Graphical Web and FTP Server Security Management Configuration

Source: Internet
Author: User
Tags ftp site

After the Web and FTP servers are created, appropriate management is required to ensure that user information is securely and effectively accessed by other visitors. The management of Web and FTP servers is basically the same, including some general management and security management. The following describes seven main aspects.

1. Enable expired content

To enable expired content, you can set it to prevent your site from being published. When the user's Web and FTP site information has a strong timeliness, it is necessary to set the expiration content, which not only helps to purify the user's Web and FTP sites, it is also helpful for visitors to find information. When expired content is enabled, you can directly set the entire site or a directory. The following describes how to set expired content.

Note: After the expired content is started, the Web browser compares the current date or time with the set expiration time or time during browsing to determine whether the original information or updated information is displayed.

1. Click the "HTTP header" tab, as shown in 1. On this tab, enable the "enable content invalidation" check box to activate the options in the "enable content invalidation" option area.


2. In the "enable content invalidation" option area, you can set the content expiration time. Select the "expire after this time" radio button, enter a value only in the text box after it, and select a time unit in the drop-down list box after it, for example, 2 0 and day, then, after 2 to 0 days, the visitor will no longer be able to access the current information of the site. Select the "expire at this time" radio button and select a date from the drop-down list box, and then adjust the value of the time fine-tuning tool. You can directly set the expiration time for the expired content, for example, the selected time is, January 1, February 3, the current information of the site will expire at on January 1, and cannot be accessed again. If you want to immediately expiration the current information of the site, select "expire now. Ii. content grading settings If the content of a user's site is not for all visitors, you need to perform content grading settings to prevent other visitors who do not have grading requirements from viewing the site content. With hierarchical service settings, you can insert descriptive labels in the HTTP header of each web page. When a visitor accesses a user's website, his Web browser can first check the hierarchical service requirements of the HTTP header of each Web page, determine which content can be browsed and which cannot be browsed Based on browser grading settings and site grading requirements.
By default, Windows 2000 uses the RSAC (Recreational Software Advisory councer) grading Service System for grading services. The Internet classification was studied by Dr. Donald F. Robert ts of Stanford University. It mainly sets levels for violence, sex, neighborhood, and language. Before you set the grading service content, you need to enter an RSAC grading questionnaire online to obtain some recommended content grading for better grading settings. The grading content setting process is as follows:
1. In the figure shown in 1, click the edit grading button to open the content grading dialog box, as shown in 2.
Figure 1 HTTP "HTTP header" tab

Figure 2 "content grading" dialog box 2. on the "Classification Service" tab, click the "details" button to view the Internet page of The RSAC classification service, and click the "Classification questionnaire" button to connect to the RSAC site, fill in the grading questionnaire. 3. After understanding the RSAC system, you can set the content of the classified service to filter the content of the company's web pages. Click the "grading" tab and select the "enable grading for this resource" check box on the "grading" tab, as shown in tab 3.


Figure 3 "classification" tab

4. in the "category" list box, select one of the four categories of violence, sex, nude, and language. The grading slider is displayed. Adjust the slider to change the grading level of the selected category.

5. If you want to grade your email, you can enter your email address in the "email name of the content grading personnel" text box. 6. If you want to set the expiration time for the grading service separately, click the lower triangle button in the "expired on" drop-down list box and select a date from the pop-up electronic calendar. 7. Click OK to return to the properties dialog box, and then click OK to save the settings. 3. Add a webpage footer In User Web site management, users often insert a script file written in HTML language before each Web page as the webpage footer to increase the content of the Web site. For example, a script file written in HTML adds some simple text and logo images to the Web page, and even includes the user's Web site management and service direction. These contents not only greatly increase the readability of the user's Web site, but also guide visitors to read the content of the user's Web site in the future. In addition, the webpage footer can reduce the execution time of the Web server. If your website is frequently accessed by other visitors, it is very useful to use the document footer. To add a webpage footer, follow these steps: 1. Create an HTML webpage footer file and save it on the hard disk of your Web server. 2. in the console directory tree of Internet Service Manager (4), right-click a Web site or directory sub-node, for example, MSADC virtual directory. From the shortcut menu that appears, select the "properties" command, open the "MSADC properties" dialog box, and click the "documents" tab, as shown in 4.


Figure 4 "document" tab

3. On the document tab, select the Enable Document Footer check box. In the Enable Document Footer text box, enter the full path of the footer file. If you do not know the complete path of the footer file, Click Browse to open the open dialog box and select.

4. Click OK to return to the properties dialog box and click OK to save the settings.

The comment document footer file is not a complete HTML document. It only contains the HTML Tag Information and describes how to display the footer content. For example, if you add the name of the user's organization before each web page through a footer file, the footer file should contain the text content and the font and color of the formatted text.

Iv. Security and permission settings

Security and permission settings are the most important protection measures for IIS to ensure the security of its website. They can be used to control how to verify the identity of users and their access permissions. In the process of permission security and restriction settings, the administrator can not only set the inheritance relationship between permissions and site security, but also select the settings to be applied, including authentication method, access permission, IP address restriction, and other settings. The permission and security settings are as follows:

1. Select "all tasks"> "permission wizard" to open the "permission wizard" dialog box. Click "Next" to open the "Security Settings" dialog box, as shown in Figure 5.


Figure 5 "permission wizard" dialog box

2. if you want to inherit security settings from the parent site or virtual directory, select the "inherit all Security Settings" radio button. If you want to select new security settings, select "select new security settings from the template.

3. Click "Next" to open the "Windows directory and file permissions" dialog box, as shown in 6.


Figure 6 "Windows directory and File Permission" dialog box 4. if you want to retain Windows directory and file permissions, select the "keep directory and file permissions" button. If you want to retain the original Windows directory and file permissions and add the new permissions, select the "keep the current directory and file license configuration intact, and add the recommended permission" button. Select the "recommended: replace all directories and File Access Permissions" option, and replace the original directory and file permissions with the new permissions.

5. click "Next" to open the "Security summary" dialog box 7, and select the settings to be applied in the settings list box, including the authentication method, access permission, IP address restriction, and File ACL cannot be modified.



Figure 7 "Security summary" dialog box

6. Click "Next" to open the "you have successfully completed IIS 5.0 'permission wizard '" dialog box, and then click "finish" to complete the settings.

V. Security Authentication

In Windows 2000, Internet Information Service provides three logon authentication methods for HTTP access. They are anonymous, plaintext, and query/response. This method depends on the purpose of creating an Internet Information Server. If you create a website to advertise, you can select an anonymous method. Because most of the visitors visit the user's site for the first time, it is impossible for the user to create an account for them. If you want

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.