Win10 how to build FTP server to realize fast file transfer

Server is a high-performance computer. As a node of the network, it stores and processes 80% of the data and information on the network. Therefore, it is also known as the soul of the network. So how does win10 build an FTP server to realize fast file transfer. Now let's explain the detailed operation method of win10 building FTP server.

How does win10 build an FTP server to realize fast file transfer?

1. First, we search the control panel in Cortana and enter;

2. In the control panel - program, click to enable or disable the windows function;

3. Tick in front of FTP server, web management tool and web core that Internet information services can host, click OK and wait for installation;

4. After installation, search Cortana for computer management and enter;

5. Find the service and application - Internet information services (IIS) manager on the left and click to enter. You can see your computer name in the connection column (desktop-leu8v22 here). Click the expansion button on the left of the computer name, right-click the website and select Add FTP site;

6. At this time, you will enter the FTP site addition wizard. First, the wizard will ask you to fill in the FTP site name and set the FTP content directory. You can fill in the FTP site name as you like. I fill in the FTP server here. You can also choose any folder you like. I choose C: \ inetpub \ ftproot;

7. Fill in the FTP site name, set the FTP content directory, click the OK button, and then click next;

8. After clicking next, don't rush to continue. Let's check the IP address of the computer, search the command prompt in Cortana and enter;

9. Enter the command ipconfig and press enter. You will see the IP address of your computer. My IP address here is 192.168.1.251. Remember this string of numbers and use it next.

10. We return to the FTP site add wizard to set binding and SSL. Enter the IP address just found in the IP address column, and the port remains unchanged at 21. You don't need to check the item of enabling virtual host name. You can check the item of automatically starting FTP site, and you can select no SSL for SSL. Click next after the operation is completed;

11. Next, the FTP site addition wizard will ask you to fill in the authentication and authorization information, check the check boxes before the anonymous and basic items under authentication, set the access allowed items to all users, check the check boxes before the read and write permissions, and click finish.

12. At this time, we can see that the FTP site has been created successfully and is running normally.

13. However, this is not over yet. We need to allow the FTP server to pass through the firewall. Search the firewall in Xiaona, click to enter and allow the application to pass through the windows firewall;

14. Check the check box in front of the FTP server in the list, and click OK to complete the setting;

15. At this time, you can test your FTP server. Find Internet Explorer in the start Windows attachment and click to enter;

16. Enter FTP: / / [IP address of your computer] in the address bar (here I am) ftp://192.168.234.136 ), enter to access. If you see the list of files and folders in the browser, Congratulations, your FTP server has been built successfully.

17. Of course, you can also enter the address of your FTP server in the file resource manager. The effect is like this,

18. Test the transmission speed. It's OK. It's much faster than the 4m small water pipe in my residence.

19. Some students may ask that there are some contents in my FTP content directory that they don't want others to see. How can I prevent others in the LAN who know my IP address from seeing the files in my FTP content directory? It's very simple. Let's set the FTP permission rules. First, search Cortana for computer management and enter;

20. Expand the local users and groups on the left side of the window, click users, you will see the user list on the right side of the window, right-click the blank space, click new user, and the new user creation window will pop up;

21. The user name and full name can be filled in as you like, and the password can be set as you like. Deselect the check box before the user must change the password when logging in next time, and check the check box before the user cannot change the password and the password will never expire. After the operation is completed, click create, and the user is created. I need to assign two users access rights to the FTP server, so I created two new accounts, ftpuser1 and ftpuser2.

22. After the new user is created, we return to the computer management - Internet information services (IIS) manager to manage our FTP site, click [computer name] - Website - [FTP server you just built] (ThinkCentre website FTP server here), double-click the FTP authorization rule icon on the right to enter the FTP authorization rule setting window. You can see that the read-write permission is set to all users at this time;

23. We delete this item and click Add permission rule in the operation bar on the right;

24. You will see the window of adding permission authorization rules. We select the user who is allowed to access this content as the specified user, then fill in the user name of the new user you just created, check the check box before reading and writing permission, and click OK to add after the operation is completed. I added two users who are allowed to access the FTP content directory, namely ftpuser1 and ftpuser2;

Supplement: server introduction

Servers, also known as servers, are devices that provide computing services. Since the server needs to respond to service requests and process them, generally speaking, the server should have the ability to undertake services and ensure services.

The composition of the server includes processor, hard disk, memory, system bus, etc., which is similar to the general computer architecture. However, due to the need to provide highly reliable services, it requires high processing capacity, stability, reliability, security, scalability, manageability and so on.

In the network environment, according to the different types of services provided by the server, it is divided into file server, database server, application server, web server, etc.

Related reading: what are the server FAQs

  1. System blue screen, frequent crash, restart, slow response

The of the server is very similar to our ordinary computer, whether it is hardware structure or running system. Therefore, just like our computers, they may be infected with viruses, crash, blue screen, restart and other failures due to system vulnerabilities, software conflicts and hardware failures, and slow response due to too much garbage cache information.

  2. The remote desktop connection exceeds the maximum number of connections

Since the server allows 2 connections by default, if you forget to log off after logging in and directly close the remote desktop, the server recognizes that the login is still on the server side. In this case, the most common is to restart the server. However, if it is the peak period, the loss caused by restarting the server is obvious. At this time, you can use the mstsc / console command to forcibly log in. Open the "run" box and type "mstsc / V: xxx.xxx.xxx.xxx (server IP) / console" to forcibly log in to the remote desktop.

  3. How to clean up files that cannot be deleted

In this case, it may be that the file is still running. You can restart and delete it, or run CMD, enter the name of the folder arrtib-a-s-h-r you want to delete, and finally enter the name of the folder del wants to delete. It cannot be recovered after running this command. Please use it with caution.

  4. Hidden trouble of system port

For the server, the first thing is to ensure stability and security. Therefore, we only need to ensure the most basic functions of the server, just like the sound card is prohibited by default. We don't need too many functions and port support. For example, some unnecessary and high-risk ports can be blocked. For some necessary and risky ports, such as ports 3389 and 80, we can set them as non-special secret ports by modifying the registry, so that the security hidden dangers of server ports no longer exist.