| Symbols & Numeric |
| "530 user access denied" |
| remote database configuration |
| A |
| access control |
| access restrictions |
| administration |
| remote |
| administrator |
| Alias |
| creating |
| anonymous |
| anonymous connections |
| anonymous user |
| AUTH SSL |
| authentication |
| Configuring an external user database |
| Selecting methods of authentication |
| SSH |
| multi-factor |
| password |
| public key |
| B |
| bandwidth limits |
| About bandwidth limits |
| Rules overview |
| banner message |
| C |
| certificate |
| certificate file |
| certificate signing request |
| Signing SSL certificates |
| Understanding SSL terminology |
| certificates |
| adding to trusted authorities database |
| Common SSL configurations |
| Creating an SSL certificate |
| Importing an SSL certificate |
| Requesting client certificates |
| signing |
| Signing SSL certificates |
| SSL |
| Common SSL configurations |
| creating |
| Creating an SSL certificate |
| importing |
| Importing an SSL certificate |
| ciphers |
| Specifying MACs, ciphers, and algorithms |
| specifying priority |
| Understanding SSH terminology |
| client |
| client certificates |
| Common SSL configurations |
| Requesting client certificates |
| CNAME |
| command |
| command channel |
| command line |
| managing hosts from |
| Managing hosts from the command line |
| managing users from |
| Managing users from the command line |
| command line utility |
| Managing hosts from the command line |
| Managing users from the command line |
| commands |
| Creating a SITE command |
| Securing SITE commands |
| SITE |
| creating |
| Creating a SITE command |
| securing |
| Securing SITE commands |
| context menu |
| control channel |
| CSR |
| Signing SSL certificates |
| Understanding SSL terminology |
| D |
| database |
| configuring |
| PostgreSQL database |
| remote MS SQL database |
| dbconfig.exe |
| DNS |
| domain |
| domain controller |
| domain name server |
| DSA |
| Creating an SSH host key |
| Creating SSH user keys |
| Selecting an SSH host key |
| Understanding SSH terminology |
| E |
| encryption |
| minimum SSL |
| Selecting an SSL certificate |
| Signing SSL certificates |
| SSL |
| Selecting an SSL certificate |
| What is SSL? |
| What is SSL? |
| events |
| logging |
| exit message |
| Explicit SSL |
| external database |
| F |
| failed login limit |
| Creating failed login rules |
| resetting |
| Resetting a user's failed login count |
| failed login rules |
| About failed login rules |
| creating |
| Creating failed login rules |
| Rules overview |
| firewalls |
| folder action rules |
| About folder action rules |
| creating |
| Creating folder action rules |
| Rules overview |
| folders |
| home |
| managing |
| Managing folder permissions |
| Managing folders |
| Managing folder permissions |
| Managing folders |
| permissions |
| Requiring SSL for specific folders |
| requiring SSL to access |
| Setting users' home folders |
| users |
| virtual |
| creating |
| Creating, editing, and deleting virtual folders |
| Understanding limitations of virtual folders |
| force SSL |
| FTP |
| How FTP works |
| Understanding the server architecture |
| FTP server |
| G |
| GMT |
| Greenwich Mean Time |
| groups |
| adding users to |
| Adding users to user groups |
| creating |
| Creating user groups |
| deleting |
| Deleting user groups |
| H |
| home folder |
| host |
| configuring |
| About hosts |
| Choosing host configuration |
| connections |
| deleting |
| Enabling anonymous access |
| renaming |
| Understanding the server architecture |
| host administrator |
| host administrators |
| host key |
| creating |
| Creating an SSH host key |
| selecting |
| Selecting an SSH host key |
| Understanding SSH terminology |
| I |
| IETF |
| iftpaddh |
| iftpaddu |
| implicit SSL |
| Choosing a type of SSL |
| Common SSL configurations |
| Configuring listeners for SSL |
| Understanding the server architecture |
| integrity |
| Internet Engineering Task Force |
| IP address |
| controling access by |
| K |
| key file |
| keys |
| Creating an SSH host key |
| Creating SSH user keys |
| private |
| public |
| Selecting an SSH host key |
| SSH |
| host |
| creating |
| SSH host |
| selecting |
| SSH user |
| creating |
| Understanding SSL terminology |
| L |
| left menu |
| limits |
| About bandwidth limits |
| About quota limit rules |
| bandwidth |
| Creating quota limit rules |
| quota |
| About quota limit rules |
| Creating quota limit rules |
| listener |
| About listeners |
| assigning |
| Choosing host configuration |
| sharing |
| Understanding the server architecture |
| listeners |
| types |
| local time |
| log |
| About the log |
| clustering |
| Configuring log settings |
| Logging multiple servers to one log server |
| viewing |
| Viewing the log |
| login |
| failed |
| About failed login rules |
| Creating failed login rules |
| Resetting a user's failed login count |
| Resetting a user's failed login count |
| Using WS_FTP Server Manager |
| M |
| MACs |
| Specifying MACs, ciphers, and algorithms |
| specifying priority |
| Understanding SSH terminology |
| maintenance |
| backup |
| cluster backup |
| cluster restore |
| data store |
| restore |
| mask |
| specifying |
| menu |
| top |
| Message Authentication Code |
| messages |
| banner |
| Using banner, welcome and exit messages |
| Using message variables |
| exit |
| Using banner, welcome and exit messages |
| Using message variables |
| Using banner, welcome and exit messages |
| Using message variables |
| variables |
| welcome |
| Using banner, welcome and exit messages |
| Using message variables |
| Microsoft Access |
| Microsoft Windows database |
| multi-factor authentication |
| N |
| network timeout |
| notifications |
| About folder action rules |
| Creating failed login rules |
| Creating folder action rules |
| triggering |
| About folder action rules |
| Creating failed login rules |
| Creating folder action rules |
| O |
| ODBC database |
| P |
| passphrase |
| password authentication |
| passwords |
| changing |
| permissions |
| folder |
| Managing folder permissions |
| Securing SITE commands |
| SITE commands |
| Understanding administrator privileges |
| Using Windows file permissions |
| Windows file |
| port |
| About listeners |
| How FTP works |
| Setting global options |
| Understanding the server architecture |
| private keys |
| protocol |
| SSH |
| Understanding the server architecture |
| What is SSH? |
| public keys |
| Q |
| quota limit rules |
| About quota limit rules |
| creating |
| Creating quota limit rules |
| Rules overview |
| R |
| remote management |
| RFC |
| root |
| RSA |
| Creating an SSH host key |
| Creating SSH user keys |
| Selecting an SSH host key |
| Understanding SSH terminology |
| rules |
| About bandwidth limits |
| About failed login rules |
| About folder action rules |
| About quota limit rules |
| bandwidth limit |
| bandwidth limits |
| Creating failed login rules |
| Creating folder action rules |
| Creating quota limit rules |
| failed login |
| About failed login rules |
| creating |
| Creating failed login rules |
| Resetting a user's failed login count |
| Rules overview |
| folder action |
| About folder action rules |
| creating |
| Creating folder action rules |
| Rules overview |
| quota limit |
| About quota limit rules |
| Creating quota limit rules |
| Rules overview |
| Resetting a user's failed login count |
| Rules overview |
| S |
| Secure Shell |
| Secure Sockets Layer |
| security |
| Choosing a type of SSL |
| Requesting client certificates |
| Securing SITE commands |
| Selecting an SSL certificate |
| Signing SSL certificates |
| SITE Commands |
| SSL |
| Choosing a type of SSL |
| Requesting client certificates |
| Selecting an SSL certificate |
| Signing SSL certificates |
| What is SSL? |
| What is SSL? |
| server |
| install |
| manage |
| network access |
| Server Manager |
| accessing |
| connecting remotely |
| navigating |
| Quick Tour: WS_FTP Server Manager |
| Using WS_FTP Server Manager |
| session key |
| SFTP |
| Understanding the server architecture |
| What is SSH? |
| sidebar menu |
| SITE commands |
| creating |
| Creating a SITE command |
| securing |
| Securing SITE commands |
| SSH |
| authenticating |
| cipher priority |
| Creating an SSH host key |
| Creating SSH user keys |
| host key |
| creating |
| Creating an SSH host key |
| selecting |
| Selecting an SSH host key |
| Understanding SSH terminology |
| Importing SSH user keys |
| MAC priority |
| Selecting an SSH host key |
| Selecting methods of authentication |
| Specifying MACs, ciphers, and algorithms |
| Understanding SSH terminology |
| Understanding the server architecture |
| user key |
| creating |
| importing |
| Importing SSH user keys |
| Understanding SSH terminology |
| user keys |
| creating |
| What is SSH? |
| SSH2 |
| Understanding the server architecture |
| What is SSH? |
| SSL |
| certificate |
| Choosing a type of SSL |
| configuring |
| Configuring listeners for SSL |
| Creating an SSL certificate |
| disabling |
| Disabling SSL |
| implicit |
| Importing an SSL certificate |
| minimum cipher strength |
| Requesting client certificates |
| requiring |
| Requiring SSL for specific folders |
| selecting |
| Selecting an SSL certificate |
| Signing SSL certificates |
| Understanding SSL terminology |
| Understanding the server architecture |
| Using firewalls with WS_FTP Server |
| What is SSL? |
| SSL certificate |
| Choosing a type of SSL |
| Configuring listeners for SSL |
| Requesting client certificates |
| SSL certificates |
| client |
| creating |
| Creating an SSL certificate |
| importing |
| Importing an SSL certificate |
| selecting |
| Selecting an SSL certificate |
| signing |
| Signing SSL certificates |
| SSL connection |
| establishing |
| SSL enabled |
| Choosing a type of SSL |
| Common SSL configurations |
| system administrator |
| system administrators |
| T |
| time |
| timeout |
| Setting maximum number of connections |
| Setting timeouts for connections |
| top menu |
| trusted authorities |
| trusted authority |