Install and configure the FTP server in Centos 5.6. check whether the FTP server has been installed: rpm-qa | grep vsftpd2. check that the FTP server version that can be installed is yum search vsftpd3. install FTP server: yum install vsftpd. i3864. view the FTP server status: service vsftpd status5. start the FTP server: service vsftpd start6. view and explain vsftpd. conf configuration file: www.2cto.com # anonymous user anonymous log on to anonymous_enable = YES # allow local users to log on to local_enable = YES # Grant logon users the write permission (upload and delete) write_enable = YES # default umasklocal_umask = 022 www.2cto.com # Save the transfer record log to/var/log/vsf Tpd. logxferlog_enable = YESxferlog_file =/var/log/vsftpd. logxferlog_std_format = NO # Allow upload in ASCII mode = YES # Allow download in ASCII mode ascii_download_enable = YES # use port 20 to transmit data connect_from_port_20 = YES # Welcome Message ftpd_banner = Welcome to use my ftp test server. # The next three configurations are very important # If chroot_local_user sets YES, all users will be restricted to their home directory by default by chroot, you cannot change the directory # chroot_list_enable to set YES to make the chroot user list valid. #★Super important: If YES is set for chroot_local_user, the files set for chroot_list_file are not chroot users (you can change the directory up )#★Super important: If NO is set for chroot_local_user, the file set for chroot_list_file is the user of chroot (the directory cannot be changed up) chroot_local_user = YESchroot_list_enable = YESchroot_list_file =/etc/vsftpd/chroot_list # Run listen = YES # PAM Authentication Service name on ipv4 in standalone mode. The default value is vsftpd, you have created this pam file when installing vsftpd, # in/etc/pam. d/vsftpd. According to the settings in this pam file, users in the/etc/vsftpd/ftpusers # file are prohibited from logging on to the ftp server, such as sensitive users such as root, therefore, you can also append a user to/etc/vsftpd/ftpusers to prevent other users from logging on. Www.2cto.com pam_service_name = vsftpd # userlist_enable = YES. The user access control list is valid. The file is/etc/vsftpd/user_list # userlist_deny = YES, users in/etc/vsftpd/user_list cannot log on. # userlist_deny = NO. Only users in/etc/vsftpd/user_list can log on #★Important: no matter how it is set here, it only further limits users, but overwrites the effect of/etc/vsftpd/ftpusers # above. For example, if the/etc/vsftpd/ftpusers has a root user, even if you set # userlist_deny = NO and/etc/vsftpd/user_list has a root user, the root user cannot log on! Userlist_enable = YESuserlist_deny = YES #/etc/hosts is allowed. allow and/etc/hosts. deny file to restrict ftp access control tcp_wrappers = YES # PASV mode configuration pasv_enable = YES # PASV mode connection minimum port pasv_min_port = 60000 # PASV mode connection maximum Port pasvanderbilt max_port = 60500