Вы находитесь на странице: 1из 57

Internet Information Server

Module

Implementing FTP Service


jingyu November 1998
4 1-1
Internet Information Server

Implementing FTP Service


•Objective
—describe the various features of the FTP
service
—explain the function of the property sheets
associated with FTP service
—demonstrate how to configure the service
—establish a FTP service using the ISM snap-in
—configure the service property sheet

jingyu November 1998 1-2


Internet Information Server

Overview
• The FTP Service
• Virtual Servers and Directories
• Types of FTP Property Sheets
• Configuring the FTP Service

jingyu November 1998 1-3


Internet Information Server
The FTP Service
Client
Client Internet
Internet Site
Site

Application
ApplicationLayer
Layer Application Layer
Cache Application Layer
Cache
HTTP FTP Gopher File
HTTP FTP
System
Windows Sockets
Windows Sockets

TCP UDP Transport Layer TCP UDP Transport Layer

IP Internet Layer IP Internet Layer

Network
NetworkInterface
Interface Network
NetworkInterface
Interface
jingyu November 1998 1-4
Internet Information Server
Virtual Servers and Directories
e e

ftp.karl.com
e

ftp.yukiko.com
e

ftp.maria.com

Virtual Servers Virtual Directories


jingyu November 1998 1-5
Internet Information Server

Configuring the FTP Service


• FTP Site
• Security Accounts
• Messages
• Home Directory
• Directory Security

jingyu November 1998 1-6


Internet Information Server

Create an FTP Site

jingyu November 1998 1-7


Internet Information Server

FTP Site

jingyu November 1998 1-8


Internet Information Server

FTP Site

Disconnect a current session

jingyu November 1998 1-9


Internet Information Server

Security Accounts

jingyu November 1998 1 - 10


Internet Information Server

Allow only anonymous connections

FTP Site permit only anonymous users,


but it can prevent users try to connect the
site use their own account and password.

jingyu November 1998 1 - 11


Internet Information Server

Messages

jingyu November 1998 1 - 12


Internet Information Server

Home Directory

jingyu November 1998 1 - 13


Internet Information Server
Home Directory
•Configure List format
-UNIX
150 Opening ASCII mode data connection for /bin/ls
dr-xr-xr-x 1 owner group 0 Feb 26 11:45 ftptest
-r-xr-xr-x 1owner group 4500693 Oct 15 20:45 iis.log
226 Transfer complete

-MS-DOS
150 Opening ASCII mode data connection for /bin/ls
02-26-99 11:45am <DIR> ftptest
11-15-99 8:45pm 4500693 iis.log
226 Transfer complete

jingyu November 1998 1 - 14


Internet Information Server

Directory Security

jingyu November 1998 1 - 15


Internet Information Server

Create Virtual Directory

•Create Virtual Directory


•List Virtual Directory in
Directory List

jingyu November 1998 1 - 16


Internet Information Server

Make Annotate on Directory


HKEY_LOCAL_MACHINE

System

CurrentControlSet

Services

MSFTPSVC

Parameters

jingyu November 1998 1 - 17


Internet Information Server

Make Annotate on Directory


•Create AnnotateDirectories TYPE = DWOR
D
•Set AnnotateDirectories=1
•net stop MSFTPSVC
•net start MSFTPSVC
•In Explore ,create a file name ~ftpsvc~.ckm

jingyu November 1998 1 - 18


Internet Information Server

Lab 4: Configuring the FTP Service

jingyu November 1998 1 - 19


Internet Information Server

Useful Resource

P121

jingyu November 1998 1 - 20


Internet Information Server

Review
• The FTP Service
• Virtual Servers and Directories
• Types of FTP Property Sheets
• Configuring the FTP Service

jingyu November 1998 1 - 21


Internet Information Server

Examples
• You setup a FTP site and setup a virtual directory
and set the list to UNIX .afterwards not all users
can access it why?
Assign NTFS rights
Set listing style to MS-DOS

jingyu November 1998 1 - 22


Internet Information Server

examples

jingyu November 1998 1 - 23


Internet Information Server

Module 4

The End

jingyu November 1998 1 - 24


Internet Information Server

Module

Implementing Security Features


jingyu November 1998
5 1 - 25
Internet Information Server
•Implementing Security Features

•Objective
—provide an overview of the security
features of IIS
—demonstrate the various Internet-
related security features
—determine the best security
configuration for a specify Web server
jingyu November 1998 1 - 26
Internet Information Server

Security Features in IIS

•User Authentication
•IP or Domain name restriction
•NTFS
•SSL

jingyu November 1998 1 - 27


Internet Information Server

Three Authentication Methods

•Anonymous
•basic
•NT Challenge/response

jingyu November 1998 1 - 28


Internet Information Server

Anonymous Access

Users do not supply a username and pas


sword to access unprotected resources. Inst
ead, IIS uses a special guest account (IUS
R_<Computername>) as the logon account
and uses this account to open resources for
the connected user.

jingyu November 1998 1 - 29


Internet Information Server

Basic

Browsers will prompt the user for a name


and password during the authentication
process. The user account and password are
sent unencrypted from the Web browser to
the server.

jingyu November 1998 1 - 30


Internet Information Server

NT Challenge/response

NT challenge/response does not


transmit an actual passwords across the
network.Instead,the server engages in a
cryptographic exchange with the Web
browser to prove the correctness of the
supplied password.
NT Challenge/response takes precedence
over Basic authentication.

jingyu November 1998 1 - 31


Internet Information Server
Anonymous Access and Authentication Control
 Anonymous Access has user-applied restrictions

 Authentication Control denies access and then queries


the user for authentication

Name:
Password:

Name:
Xxxx
Password:
xxxxxxxx

jingyu November 1998 1 - 32


Internet Information Server

Authentication Methods

jingyu November 1998 1 - 33


Internet Information Server

Web Server Permissions for Files and Directories

jingyu November 1998 1 - 34


Internet Information Server
NTFS Permissions
Five standard types of permissions:
 Full Control
 No Access
 Read Only
 Change
 Special Access

jingyu November 1998 1 - 35


Internet Information Server
IP Access and Domain Name Restrictions

jingyu November 1998 1 - 36


Internet Information Server

IP Access and Domain Name restrictions


子网地址的最后数字 范围内的地址数
128 ( 10000000 ) 128
192 ( 11000000 ) 64
224 ( 11100000 ) 32
240 ( 11110000 ) 16
248 ( 11111000 ) 8
252 ( 11111100 ) 4
254 ( 11111110 ) 2
255 ( 11111111 ) 1 (不用)

jingyu November 1998 1 - 37


Internet Information Server

Securing Communication with IIS

• How Encryption Works


• Public Key Cryptography
• Digital Certificates
• How SSL Works
• Using SSL with IIS

jingyu November 1998 1 - 38


Internet Information Server
How Encryption Works

Message Message

Private Key Public Key


to Encrypt to Decrypt

jingyu November 1998 1 - 39


Internet Information Server

Symmetry Cryptography
Alice Bob

Crypt Data
“Hello Bob” “Hello Bob”
Encrypt Decrypt

jingyu November 1998 1 - 40


Internet Information Server
Public Key Cryptography
Digital Sign
ature

Sender uses Recipient


Own Private Send uses Sender’s
Key Public Key

Sender Recipient

Send
Digital Sender uses Recipient
Envelope Recipient’s uses Own
Public Key Private Key
jingyu November 1998 1 - 41
Internet Information Server
Digital Certificates
Certificate contains
the recipient’s
identification and
public key

Signed with CA
Private Key which
I.D.
validates this
certificate

jingyu November 1998 1 - 42


Internet Information Server

SSL

SERVICE
SMTP HTTP Telenet FTP NNTP
Secure Sockets layer

TCP/IP

jingyu November 1998 1 - 43


Internet Information Server
How SSL Works
1

3
Browser 40 bit or 128 bit? Web Server
e

4 5

6
jingyu November 1998 1 - 44
Internet Information Server

Lab 6: Restricting Access to a Web Site

jingyu November 1998 1 - 45


Internet Information Server

Review
• Windows NT Server Security
Recommendations
• Security Requirements for Internet
Servers
• Access Control with IIS
• Securing Communication with IIS

jingyu November 1998 1 - 46


Internet Information Server

Useful Resource

P191

jingyu November 1998 1 - 47


Internet Information Server

Examples
• How can you maximize the performance if
you using SSL
Add more RAM
Increase CPU
Fast HD
Use SSL Certificate

jingyu November 1998 1 - 48


Internet Information Server

examples
• You want to get the most performance out
of your IIS Server .what is the best way to
secure sensitive directories?
Enable SSL only when required
Enable SSL all the time
Use the client certificate
Move SSL directories to a separate PC

jingyu November 1998 1 - 49


Internet Information Server

Examples
• If you secure the access to a web page using
SSLhow must you change the URL in order
to access the secured page?
http://
httpssl://
https://

jingyu November 1998 1 - 50


Internet Information Server

Examples
• Colton needs to limit the access to this web site to only those hosts
on his intranet. All the hosts on his intranet have IP addresses
between 200.1.1.0 and 200.1.1.63. Using IP and Domain Name
Restrictions,Colton selects Group and enters the first IP address
in the IP field.what must he enter in the Subnet Mast field.
• 255.255.255.0
• 255.255.255.128
• 255.255.255.192
• 255.255.255.224
• 255.255.255.240

jingyu November 1998 1 - 51


Internet Information Server
•Examples
• Zachary wants to create a web site to which the public is not
allowed access.Instead,only the internal hosts that fall within a
specified IP address range can get to it .he sets the IP and
Domain Restriction specifications to an IP address of 192.2.2.0
and the subnet Mask to255.255.255.240.which host address
can access Zachary’s site?
• 192.2.2.0 through 192.2.2.3
• 192.2.2.0 through 192.2.2.7
• 192.2.2.0 through 192.2.2.15
• 192.2.2.0 through 192.2.2.31
• 192.2.2.0 through 192.2.2.61

jingyu November 1998 1 - 52


Internet Information Server

examples
• Susan logs onto a sensitive web and it is set up
to use Basic Authentication.what is Encrypted?
Password and data
Password is encrypted,data is not
Data is encrypted,Password isn’t
Neither password nor data

jingyu November 1998 1 - 53


Internet Information Server

examples
• Susan logs onto a sensitive web and it is set up
to use Basic Authentication.what is Encrypted?
Password and data
Password is encrypted,data is not
Data is encrypted,Password isn’t
Neither password nor data

jingyu November 1998 1 - 54


Internet Information Server

examples
• You set up a web site on your intranet .clients use different
browsers.when some clients try to access pages they receive
an error message like”Error 401.2,browser does not support
required encrypted method…”
 Browser does not support SSL
 Site server using NT Challenge/Reponse authentication
method

jingyu November 1998 1 - 55


Internet Information Server

examples
• One client can’t reach web site but another can with
web browser?
• Install capable browser
• Two sets of users access your site ,some intranet and
some internet .the external use browsers that cannot
access NT Challenge/response,how do you set up your
site for access both?
• Basic authentication

jingyu November 1998 1 - 56


Internet Information Server

Module 5

The End

jingyu November 1998 1 - 57

Вам также может понравиться