to the operating system of the computer where WS_FTP Server is installed.
2 Select Start > Run. The Run dialog appears.
3 Enter cmd.exe and click OK. The command line window opens.
4 Enter iftpaddu.exe -mod -h <host name> -u <user name> +active, where
<user name> is the name of the user you want to restore and <host name> is the
name of the host to which the user belongs.
5 Press the Enter key. A message appears indicating whether or not your command
succeeded. If the command succeeded, you can log on to the WS_FTP Server Manager
using a Web browser.
48
CHAPTER 6 Managing User Accounts
4 Select a user from the list by clicking on the hyperlinked username. The Edit User page
opens.
5 Click the Reset button next to Failed login count.
49
Ipswitch WS_FTP Server User Guide
Note: If you are using a Microsoft Windows user database, Ipswitch IMail database, or some
ODBC databases, you must use the respective database management tools to create and
delete users. After the user is created, you can modify other settings in WS_FTP Server
Manager.
50
CHAPTER 6 Managing User Accounts
51
Ipswitch WS_FTP Server User Guide
Disable login. Select this option to disable this user account. If this option is selected,
this user cannot log in to the server.
User can change password. Select this option to allow this user to change his or her
password. This option is not available on hosts that use Microsoft Windows, Microsoft
Active Directory or Ipswitch IMail user databases.
Require user to change password every x number of days. When this option is
selected, users are required to change their password at least once during the time
frame specified. If a user fails to change his password during the allotted time, he
cannot authenticate to the server. If this option is selected, the number of days
remaining before this user must change his password is listed below this field. This
option is only available if User can change password is enabled.
Home folder. Select whether you want this user's home folder to be created in the
default location or a custom location. If you select Custom, enter the full path to the
folder or click Browse to locate it.
Lock user to home folder. Select this option to prevent this user from navigating
outside their home folder.
Account creation date. Today's date is displayed.
Account expiration option. This option is used to specify when and how a user
account should expire.
Never expire. Select this option if you do not want the user account to expire.
Expire on the expiration date. This option expires the account on the specified
date.
Expire account on. If you have selected Expire on the expiration date, a date field
appears here. Using the calendar ( ), select the date after which you want this
account to expire.
4 Click Save.
Note: If you want to create a user account on a host other than the current host, you can
switch hosts by selecting Host > Current Host > Change Hosts from the menu. Select the
host you want to create a user account for, then follow the steps as listed above.
52
CHAPTER 6 Managing User Accounts
Note: If you want to keep a user from navigating outside their home folder, select the Lock
user to home folder option.
To rename a user:
1 From the home page, select Hosts. The Hosts page opens.
2 Click the Host name of the host you want to open. The Host Settings page opens.
3 From the left navigation menu on the left, select Users. The Users page opens.
4 In the list of users, select a user by clicking on the linked Username. The Edit User page
opens.
5 In Username, enter new name for the user.
6 Click Save.
Note: When you delete a user's home folder, it is moved to the Windows Recycling Bin. If you
delete something in error, you can restore it from the Recycling Bin.
5 To delete the user, click Delete. The user is deleted from the server.
Note: When the user account is deleted, the user is removed from all groups and rules. If you
recreate the user, you must manually add the user to each group and rule to return to the
state before the user was deleted.
53
Ipswitch WS_FTP Server User Guide
Important: Previous versions of WS_FTP Server user command line utility included
arguments to specify quota limits for a user, using the -x and -s arguments. These arguments
are no longer supported and are ignored by the user command line utility. The same
functionality can be achieved, however, by configuring a user group to which the desired
quota limits are applied and adding the user to that group via the user command line utility.
Important: You cannot use this utility to add users to a host that uses a Microsoft Windows
user database, Ipswitch IMail database, or External ODBC database.
54
CHAPTER 6 Managing User Accounts
Note: All arguments are case-sensitive and must be supplied as lower case.
-h hostname Specifies the user's host, where hostname is the name of the file transfer host. The
primary FTP host is used if no host is specified.
-n "full Specifies the full name of the user. The full name must be enclosed in quotes if it
name" contains any spaces.
-p password Specifies the password for a user. If you omit this argument when adding a user, the
user's password defaults to "password."
+g groupname Adds the user to the specified group.
-g groupname Removes the user from the specified group.
+active Enables the user to log on. This is the default setting when adding a new user.
-active Disables the user account, so the user cannot log in.
+chgpass Enables the user to change password from an FTP client.
-chgpass Disables the user's ability to change password from an FTP client.
+sysadm Grants the user System Administrator permissions.
-sysadm Removes System Administrator permissions from the user.
+hostadm Grants the user Host Administrator permissions.
-list Outputs a list of the commands needed to generate all of the users on a host in a
format that can be used with the -f argument. If -u is specified, only the commands
needed to generate the specified user are output. Examples:
iftpaddu -u admin -h serverhostname -list
iftpaddu -h serverhostname -list
55
Ipswitch WS_FTP Server User Guide
56
CHAPTER 6 Managing User Accounts
57
CHAPTER 7
Once you create a user group, you can manage permissions to folders, rules and SITE
commands for the entire group as easily as you manage permissions for a single user.
59
Ipswitch WS_FTP Server User Guide
60
CHAPTER 8
Managing folders
For the most part, folder management for the remote (FTP or SSH) file system is done through
standard methods of managing folders on the operating system. With Windows Explorer, you
can find the top folder of a host (for example C:\Program Files\Ipswitch\WS_FTP
Server\MyHost) and create , rename, or delete folders under that host. For security reasons,
you cannot manage physical folders remotely using WS_FTP Server Manager. You must log
on to the server directly.
You can, however, manage virtual folders and folder permissions for all folders via WS_FTP
Server Manager.
For example, if you created a folder located at C:\Documents\ that you wanted to include
under a host named MyHost whose top folder is C:\Program Files\Ipswitch\WS_FTP
Server\MyHost, you could create a virtual folder in the root of the MyHost host and point it
to C:\Documents\.
61
Ipswitch WS_FTP Server User Guide
Tip: You can use a network share anywhere that you specify a physical folder on the server.
To do this, you must enter the UNC path to the shared folder. You must also give
permissions to the shared folder to the Windows user account under which the WSFTPSVR
folder in Microsoft IIS is running. If that user cannot access the shared folder through the
Windows explorer, you cannot access the folder via the WS_FTP Server Manager.
Only viewable with 40-bit SSL or higher. Select this option to make this folder
viewable via FTP only if the user has logged in using 40-bit SSL or higher.
Only viewable with 128-bit SSL or higher. Select this option to make this folder
viewable via FTP only if the user has logged in using 128-bit SSL or higher.
Virtual display location. Select where you want this virtual folder to display.
Not displayed. Select this option to exclude this virtual folder from folder listings.
Users who know virtual folder name can still access it by providing the folder
name manually.
Display at root. Select this option to display this virtual folder as a subfolder of
the server root folder.
Display in user. Select this option to display this virtual folder as a subfolder of
each user's home folder.
Important: If you change the virtual display location of a virtual folder for which folder
action rules are configured, you must update the folder action rules to use the new file path.
If you do not do this, the folder action rules will not work.
62
CHAPTER 8 Managing Folders and Files
Permissions
This section of the page displays and lets you manage user permissions for this folder. By
default, users do not have permissions to new folders. To view or grant permissions to the
folder, use the Permissions options.
You can perform the following tasks related to user permissions on a folder:
Add permissions to this folder. To add a permission to this folder, click Add.
View or modify permissions to this folder. Click a user or user group name to open
the Edit Permissions page. From there, you can view or modify the permission.
Remove permissions from this folder. Select a permission by selecting the checkbox
beside the user's or group's name. Select multiple permission by selecting multiple
checkboxes. Once you have made your selection, click Remove to remove the
selected permissions from this folder.
For more information, see Using WS_FTP Server Manager to Manage Permissions (on page
66).
- OR -
63
Ipswitch WS_FTP Server User Guide
If a user's home folder is set to a custom location (outside of the /users folder under the
top folder of the host), then virtual folders configured to display in a users' home folders
are not displayed.
A virtual folder cannot contain another virtual folder. If a file structure is created where
one virtual folder could conceivably contain another, the second virtual folder is not
displayed.
If the physical folder the virtual folder references is changed or deleted, the virtual folder
is still displayed to users, but it cannot be accessed. Users attempting to access a virtual
folder that points to a nonexistant physical folder receive the following error message:
550 CWD virtual: access denied.
Permit. Permit permissions grant users or groups access to the folder on which the
permission is applied.
Deny. Deny permissions are used when you want to specifically deny a user or group
permission to a folder. Deny permissions take precendence over all other permissions, so
a deny permission guarantees that a user cannot perform the action indicated in the
permission.
For each permission, you can also indicate which actions you want to permit or deny:
Read. This option refers to downloading files from the server.
List. This option refers to retrieving a folder listing, which shows the files in the folder,
from the server.
Write. This option refers to uploading files to the server.
Delete. This option refers to deleting files or folders from the server.
Rename. This option refers to changing the name of a file or folder already on the server.
Create folder. This option refers to creating a new folder under the folder where the
permission is set.
Finally, you can also choose to have a permission apply only to files that match a specified file
mask. To match all files, enter *.
For each permission, you can choose to have the option propagate down to all subfolders of
the folder where the permission is set by selecting Include subfolders.
User and group permissions are aggregated. WS_FTP Server evaluates permit permissions
first, then deny permissions to determine the actual permissions granted.
65
Ipswitch WS_FTP Server User Guide
Note: To use Windows file permissions exclusively, we recommend granting the Everyone
group full permission to the root of your host and propagate the permissions to subfolders. If
the host includes any configured virtual folders, grant the Everyone group full permission to
each virtual folder and propagate the permissions to subfolders.
You can manage user/group folder permissions from the Folder Permission page.
66
CHAPTER 8 Managing Folders and Files
Permission Type:
Allow. Select this option to permit access to the following permission options.
Deny. Select this option to not permit access to the following permission options.
Select/Deselect All. Select to grant full permissions. Clear to remove all permissions.
Read. Select this option to grant permissions to read files.
List. Select this option to grant permission to list the files in the folder.
Write. Select this option to grant permission to add files or modify files to the folder.
Delete. Select this option to grant permission to delete files from the folder.
Rename. Select this option to grant permission to rename files or folders in the folder.
Create folder. Select this option to grant permission to create subfolders in the
folder.
Include subfolders. Select this option to extend the permissions assigned to this
folder to all folders beneath it.
5 Click Save.
Important: WS_FTP Server uses the highest permission restriction level to determine
permission priority. For example, you can restrict users from areas that Windows permissions
would allow by setting stronger permissions on the folder in the WS_FTP Server Manager.
67
Ipswitch WS_FTP Server User Guide
The table below indicates the algorithms supported during FTP and SSH/SFTP connections as
well as the command the client must issue to check the integrity of a file using one of the
supported algorithms.
Algorithm Client command FTP SSH/SFTP
SHA512 XSHA512
SHA256 XSHA256
SHA1 XSHA1
CRC32 XCRC
MD5 XMD5
An algorithm must be supported by both the server and the client to be used in file transfer
checking. To determine which algorithms are supported by your file transfer client, consult its
user documentation.
Note: For file integrity checking to work, the Enable extended FTP commands option must
be enabled on the Host Details page of the host on which you want to support file integrity
checking.
68
CHAPTER 9
Rules overview
The rules feature lets you define actions and notifications that are triggered by specific
events. You can set up rules to prevent or allow actions (such as downloading a file or
creating a folder) and to send notifications via email, pager or SMS. A rule can also execute a
program on the server when the event occurs.
69
Ipswitch WS_FTP Server User Guide
Quota Limit Rules are used to govern the amount of disk space and the number of files
users can upload to their home folders. For more information, see Creating a Quota Limit
Rule (on page 73).
Bandwidth Limits are used to throttle the amount of bandwidth a connection can
consume. For more information, see Creating a Bandwidth Limit (on page 74).
A failed login occurs each time someone attempts to log in with an invalid username or an
incorrect password. The server keeps track of each failed login attempt for each user. If there
is a failed login rule applied to a user, the server triggers the rule when the number of failed
login attempts exceeds the maximum specified in the rule.
The server can differentiate between failed login attempts caused by invalid passwords and
failed login attempts caused by a disabled account or an account with an expired password.
You can specify which of these types of failed login attempts the server should use when
deciding to send a notification.
70
CHAPTER 9 Using Rules and Notifications
Tip: You can specify message notification variables (on page 80) as arguments to pass to the
executable.
Note: Executables are separate programs that WS_FTP Server runs for you under certain
conditions. Depending on the volume of traffic on your server and the number of times an
executable is run, these programs may consume considerable resources and may cause
performance issues.
5 Click Save.
71
Ipswitch WS_FTP Server User Guide
Tip: Enter *.* to match all files. Enter * to match all files and folders or any number of
characers. Enter a question mark (?) as a wildcard matching a single character.
File path (/ by default). Enter or browse to select the folder you want this rule to apply
to. This path is relative to the root of the host.
Note: If the file path specified is a virtual folder set to display in users' home folders, the rule
only applies to the instance of the virtual folder located at the specific file path displayed. To
apply the rule to the virtual folder under all users' home folders, you must create one rule for
each user's home folder.
Include subfolders (selected by default). Select this option to apply this rule to the
subfolders of the folder specified in File path.
Users/Groups. This list contains all of the users and groups configured on the host.
Select the checkboxes next to the users and groups to whom you want this rule to
apply.
Rule Notifications. This section is used to select one or more notifications to send
and to specify the criteria that trigger the notifications for this rule. Notifications can
be triggered when any of the following actions succeed or fail: upload, download,
rename, delete, create folder.
Notification. This list contains all of the notifications configured on the current host.
Select the checkboxes beside the notifications you want this rule to apply to. To
configure a new notification and associate it with this rule, click Create.
Executable (optional). Enter the full path and file name of the program you want to
run on the server when this rule is triggered.
Arguments (optional). Enter the arguments to pass to the executable, if necessary.
72
CHAPTER 9 Using Rules and Notifications
Tip: You can specify message notification variables (on page 80) as arguments to pass
to the executable.
6 Click OK to save the new folder action rule.
Unlike failed login rules and folder action rules, which send notifications when the rule is
triggered, quota limit rules can be configured to send notifications as a warning prior to the
absolute limit being reached. For example, a quota limit rule that specifies a limit of 20 MB in
the home folder can be configured to also send notifications as a warning when the size of
the user's home folder reaches 18 MB.
73
Ipswitch WS_FTP Server User Guide
Rule Notifications. This section is used to select a notification (or notifications) and to
specify the criteria that trigger the notifications for this rule. Send notification when
rule is triggered as a result of:
Number of files in user's home folder and its subfolders exceeds ... files. When
the total number of files in the user's home folder (and its subfolders) grows larger
than the specified number, any notifications attached to this rule are triggered. If
you do not want to limit the number of files in the user's home folder, enter 0.
Size of user's home folder exceeds ... [KBs, MBs, GBs]. When the user's home
folder grows larger than the specified maximum amount of disk space, any
notifications attached to this rule are triggered. If you do not want to limit the size
of the user's home folder, enter 0.
Notification. This list contains all of the notifications configured on the current
host. Select the checkboxes beside the notifications you want this rule to apply to. To
configure a new notification and associate it with this rule, click Add.
Execute the following program when the rule is triggered. Select the option to
enable a selected program to run when a rule is triggered.
Executable (optional). Enter the full path and file name of the program you want
to run on the server when this rule is triggered. Click Browse to browse for the
program file name.
Arguments (optional). Enter the arguments to pass to the executable, if
necessary.
6 Click Save to save the new Quota Limit Rule.
In situations where users share a server, bandwidth limits can be employed to ensure that no
user or group can consume all of the bandwidth available to the server, which could
effectively cause a denial of service for other users.
Since bandwidth limits cannot be exceeded, bandwidth limits are the only type of rule that
does not trigger notifications.
Note: Bandwidth limits throttle bandwidth by connection, not by user. This means that a
user with a client that supports making multiple simultaneous connections, such as Ipswitch
WS_FTP Professional, can consume the full amount of bandwidth available, up to the
bandwidth limit, for each connection.
74
CHAPTER 9 Using Rules and Notifications
Note: Bandwidth limits throttle the amount of bandwidth each user can consume per
connection. If a user makes multiple connections simultaneously, each connection is
allowed the maximum bandwidth.
6 Click Save.
About notifications
Notifications can be used with rules to monitor the WS_FTP Server and send a message or
take an actions when an event occurs.
A file transfer event, such as a file upload or download, can trigger a notification that sends a
message to a user or launches an application. Notifications help you respond to events that
occur on the server and automate certain responses, for example:
Inform the server administrator when a disk quota or failed login limit is exceeded.
Inform a user that a file has arrived on the server and is ready for download.
Inform a user or administrator that a particular file has been downloaded.
Notification Types
There are three types of notifications. The notifications define how a message is sent and to
whom the message is sent.
Email. Sends a message to an email address. For more information, see Creating an Email
Notification (on page 77).
Pager. Sends a message to a pager via a dial-up modem. For more information, see
Creating a Pager Notification (on page 78).
75
Ipswitch WS_FTP Server User Guide
SMS. (Short Message Service) sends messages of up to 160 characters (225 characters
using the 5-bit mode) to mobile phones that use Global System for Mobile
communication (GSM). SMS is similar to paging; however, SMS messages do not require
the mobile phone to be active and within range. Instead, the message will be held for a
number of days until the phone is active and within range. SMS messages are transmitted
within the same cell or to anyone with roaming service capability. They can also be sent
to digital phones from a web site equipped with PC Link or from one digital phone to
another. For more information, see Creating an SMS Notification.
Note: The program notifications feature of previous versions of WS_FTP Server is now
included in rules. For more information about creating a rule that launches an application or
a batch file, see Rules Overview (on page 69).
Note: You must be logged in as a system administrator for the Notification Server Settings
link to appear.
76
CHAPTER 9 Using Rules and Notifications
Caution: Verbose mode produces a large quantity of log entries and should only be used for
brief periods of troubleshooting.
Enable WS_FTP Logging. Select this option to enable logging to an Ipswitch Log
Server.
Log server IP address (127.0.0.1 by default). Enter the host name or IP address of
the log server.
Port (5151 by default). Enter the port over which the connection to the log server
should be made.
Enable Syslog. Select this option to enable logging to a syslog server.
Log server IP address. Enter the host name or IP address of the syslog server.
Port. Enter the port over which the connection to the log server should be made.
3 Click Save.
77
Ipswitch WS_FTP Server User Guide
Email server. Enter the IP address or host name of the mail server through which you
want to send this notification. You must possess appropriate permissions to send mail
through this server.
From address. Enter the email address from which the notification should appear to
have been sent.
To address. Enter the address of the recipient of the notification. You can send a
notification to multiple recipients by entering multiple email addresses separated by
commas.
Caution: Entering more than two or three email addresses in the To address field may cause
the performance time of the notification to decrease significantly. In these cases, you should
create an email list in your email server and enters its address in the To address field.
Tip: You can specify a friendly name for From address and To address by using this format:
Frank Gibson <[email protected]>
Subject. Enter a subject for the Email notification. You can use notification variables
(on page 80) in this field.
Message. Enter the message that should be sent with this notification. You can use
notification variables (on page 80) in this field.
4 Click Save.
78
CHAPTER 9 Using Rules and Notifications
"Verbal Results" (V1), "Result Codes Displayed" (X4), and "Local Echo OFF" (F1). The
recommended string to use is: ATEO QO V1 X4 F1.
COM port. Select the COM port to which your modem is connected.
Baud rate. Select the speed (measured in bits per second) at which the serial port will
communicate with the modem. Consult the documentation for your modem if you
are unsure of the appropriate selection.
Data bits. Select the type of data bit transmission to be used for communications
with the selected serial port. Select from 6, 7, or 8.
Parity. Select the form of parity checking you want the modem to use. Parity checking
can be specified as even (a successful transmission will form an even number), odd or
none. No parity means the modems will not transmit or check a parity bit and the
server will assume that there are other forms of error checking being used.
Stop bits. Select whether to use 1 or 2 bits to signal the end of a unit of transmission.
4 Click Save.
SMS notification services are provided by a number of different providers in one of two ways:
Email, where a specifically formatted email message is sent to an address or dialup, the
protocol used in common pagers which requires a modem and the phone number of the
provider and recipient.
Because multiple methods can be used to provide SMS service, there are no common settings
for SMS notifications. Each notification is tied to a provider, which may support either or both
of the delivery methods mentioned.
79
Ipswitch WS_FTP Server User Guide
Name. Enter a name for this notification. This name is for your reference only and will
never be displayed to the notification recipient.
Description. Enter or modify the description. This description is for your reference
only.
SMS provider. Click Select to choose a provider for this notification.
Delivery mode. Select the radio button for the delivery mode you want to use with
this notification. Depending on the provider selected, only one option may be
available.
Email. Enter the email address to which you want to send the notification.
Dialup. Enter the telephone number to dial when this notification is initiated.
Message. Enter the message that should be sent with this notification. You can use
notification variables (on page 80) in this field.
4 Click Save.
80
CHAPTER 10
Using SSL
In This Chapter
What is SSL? .......................................................................................................... 81
Understanding SSL terminology................................................................... 82
SSL Terminology ................................................................................................. 82
Choosing a type of SSL ..................................................................................... 83
Common SSL configurations.......................................................................... 85
Selecting an SSL certificate ............................................................................. 85
Disabling SSL........................................................................................................ 88
Requiring SSL for specific folders.................................................................. 88
Requesting client certificates......................................................................... 89
What is SSL?
SSL (Secure Sockets Layer) is a protocol for encrypting and decrypting data sent across direct
Internet connections. When a client makes an SSL connection with a server, all data sent to
and from the server is encoded with a complex mathematical algorithm that makes it
extremely difficult to decode anything that is intercepted.
Step 3 Client encrypts session key using server's public key and sends it to server
Step 4 Server decodes session key and uses it to open and encrypt secure data channel
Tip: For additional security, the server can require a certificate from the client, which is
compared to a trusted authorities database to determine whether the client should be
allowed to connect. If this option is enabled, the server requests the client certificate
between steps 2 and 3; the client sends its certificate and the server checks to see if it has
been signed by a certificate in the trusted authorities database.
81
Ipswitch WS_FTP Server User Guide
If the server is not configured to accept SSL connections, or if the server requires client
certificates and none is provided or the provided certificate is not found in the trusted
authorities database, then the connection is rejected and the server sends a message to the
client indicating a failed connection.
SSL Terminology
To understand how SSL works, you must understand the various terms used to describe the
parts of the SSL connection. The following is a list of these parts and the role each plays.
Client. Any FTP program that is able to make an SSL connection.
Certificate. The file that contains the identification information of the client or server.
This file is used during connection negotiations to identify the parties involved. In some
cases, the client's certificate must be signed by the server's certificate in order to open an
SSL connection. The server stores certificate files in its database, so no physical file exists.
The certificate includes the public key.
Session key. The session key is what both the client and the server use to encrypt data. It
is created by the client.
82
CHAPTER 10 Using SSL
Public key. The public key belongs to the server, but is used by the client to encrypt a
session key. It does not exist as a file, but is a byproduct of the creation of a certificate and
a private key. Data encrypted with the public key can be decrypted only by the
corresponding private key.
Private key. The private key is used by the server to decrypt the session key. The server
stores private keys in its database, so no physical file exists. Private keys should be
guarded like a password and NEVER shared with anyone.
Certificate signing request. A certificate signing request is generated each time a certificate
is created. This file is used when you need to sign a certificate. Once the certificate signing
request file is signed, a new signed certificate is made, which can replace the unsigned
certificate.
83
Ipswitch WS_FTP Server User Guide
Note: If users are having difficulty accessing the server over SSL using passive mode and
through a firewall, enabling this option may help by sending the IP address and port that the
server should use to establish the connection with the client in a clear, unencrypted format.
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Set the appropriate options.
SSL type (Clear Only enabled by default). Select the type of SSL connection to
attempt when a request comes in to the current listener.
Clear only. No SSL connection is allowed.
SSL enabled. An SSL connection is made after the client connects and issues the
appropriate command. If the SSL command is not issued and you are not forcing
SSL, the connection is made as a standard FTP connection.
Implicit SSL. An SSL connection is made immediately upon connection. With
Implicit SSL, it is impossible for a non-SSL connection to be made on this listener.
The default port for Implicit SSL listeners is 990.
SSL certificate. Displays the SSL certificate currently applied to the current listener.
This is the SSL certificate that the server sends to identify itself to client that connect
to this listener. To select an SSL certificate, click Select.
Request client certificate. If selected, the listener will request an SSL client certificate
before allowing the user to authenticate. In order for the client to authenticate, the
client certificate must be signed by a certificate in the Trusted Authorities list.
SSL security level. Select the versions of SSL and TLS that you want to allow clients to
use to connect.
TLS only (more secure). Select this option to require clients to negotiate SSL
connections using TLS version 1.0 or higher. This option provides the greatest
security, but may cause some clients to fail to connect.
Enable TLS and SSL versions 1, 2 and 3 (selected by default). Select this option
to allow clients to connect using any version of SSL or TLS. This option works with
most clients, but does not protect the server from security vulnerabilities in older
versions of SSL.
84
CHAPTER 10 Using SSL
Trusted Authorities. This list contains a list of certificates which the server trusts to
sign client certificates. When Request client certificate is enabled and a client
attempts an SSL connection, the server prompts the client for a client certificate. The
server then checks to see if the client certificate is signed by any of the certificates in
the trusted authorities list. If not, the connection is terminated.
To add a certificate to this list, click Add.
To remove a certificate from this list, click Remove.
5 Click Save. The Edit Listener page opens.
6 In the Port box, enter 990. For more information, see Setting Up Listeners (on page 41).
7 Click Save.
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
85
Ipswitch WS_FTP Server User Guide
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Next to SSL Certificate, click Select. The Select SSL Certificate page opens.
5 Select the certificate you want to associate with this listener, then click OK. The Edit
Listener page opens again, with the SSL certificate you selected displayed in SSL
Certificate.
6 Click Save.
If the SSL certificate you want to use is not listed, you can import a certificate from another
program. For more information, see Importing an SSL Certificate (on page 86).
If you do not have an SSL certificate yet, WS_FTP Server can create one. For more information,
see Creating an SSL Certificate (on page 87).
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Next to SSL Certificate, click Select. The Select SSL Certificate page opens.
5 Next to SSL Certificate, click Select. The Select SSL Certificate page opens.
6 Click Import. The Import SSL Certificate page opens.
7 Enter the appropriate information for each of the fields.
Name. Enter a name for your certificate. This name is for your reference and is never
displayed to users.
Certificate. Enter the full path and file name of a certificate file on your computer, or
click Browse.
Key File. Enter the full path and file name of a key file on your computer, or click
Browse.
Passphrase. Enter the passphrase needed to decrypt this certificate.
8 Click Save. The Select SSL Certificate page reopens with the imported certificate
included in the list.
9 Select the certificate you just created, then click OK. The Listener Encryption Settings
page opens again, with the SSL certificate you imported displayed in SSL Certificate
box.
10 Click Save.
86
CHAPTER 10 Using SSL
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Next to SSL Certificate, click Select. The Select SSL Certificate page opens.
5 Click Create. The Create SSL Certificate page opens.
6 Enter the appropriate information for each of the fields.
Name. Enter a name for the certificate. This name is for your reference and is never
displayed to users.
Expire date. Enter an expiration date for the certificate, or click the calendar icon to
browse for one.
Passphrase. Enter the passphrase for the certificate. The passphrase is used to
encrypt the key file.
Confirm passphrase. Re-enter the same passphrase as above.
City/Town. Enter the name of the city or town where you are located (for example,
Augusta).
State/Province. Enter the name of the state or province where you are located (for
example, GA).
Country. Enter the two-character code of the country where you are located (for
example, US).
Common name. Enter the host name that users enter to access the host this
certificate will be applied to (for example, ftp.ipswitch.com).
Email. Enter the email address of the person responsible for this certificate.
Organization. Enter the name of your company or, if you are running the server
privately, your name (for example, Ipswitch, Inc.).
Unit. Enter the name of the organizational unit (for example, Information
Technology).
Key size. Select the key size for the certificate. A higher key size creates a more secure
key, but takes longer to generate.
7 Click Save. The Select SSL Certificate page reopens with the new certificate included in
the list.
8 Select the certificate you just created, then click OK. The Listener Encryption Settings
page opens again, with the SSL certificate you created displayed in SSL Certificate box.
9 Click Save.
87
Ipswitch WS_FTP Server User Guide
Disabling SSL
The default installation of Ipswitch WS_FTP Server allows SSL enabled (Explicit SSL) and
Implicit SSL connections. If you do not want to allow SSL connections, you must make
changes to the default configuration.
Note: Since SSL can be configured only on FTP listeners, make sure that you select a listener
that displays FTP in the Server type column.
3 Under Encryption Options, click Edit SSL Settings. The Listener Encryption Settings
page opens.
4 Change SSL type to Clear Only, then click Save.
Note: Minimum SSL strength to view affects FTP listeners only. Clients connected over
SSH/SFTP can view the folder regardless of this option selection.
6 Click Save.
88
CHAPTER 10 Using SSL
Note: When you remove a certificate from the trusted authorities database, it is not deleted.
The certificate can still be accessed by selecting Server > SSL Certificates. You can delete
the certificate from the server there if desired.
6 Click Save.
89
Ipswitch WS_FTP Server User Guide
request, which creates a new certificate that can be sent back to the user. The user can then
use that certificate to make an SSL connection with the host.
90
CHAPTER 11
Using SSH
In This Chapter
What is SSH? ......................................................................................................... 91
How does SSH work?......................................................................................... 91
Understanding SSH terminology.................................................................. 92
Selecting methods of authentication ......................................................... 92
Selecting an SSH host key ............................................................................... 92
Selecting an SSH user key................................................................................ 93
Specifying MACs and ciphers......................................................................... 95
What is SSH?
SSH (Secure Shell) is a protocol for encrypting and securing various kinds of data transfers
over a network or the Internet. SSH works by opening a secure channel between the SSH
server and an authenticated user's computer, through which many kinds of data may be sent
or retrieved.
SSH can be understood as a large pipe: its purpose is to carry whatever is passed through it
from one place to another without letting anything leak in or out.
WS_SSH Server uses SFTP (SSH File Transfer Protocol) over SSH2 to transfer files.
Once the secure channel is negotiated and the user is authenticated, files can be transferred
through the secured SSH pipeline using SFTP.
91
Ipswitch WS_FTP Server User Guide
Note: If you choose to allow both authentication methods, user can authenticate using a
public key OR a password; both are not required.
SSH host keys are always used in SSH negotiations. An SSH host key is required regardless of
the SSH authentication method used.
92
CHAPTER 11 Using SSH
SSH user keys are only used when a listener uses public key authentication.
WS_FTP Server can create SSH user keys, or you can import keys created in another
application.
93
Ipswitch WS_FTP Server User Guide
If you do not have an SSH user key yet, WS_FTP Server can create one. For more information,
see Creating an SSH User Key (on page 94).
94
CHAPTER 11 Using SSH
Name. Enter a name for the key. This name is for your reference and is never displayed
to users.
Type (DSA by default). Select the type of key, DSA or RSA, that you want to generate.
Passphrase (optional). Enter a passphrase to encrypt the key.
Key size. Select the key size for the key. A higher key size creates a more secure key,
but takes longer to generate.
8 Click Save.
Note: If nothing appears in the list, all available MACs are already assigned to the SSH
listener.
3 Click Save.
To add a MAC to an SSH listener:
1 Click Add below the list of MACs. The Add MAC page opens.
2 Select the MAC you want to add.
Note: If nothing appears in the list, all available MACs are already assigned to the SSH
listener.
3 Click Save.
95
Ipswitch WS_FTP Server User Guide
96
CHAPTER 12
97
Ipswitch WS_FTP Server User Guide
To terminate a session:
1 From the top menu, select Server > Session Manager. The Session Manager page
opens.
2 Select the checkbox next to each session that you want to end.
3 Click End Session. The sessions are marked for termination. It may take up to fifteen
seconds for sessions marked for termination to actually terminate.
Connections
Current connections. This value represents the total number of connections to the
servers that are active when the page rendered.
Highest concurrent connections. This value represents the highest number of
concurrent connections recorded at one time.
Files
Sends in progress. This value represents the number of transfers from the server to
clients ("downloads" from the client perspective) that are in progress.
Receives in progress. This value represents the number of transfers from clients to
the server ("uploads" from the client perspective) that are in progress.
Files sent. This value represents the number of files sent from the server to clients.
Files received. This value represents the number of files sent from clients to the
server.
Files deleted. This value represents the number of files deleted from the server.
98
CHAPTER 13
Note: If your configuration includes a remote Ipswitch Notification Server or Ipswitch Log
Server, you must copy backup_registry.bat to the remote servers and execute it there.
For Ipswitch Notification Server, you must still back up the ips_notifications database using
INS_backup.bat on the server where the PostgreSQL database server is installed.
2 Run wsftp_backup.bat to export the WS_FTP Server configuration data, located in the
ws_ftp_server database, from the PostgreSQL database.
3 If your configuration includes an Ipswitch Notification Server, run ins_backup.bat to
export the Ipswitch Notification Server configuration data, located in the
ips_notifications database, from the PostgreSQL database.
4 Back up the files and folders located in the top folders of each host.
Warning: The scripts provided will not back up host folders and files. You must manually
back up the folders and files located under the host top folder.
Back up utilities
These utilities must be run from the command line interface. To open the command line
interface, from the Windows desktop, select Start > Run and enter cmd.exe.
99
Ipswitch WS_FTP Server User Guide
You can also schedule these scripts to run as a Windows scheduled task. For more
information, consult the help system for your operating system.
WSFTP_backup.bat
Exports a backup of the WS_FTP Server database (ws_ftp_server) from the PostgreSQL
database server to a file named WSFTP_<timestamp>.backup, with <timestamp> replaced
by the current date and time.
INS_backup.bat
Exports a backup of the Ipswitch Notification Server database (ips_notifications) from the
PostgreSQL database server to a file named INS_<timestamp>.backup, with <timestamp>
replaced by the current date and time.
backup_registry.bat
Exports the WS_FTP Server, Ipswitch Log Server and Ipswitch Notification Server registry
hives to files named IPS_Log_Server_<timestamp>.reg,
IPS_Notification_Server_<timestamp>.reg and WS_FTP_Server_<timestamp>.reg.
with <timestamp> replaced by the current date and time.
Usage backup_registry.bat
100
CHAPTER 13 Maintaining the Server
Note: You must run restore_backup.bat on the computer where PostgreSQL server is
installed even if you are restoring configuration for a remote Ipswitch Notification Server.
Restore utility
This utility must be run from the command line interface. To open the command line
interface, from the Windows desktop, select Start > Run and enter cmd.exe.
restore_backup.bat
Restores a backup of the WS_FTP Server or Ipswitch Notification Server database created with
WSFTP_backup.bat or INS_backup.bat.
Warning: Use of restore_backup.bat will overwrite all changes made to the database since
the backup file was created.
Note: restore_backup.bat does not restore the Windows registry keys. To do this, you must
manually merge each key by double-clicking on it in the Windows explorer.
Prior to running restore_backup.bat, you must stop the WS_FTP Server, SSH Server, and
Microsoft IIS services.
101
Ipswitch WS_FTP Server User Guide
To perform this routine maintenance, use the maintain_db.bat file located in the
C:\Program Files\Ipswitch\WS_FTP Server\Utilities\ folder.
Usage
maintain_db.bat username password
username. The admin user for the PostgreSQL database
password. The password for the admin user for the PostgreSQL database
102
APPENDIX A
Files are transferred between the client and server over a second connection, a full duplex
connection known as the data connection. This connection is between the client's data
transfer process and the server's data transfer process (or between two servers' data transfer
processes).
Both the client and the server have a protocol interpreter. The protocol interpreters receive
commands or replies, send commands or replies, and govern the data connection. The
server's protocol interpreter listens for a connection from a client's protocol interpreter.
In an active transfer, the FTP server's data transfer process initiates, or establishes, the data
connection to the FTP client, setting up the parameters for data transfer and storage.
In a passive transfer, the FTP server's data transfer process is placed in a passive state to listen
for, rather than initiate, a connection to the data port. In this case, the FTP client initiates the
data connection.
103
Ipswitch WS_FTP Server User Guide
FTP commands
The standard commands that an FTP client (such as WS_FTP Pro) issues to an FTP server are
listed here with a brief explanation that has been adapted from RFC 959. The command
syntax is presented using BNF (Backus-Naur Form) notation where applicable.
FTP commands may be in any order except that a rename from command must be followed
by a rename to command and the REST (restart) command must be followed by the
interrupted service command
ABOR (ABORT)
ABOR <CRLF>
This command tells the server to abort the previous FTP service command and any associated
transfer of data.
ACCT (ACCOUNT)
ACCT <SP> <account-information> <CRLF>
The argument field is a Telnet string identifying the user's account. The command is not
necessarily related to the USER command, as some sites may require an account for login and
others only for specific access, such as storing files.
ALLO (ALLOCATE)
ALLO <SP> <decimal-integer> [<SP> R <SP> <decimal-integer>] <CRLF>
This command is required by some servers to reserve sufficient storage to accommodate the
file to be transferred.
This command causes the server's data transfer process to accept the data transferred and to
store the data in a file at the server site. If the file specified in pathname exists at the server
site, then the data is appended to that file; otherwise the file specified in pathname is created
at the server site.
This command is a special case of CWD which allows the transfer of directory trees between
operating systems having different syntaxes for naming the parent directory.
104
Appendix A RFC 959 Highlights
This command allows the user to work with a different directory or dataset without altering
his login or account information.
DELE (DELETE)
DELE <SP> <pathname> <CRLF>
This command causes the file specified in pathname to be deleted at the server site.
FEAT
FEAT <CRLF>
This command causes the FTP server to list all new FTP features that the server supports
beyond those described in RFC 959. A typical example reply to the FEAT command might be
a multi-line reply of the form:
C> FEAT
S> SIZE
S> MDTM
S> TVFS
S> UTF8
HELP (HELP)
HELP [<SP> <string>] <CRLF>
This command causes the server to send a list of supported commands and other helpful
information.
LIST (LIST)
LIST [<SP> <pathname>] <CRLF>
105
Ipswitch WS_FTP Server User Guide
This command causes a list of file names and file details to be sent from the FTP site to
WS_FTP Pro.
This command can be used to determine when a file in the server NVFS was last modified.
This command causes the directory specified in pathname to be created as a directory (if
pathname is absolute) or as a subdirectory of the current working directory (if pathname is
relative).
MLSD
MLSD [<SP> <pathname>] <CRLF>
If WS_FTP Pro detects that the server is an MLSD server, this command is sent to the server
instead of the LIST command.
MLST
MLST [<SP> <pathname>] <CRLF>
This command causes the server to provide data about the single object named, whether a
file or directory.
The argument is a single Telnet character code specifying the data transfer mode. The
following codes are assigned for transfer modes: S - Stream, B - Block, C - Compressed. The
default transfer mode is Stream.
Note: This transfer modeis not equivalent to the transfer mode of the WS_FTP Pro user
interface. The transfer mode referred to in WS_FTP Pro and its documentation is handled by
the TYPE command.
This command causes a list of file names (with no other information) to be sent from the FTP
site to WS_FTP Pro.
106
Appendix A RFC 959 Highlights
NOOP (NOOP)
NOOP <CRLF>
This command does not affect any parameters or previously entered commands. It specifies
no action other than that the server send an OK reply.
OPTS (OPTIONS)
OPTS <SP> <parameter> <CRLF>
This command allows an FTP client to define a parameter that will be used by a subsequent
command.
PASS (PASSWORD)
PASS <SP> <password> <CRLF>
The argument field is a Telnet string specifying the user's password. This command must be
immediately preceded by the user name command, and, for some sites, completes the user's
identification for access control.
PASV (PASSIVE)
PASV <CRLF>
This command requests the server's data transfer process to "listen" on a data port (which is
not its default data port) and to wait for a connection rather than initiate one upon receipt of
a transfer command. The response to this command includes the host and port address this
server is listening on.
This specifies an alternate data port. There are defaults for both the client and server data
ports, and under normal circumstances this command and its reply are not needed.
This command causes the name of the current working directory to be returned in the reply.
QUIT (LOGOUT)
QUIT <CRLF>
This command terminates a USER and, if file transfer is not in progress, closes the control
connection. If file transfer is in progress, the connection will remain open for result response
and the server will then close it.
107
Ipswitch WS_FTP Server User Guide
QUOTE
QUOTE <string> <CRLF>
The QUOTE command lets you enter any standard FTP command. WS_FTP Pro sends it to the
FTP site, unedited; it is up to you to determine the command syntax depending on the FTP
site you are connected to.
REIN (REINITIALIZE)
REIN <CRLF>
This command terminates a USER, flushing all I/O and account information, except to allow
any transfer in progress to be completed. A USER command may be expected to follow.
REST (RESTART)
REST <SP> <marker> <CRLF>
The argument field represents the server marker at which file transfer is to be restarted. This
command does not cause file transfer but skips over the file to the specified data checkpoint.
This command shall be immediately followed by the appropriate FTP service command
which causes file transfer to resume.
RETR (RETRIEVE)
RETR <SP> <pathname> <CRLF>
This command causes the server to transfer a copy of the file specified in pathname to the
client. The status and contents of the file at the server site are unaffected.
This command causes the directory specified in pathname to be removed as a directory (if
pathname is absolute) or as a subdirectory of the current working directory (if pathname is
relative).
This command specifies the old pathname of the file which is to be renamed. This command
must be immediately followed by a "rename to" command specifying the new file pathname.
108
Appendix A RFC 959 Highlights
This allows you to enter a command that is specific to the current FTP site. WS_FTP Pro
prefixes your entry with the word SITE. WS_FTP Pro sends it to the FTP site, unedited; it is up
to you to determine the command syntax depending on the FTP site you are connected to.
SITE CPWD
SITE CPWD <SP> <string> <CRLF>
This is a special command you can enter using WS_FTP Pro when the FTP server is a WS_FTP
Server from Ipswitch. It changes the user's password.
This command is used to obtain the transfer size of a file from the server: that is, the exact
number of octets (8 bit bytes) which would be transmitted over the data connection should
that file be transmitted. This value will change depending on the current STRUcture, MODE
and TYPE of the data.
This command allows the user to mount a different file system data structure without altering
his login or accounting information.
STAT (STATUS)
STAT [<SP> <pathname>] <CRLF>
This command causes a status response to be sent over the control connection in the form of
a reply.
STOR (STORE)
STOR <SP> <pathname> <CRLF>
This command causes the FTP server to accept the data transferred via the data connection
and to store the data as a file at the FTP server. If the file specified in pathname exists at the
server site, then its contents shall be replaced by the data being transferred. A new file is
created at the FTP server if the file specified in pathname does not already exist.
109
Ipswitch WS_FTP Server User Guide
This command behaves like STOR except that the resultant file is to be created in the current
directory under a name unique to that directory. The "250 Transfer Started" response must
include the name generated.
The argument is a single Telnet character code specifying the file structure described in RFC
959. The following codes are assigned for structure: F - File (no record structure) R - Record
structure P - Page structure. The default structure is File.
SYST (SYSTEM)
SYST <CRLF>
This command is used to find out the operating system of the server.
The argument specifies the file type. The following codes are assigned:
E = EBCDIC (files being transferred between systems that use EBCDIC for
internal character representation)
The argument field is a Telnet string identifying the user. The user identification is that which
is required by the server for access to its file system.
110
Appendix A RFC 959 Highlights
FTP replies
In the protocol conversation between an FTP client (such as WS_FTP Pro) and an FTP server,
at least one server reply is sent to the FTP client in response to an FTP command. A reply
consists of a three-digit code, followed by one line of text, and terminated by the Telnet end-
of-line code.
214 Help message on how to use the server or the meaning of a particular non-standard
command. This reply is useful only to the human user.
226 Closing data connection. Requested file action successful (for example, file transfer or
file abort).
111
Ipswitch WS_FTP Server User Guide
421 Service not available, closing control connection. This may be a reply to any command if
the service knows it must shut down.
450 Requested file action not taken. File unavailable (e.g., file busy).
500 Syntax error, command unrecognized. This may include errors such as command line
too long.
112
Appendix A RFC 959 Highlights
550 Requested action not taken. File unavailable; e.g., file not found, no access.
552 Requested file action aborted. Exceeded storage allocation for current directory or
dataset.
113
Ipswitch WS_FTP Server User Guide
114
SITE ................................................................. 35, 37
115
adding users to ..................................................58 assigning ............................................................. 16
creating ................................................................57 sharing.................................................................. 16
deleting ................................................................58 listeners..........................................................................5
types.........................................................................5
H
local time.................................................................... 26
home folder ...............................................................50 login.........................................................................7, 46
host.......................................................................... 5, 27 failed .............................................................. 46, 68
configuring...................................................15, 16
connections ........................................................32 M
deleting ................................................................33
MACs..................................................................... 90, 93
enabling anonymous access.........................27
specifying priority............................................. 93
renaming .............................................................33
mask............................................................................. 69
host administrator...................................................26
specifying............................................................ 69
host administrators .................................................46
menu ..............................................................................8
host key................................................................90, 91 top ............................................................................8
creating ................................................................91
Message Authentication Code ........................... 90
selecting...............................................................90
messages............................................................. 30, 31
I banner ........................................................... 30, 31
exit .................................................................. 30, 31
IETF .............................................................................1, 2 variables............................................................... 31
iftpaddh ......................................................................33 welcome ....................................................... 30, 31
iftpaddu ......................................................................52 Microsoft Access ...................................................... 18
IMail Server ................................................................18 Microsoft Windows database.............................. 18
implicit SSL.............................................. 5, 41, 81, 83 N
integrity.......................................................................90
Internet Engineering Task Force.......................1, 2 network timeout...................................................... 32
IP address notifications ................................................ 68, 69, 70
controling access by ........................................27 triggering .............................................. 68, 69, 70
Ipswitch IMail Server...............................................18 O
Ipswitch WS_FTP Server .......................................... 1
ODBC database ........................................................ 18
K
P
key file..........................................................................84
passphrase................................................................. 84
keys.......................................................... 80, 90, 91, 92
private...................................................................80 password authentication...................................... 90
public ....................................................................80 passwords .................................................................. 46
SSH.........................................................................91 changing.............................................................. 46
host .................................................................91 permissions .......................................... 22, 37, 47, 62
creating .......................................................91 folder..................................................................... 62
SSH host ...............................................................90 SITE commands................................................. 37
selecting ........................................................90 Windows file....................................................... 22
SSH user ...............................................................92
port............................................................... 2, 5, 11, 39
creating..........................................................92
private keys ............................................................... 80
L protocol ..................................................................5, 89
SSH......................................................................... 89
left menu ...................................................................... 8
public keys................................................................. 80
limits......................................................................71, 72
bandwidth...........................................................72 Q
quota.....................................................................71
listener............................................................. 5, 16, 39 quota limit rules................................................ 67, 71
116
creating ................................................................71 certificate............................................................. 41
configuring ......................................................... 83
R disabling .............................................................. 86
implicit ................................................................. 41
remote management ............................................... 7
minimum cipher strength ............................. 87
requests for comments............................................ 1 requiring.............................................................. 86
RFC..............................................................................1, 2 selecting .............................................................. 83
root ...............................................................................22 SSL certificate ............................................. 41, 81, 87
RSA..................................................................90, 91, 92 SSL certificates..................................... 83, 84, 85, 87
rules.................................... 46, 67, 68, 69, 70, 71, 72 client ..................................................................... 87
bandwidth limit.................................................67 creating................................................................ 85
bandwidth limits ...............................................72 importing ............................................................ 84
failed login.............................................46, 67, 68 selecting .............................................................. 83
creating..........................................................68 signing.................................................................. 87
folder action..........................................67, 69, 70 SSL connection......................................................... 81
creating..........................................................70 establishing ........................................................ 81
quota limit ....................................................67, 71 SSL enabled........................................................ 81, 83
S system administrator ............................................. 26
system administrators ........................................... 46
secure channel............................................................ 3
Secure File Transfer Protocol ................................. 3 T
Secure Shell .......................................................... 3, 89 time .............................................................................. 26
Secure Sockets Layer ..............................................79 timeout ................................................................ 26, 32
security............................................ 37, 79, 81, 83, 87 top menu.......................................................................8
SITE Commands.................................................37
trusted authorities .................................................. 87
SSL..................................................... 79, 81, 83, 87
trusted authority...................................................... 87
server ............................................................................. 7
install....................................................................... 7 U
manage .................................................................. 7
network access..................................................... 7 upload ............................................................................1
server manager.......................................................7, 8 user database .................................................... 18, 22
connecting remotely ......................................... 7 configuring .................................................. 18, 22
session key .................................................................80 selecting .............................................................. 18
SFTP................................................................ 1, 3, 5, 89 user databases.......................................................... 43
internal................................................................. 43
sidebar menu .............................................................. 8
Ipswitch IMail ..................................................... 43
SITE commands .................................................35, 37 Microsoft Windows .......................................... 43
creating ................................................................35 ODBC..................................................................... 43
securing................................................................37
user groups......................................................... 57, 58
SSH.......................................1, 3, 5, 89, 90, 91, 92, 93 adding users to.................................................. 58
authenticating ...................................................90 creating................................................................ 57
cipher priority.....................................................93 deleting................................................................ 58
host key .........................................................90, 91
user key....................................................................... 90
creating..........................................................91
selecting ........................................................90 user keys..................................................................... 92
MAC priority........................................................93 creating................................................................ 92
user key .........................................................90, 92 importing ............................................................ 92
importing ......................................................92 user limit..................................................................... 26
user keys...............................................................92 user plug-in ............................................................... 18
creating..........................................................92
users
SSH protocol................................................................ 3
SSH2 ............................................................... 1, 3, 5, 89
SSL.............. 5, 29, 41, 79, 80, 81, 83, 84, 85, 86, 87
117
connections ........................................................32
creating ................................................................48
deleting ................................................................51
disabling...............................................................52
enabling ...............................................................30
limiting number per host ...............................26
renaming .............................................................51
V
vhost.............................................................................16
virtual folders
creating ................................................................60
displaying ............................................................61
limitations of.......................................................61
virtual host .................................................................16
W
Web browsers ............................................................. 7
welcome message...................................................30
WS_FTP.......................................................................... 1
Server ...................................................................... 1
118