Plesk 9.5 Domain Administrators Guide
Plesk 9.5 Domain Administrators Guide
Revision 1.1
Copyright Notice
ISBN: N/A Parallels 660 SW 39th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444
Distribution of this work or derivative of this work in any form is prohibited unless prior written permission is obtained from the copyright holder. Patented technology protected by U.S.Patents 7,328,225; 7,325,017; 7,293,033; 7,099,948; 7,076,633. Patents pending in the U.S. Product and service names mentioned herein are the trademarks of their respective owners.
Contents
Preface 7
Getting Started
Logging In to Parallels Plesk Panel ............................................................................................... 9 Becoming Familiar with Parallels Plesk Panel ............................................................................ 10 Changing Your Contact Information and Password .................................................................... 13
14
Creating a Global Account .......................................................................................................... 14 Connecting Local Accounts To Your Global Account ................................................................. 15 Switching Between Accounts ...................................................................................................... 16 Changing Global Account Password ........................................................................................... 16 Disconnecting Local Accounts From Global Account ................................................................. 17
18
Customizing Your Home Page .................................................................................................... 19 Setting Interface Language and Skin for Your Control Panel ..................................................... 20 Adding and Removing Hyperlink Buttons.................................................................................... 21
22
Viewing the Resource Allotments for Your Account.................................................................... 25 Viewing the Permissions for Operations You Can Perform through the Control Panel .............. 27
29
Creating and Publishing Your Site .............................................................................................. 30 Creating and Publishing Web Sites Using Sitebuilder ...................................................... 30 Publishing a Site Through FTP ......................................................................................... 31 Publishing a Site Through Parallels Plesk Panel's File Manager ..................................... 33 Publishing a Site Through SSH Connection ..................................................................... 34 Publishing a Site From Microsoft FrontPage (Windows Hosting) ..................................... 34 Using Additional Microsoft FrontPage Accounts (Windows Hosting) ............................... 37 Changing Microsoft FrontPage Settings (Windows Hosting) ............................................ 39 Publishing a Site From Adobe Dreamweaver ................................................................... 40 Previewing Your Site ................................................................................................................... 41 Configuring ASP.NET (Windows Hosting) .................................................................................. 41 Configuring ASP.NET for Your Domain ............................................................................ 42 Configuring ASP.NET for Virtual Directories..................................................................... 45 Restoring Default ASP.NET Configuration ....................................................................... 47 Changing .NET Framework Version for Your Domain ...................................................... 47 Changing .NET Framework Version for Virtual Directories .............................................. 48 Setting PHP Version for a Domain (Windows Hosting)............................................................... 48 Deploying Databases .................................................................................................................. 49
Preface Creating or Importing a Database ..................................................................................... 50 Creating a Database User Account .................................................................................. 51 Changing Password of a Database User .......................................................................... 51 Removing a Database User Account ................................................................................ 52 Removing a Database....................................................................................................... 52 Accessing Data From External Databases (Windows Hosting) .................................................. 52 Creating ODBC Connections to External Databases ....................................................... 53 Changing Settings Of Existing ODBC Connections .......................................................... 53 Removing Connections to External Databases ................................................................ 54 Configuring Data Source Names for Adobe ColdFusion (Windows Hosting) ............................. 54 Creating a New Data Source Name.................................................................................. 55 Changing Settings of a Data Source Name ...................................................................... 55 Removing a Data Source Name ....................................................................................... 56 Installing Applications .................................................................................................................. 57 Installing Java Web Applications ...................................................................................... 59 Installing Ruby Web Applications (Linux Hosting) ............................................................ 60 Using IIS Application Pool (Windows Hosting) ............................................................................ 61 Setting Up IIS Application Pool ......................................................................................... 62 Disabling IIS Application Pool ........................................................................................... 62 Securing Online Transactions on Your Site With SSL Encryption .............................................. 63 Obtaining and Installing SSL Certificates from Comodo, GeoTrust, Inc. or GoDaddy ..... 64 Obtaining and Installing SSL Certificates from Other Certification Authorities ................. 65 Creating and Installing Free Self-signed SSL Certificate.................................................. 66 Uninstalling a Certificate from Your Site ........................................................................... 67 Using SSL Certificate Shared By Another Domain (Windows Hosting Only) ................... 68 Restricting Bandwidth Usage for Sites ........................................................................................ 69 Restricting the Amount of Simultaneous Connections to Sites ................................................... 69 Protecting Sites From Bandwidth Stealing (Windows Hosting) .................................................. 70 Restricting Access to Web Server's Resources With Password Protection ............................... 70 Protecting a Resource....................................................................................................... 71 Adding and Removing Authorized Users .......................................................................... 72 Unprotecting a Resource .................................................................................................. 73 Setting File and Directory Access Permissions (Linux Hosting) ................................................. 73 Setting File and Directory Access Permissions (Windows Hosting) ........................................... 74 Setting and Changing Access Permissions for Groups and Users .................................. 75 Removing Access Permissions from Groups and Users .................................................. 76 Setting Up Access Permissions Inheritance for Files and Folders ................................... 76 Setting, Changing and Removing Special Access Permissions ....................................... 77 Setting Access Permissions for Virtual Directories ........................................................... 78 Organizing Your Site Structure With Subdomains ...................................................................... 78 Setting Up Subdomains (Linux Hosting) ........................................................................... 79 Setting Up Subdomains (Windows Hosting) ..................................................................... 80 Removing Subdomains ..................................................................................................... 82 Setting Up Additional Domain Names for a Site (Domain Aliases) ............................................. 82 Setting Up a Domain Alias ................................................................................................ 83 Modifying Properties of a Domain Alias ............................................................................ 84 Removing a Domain Alias ................................................................................................. 84 Using Virtual Directories (Windows Hosting) .............................................................................. 85 Creating Virtual Directories ............................................................................................... 86 Changing Virtual Directory Settings .................................................................................. 88 Adding and Removing MIME Types ................................................................................. 90 Setting PHP Version for Virtual Directories....................................................................... 92 Removing Virtual Directories............................................................................................. 92 Hosting Personal Web Pages on Your Web Server.................................................................... 93 Changing FTP Password for a Web Page Owner ............................................................ 94 Allocating More Disk Space to the Web Page Owner ...................................................... 94 Removing Web Page Owner's Account ............................................................................ 94 Setting Up Anonymous FTP Access to the Server ..................................................................... 95 Customizing Web Server Error Messages (Linux Hosting) ......................................................... 96
Preface Customizing Web Server Error Messages (Windows Hosting) ................................................... 98 Customizing DNS Zone Configuration for Your Domain ........................................................... 100 Adding Resource Records .............................................................................................. 101 Modifying Resource Records .......................................................................................... 102 Removing Resource Records ......................................................................................... 103 Restoring the Original Zone Configuration...................................................................... 103 Serving Your Site with External Domain Name Servers ........................................................... 105 Changing Web Hosting Type from Physical to Forwarding ...................................................... 107
108
Creating Mailboxes .................................................................................................................... 109 Accessing Your Mail .................................................................................................................. 111 Setting Up Microsoft Office Outlook 2007 ....................................................................... 112 Setting Up Microsoft Outlook Express 6 ......................................................................... 115 Setting Up Mozilla Thunderbird ....................................................................................... 119 Setting Up Apple Mail...................................................................................................... 124 Protecting Mailboxes From Spam ............................................................................................. 129 Setting Up Additional Disposable E-mail Addresses for Your Mailbox (E-mail Aliases) 130 Setting Up Spam Filter .................................................................................................... 130 Protecting Mailboxes From Viruses .......................................................................................... 134 Switching On Anti-virus Protection .................................................................................. 134 Switching Off Anti-virus Protection .................................................................................. 135 Suspending and Unsuspending Mailboxes ............................................................................... 135 Removing Mailboxes ................................................................................................................. 136 Setting Up Mail Forwarding to a Single E-mail Address ........................................................... 136 Suspending and Unsuspending Mail Forwarders ........................................................... 137 Setting Up Mail Forwarding to Multiple E-mail Addresses ........................................................ 137 Adding and Removing Recipient Addresses................................................................... 138 Switching off Mail Forwarding to Multiple E-mail Addresses .......................................... 139 Removing Mail Forwarders ....................................................................................................... 139 Setting Up Automatic Reply ...................................................................................................... 140 Switching off Automatic Reply ................................................................................................... 142 Setting Up Site-wide Preferences for Handling Mail to Nonexistent Users .............................. 143 Introducing Changes to a Number of Mail Accounts at Once ................................................... 144 Maintaining Mailing Lists ........................................................................................................... 144 Setting Up a Mailing List ................................................................................................. 145 Subscribing and Unsubscribing Users ............................................................................ 146 Posting to Your Mailing List............................................................................................. 146 Removing Mailing Lists ................................................................................................... 146
147
Adjusting Preferences for Web Statistics Presentation by Webalizer ....................................... 149 Hiding and Unhiding Internal References from Your and Other Sites ............................ 150 Grouping and Ungrouping References from Other Sites ................................................ 151 Hiding and Unhiding Direct Requests ............................................................................. 151 Automating Report Generation and Delivery by E-mail ............................................................ 152 Viewing Log Files and Configuring Recycling of Log Files ....................................................... 153
154
Configuring Control Panel for Using FTP Repository................................................................ 155 Backing Up Your Domain .......................................................................................................... 155 Backing Up Databases (Windows Hosting) .............................................................................. 156 Scheduling Backups .................................................................................................................. 156 Restoring Data From Backup Archives ..................................................................................... 158 Restoring Databases ................................................................................................................. 159
Preface Recovering Orphaned Database Users .......................................................................... 160 Maintaining Your Backup Files Repository ............................................................................... 160 Uploading Backup Files to Server ................................................................................... 161 Downloading Backup Files from Server .......................................................................... 161 Removing Backup Files from Server .............................................................................. 161 Maintaining Database Backup Files Repository (Windows Hosting) ........................................ 162 Uploading Database Backup Files To Server ................................................................. 162 Downloading Database Backup Files From Server ........................................................ 163 Removing Database Backup Files From Server ............................................................. 163
Scheduling Tasks
164
Scheduling a Task (Linux Hosting) ........................................................................................... 165 Scheduling a Task (Windows Hosting) ..................................................................................... 166 Suspending and Resuming Execution of Tasks........................................................................ 167 Canceling a Task ....................................................................................................................... 167
168
Monitoring Connections to FTP Service .................................................................................... 169 Monitoring Connections to Control Panel .................................................................................. 170
Accessing The Server Using Remote Desktop (Windows Hosting) Using Help Desk For Requesting Assistance From Your Service Provider
171 173
Submitting a Problem Report to Your Service Provider ............................................................ 173 Commenting and Closing Your Trouble Ticket ......................................................................... 174
Preface
Preface
In this section:
Typographical Conventions ................................................................................. 7 Feedback............................................................................................................. 8
Typographical Conventions
The following kinds of formatting in the text identify special information.
Formatting convention Special Bold Type of Information Example
Items you must select, such as Go to the QoS tab. menu options, command buttons, or items in a list. Titles of chapters, sections, and subsections. Read the Basic Administration chapter. The system supports the so called wildcard character search.
Italics
Used to emphasize the importance of a point, to introduce a term or to designate a command line placeholder, which is to be replaced with a real name or value.
Monospace
The names of style sheet The license file is called selectors, files and directories, license.key. and CSS fragments.
Preface
Preformatted Bold
What you type, contrasted with Unix/Linux: on-screen computer output. # cd /root/rpms/php
Windows:
>cd %myfolder% Preformatted On-screen computer output in Unix/Linux: your command-line sessions; # ls al /files source code in XML, C++, or other programming languages. total 14470
Windows:
>ping localhost Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Feedback
If you have found an error in this guide, or if you have suggestions or ideas on how to improve this guide, please send your feedback using the online form at http://www.parallels.com/en/support/usersdoc/. Please include in your report the guide's title, chapter and section titles, and the fragment of text in which you have found an error.
CHAPTER 1
Getting Started
In this chapter:
Logging In to Parallels Plesk Panel..................................................................... 9 Becoming Familiar with Parallels Plesk Panel .................................................... 10 Changing Your Contact Information and Password ............................................ 13
3. Type the login name and password your provider gave you into the Login and Password boxes, respectively.
Your login name would be your domain name.
4. If you log in for the first time, select the language for your control panel from the Interface language drop-down box.
If you had previously specified the interface language and saved it in your interface preferences, leave the User default value selected.
5. Click Login.
10
Getting Started
The top banner area provides access to the following functions: My account. This is where you can select a language and theme for your control panel and change your contact information. Switch user. This is where you can switch between user accounts. This shortcut is shown only when single sign-on technology is enabled on the server. Log out. This is where you close your session when you have finished working with control panel. The navigation pane on the left provides access to the following sets of functions: Home. This is where you start working with the control panel. Most of the operations you might need to perform are accessible from this area. Mail. This is where you perform operations on e-mail accounts. You can accomplish the following tasks from this area of the control panel: Set up and manage mailboxes. Set up mailing lists, automatic responses, mail forwarders. Applications. This is where you can view and install applications on your Web site.
Getting Started
11
Settings. This is where you specify settings for the Web site hosting service and Web statistics. Global Account. This shortcut appears in your Parallels Plesk Panel when the single sign-on capabilities are switched on on the hosting server. Single sign-on technology allows you to log in to different Parallels products using a single global login name and password. This shortcut is used for changing the global login settings. Help Desk. This is the help desk system integrated with your control panel. If you see this shortcut in the navigation pane, then it is likely that your provider uses it; so you can use it to report your problems to provider's technical support staff. If this link is not shown in your Panel, then it means that your provider does not use the built-in Help Desk. In such a case, you should use other means to contact your provider when you need assistance. Help. Provides context sensitive help. To see information about a tool or an item on the page, hover the cursor over an item, without clicking it, and a small hover box appears with supplementary information regarding the item being hovered over.
If your hosting plan includes the Web site creation and management service using Parallels Plesk Sitebuilder, the following shortcuts are also shown in your control panel's navigation pane under the Sitebuilder Administration group: Home page. This provides shortcuts to the task-oriented wizards. Here you can perform any operations on your account and Web site through the Sitebuilder system. For more information, see http://download1.parallels.com/SiteBuilder/4.5.0/doc/site_owner/en_US/html/using_ desktop_interface.htm. Sites. Here you can add and manage sites. For more information, see http://download1.parallels.com/SiteBuilder/4.5.0/doc/site_owner/en_US/html/manag ing_sites.htm. The main working area on the right provides access to the tools available for the current section of the control panel selected in the navigation pane. Additional operations are accessible from drop-down menus that open when you click group titles.
To navigate through Parallels Plesk Panel, you can use a path bar: a chain of links that appears in the right part of the screen, below the banner area.
12
Getting Started
To the right of the path bar, there are Favorites and Visited Pages menus. The Visited Pages menu keeps the shortcuts to the recently visited control panel screens. These shortcuts are added automatically. The Favorites menu keeps the shortcuts to the screens that you manually add to favorites. For information about working with shortcuts in the Favorites menu, see the section Customizing Your Home Page (on page 19). To return to a previous screen, use the shortcuts in the path bar, or the Up Level icon in the upper-right corner of the screen. When changing settings for an e-mail account, you can quickly select another e-mail account whose settings you also want to change. To do this, click a small arrow icon located to the right of the e-mail address.
This will open a list of e-mail addresses that you can select.
To sort a list by a certain parameter in ascending or descending order, click on the parameter's title in the column heading. The order of sorting will be indicated by a small triangle displayed next to the parameter's title.
Getting Started
13
3. Click the Forgot your password? link. 4. Type your domain name into the Login box, and type your e-mail address registered in the system into the E-mail box. 5. Click OK.
Your password will be sent to your e-mail address.
CHAPTER 2
In this chapter:
Creating a Global Account .................................................................................. 14 Connecting Local Accounts To Your Global Account ......................................... 15 Switching Between Accounts .............................................................................. 16 Changing Global Account Password................................................................... 16 Disconnecting Local Accounts From Global Account ......................................... 17
15
To connect an account in another product with SSO support to your global account:
1. Log in to software product with SSO support under the account you want to connect. 2. Follow the instructions on connecting to a global account in respective software product documentation. Make sure that you provide the credentials for the existing global account when you are asked to.
Repeat steps 1-2 for other accounts or products as necessary. Note. Different software products may use different names for the Global Account feature, such as Federated Identity or Global Login. Refer to respective software product documentation for more information. After you have connected all required accounts to your global account, you can log in under your global account all the time in any product where you have a local account connected to your global account. You will be shown the list of local accounts connected to your global account every time you log in under it, so you can choose which account you would like to use now. You can switch to another account any time you want. Refer to the section Switching Between Accounts for more information.
16
3. Click OK.
17
CHAPTER 3
19
4. Specify what actions should be shown in the drop-down menus on the Home page by selecting the corresponding check boxes. 5. Click OK.
To add shortcuts to control panel screens to the Favorites menu on the Home page:
1. Navigate to the control panel screen you need. 2. In the Favorites menu, select Add to Favorites.
20
3. Click OK.
21
CHAPTER 4
23
Shell access to server with FTP user's credentials (available only for Linux hosting) or Access to system (available only for Windows hosting). This allows you to upload securely web content to the server through a Secure Socket Shell connection, however, allowing shell access also poses a potential threat to the server security, so we recommend that you do not allow shell access. Leave the Forbidden option selected. Microsoft FrontPage support. Microsoft FrontPage is a popular web site authoring tool. To enable users to publish and modify their sites through Microsoft FrontPage, select the Microsoft FrontPage support and Microsoft FrontPage over SSL support check boxes, set the Microsoft FrontPage authoring option to allowed, and specify the FrontPage Administrator's login and password. Services, or support for programming and scripting languages supported by your hosting environment. Specify which of the following programming and scripting languages should be interpreted, executed or otherwise processed by the web server: Active Server Pages (ASP), ASP.NET (on Windows-based hosting), Server Side Includes (SSI), PHP hypertext preprocessor (PHP), Common Gateway Interface (CGI), Fast Common Gateway Interface (FastCGI), Perl, Python, ColdFusion and Miva scripting required for running Miva e-commerce solutions. Web statistics. To allow you to view the information on the number of people visited your site and the pages of the site they viewed, select the required program from Web statistics menu (AWStats is recommended) and select the accessible via password protected directory /plesk-stat/webstat check box. This will install the statistics program which will generate reports and place them into the password protected directory. You will then be able to access Web statistics at the URL: https://your-domain.com/plesk-stat/webstat using your FTP account login and password. Note: When you switch from one statistics program to another, all reports created by the previously used statistics program are deleted and new reports are created in accordance with the information read from log files kept on the server. This means that if you configured the system (at Log Manager > Log Rotation) so as to keep log files only for the last month, then Web statistics will be available only for the last month. Custom error documents. When visitors coming to your site request pages that the web server cannot find, the web server generates and displays a standard HTML page with an error message. If you wish to create your own error pages and use them on your web server, select the Custom error documents check box. Additional write/modify permissions (available only for Windows hosting). This option is required if Web applications under a domain will be using a file-based database (like Jet) located in the root of httpdocs or httpsdocs folders. Please note that selecting this option might seriously compromise the Web site security. Use dedicated IIS application pool (available only for Windows hosting). This option enables the use of dedicated IIS application pool for Web applications on a domain. Using dedicated IIS application pool dramatically improves the stability of domain Web applications due to worker process isolation mode. This mode gives each Web site hosted on the server the possibility to allocate a separate process pool for execution of its Web applications. This way, malfunction in one application will not cause stopping of all the others. This is especially useful when you are using shared hosting package.
24
3. Click OK.
In this chapter:
Viewing the Resource Allotments for Your Account............................................ 25 Viewing the Permissions for Operations You Can Perform through the Control Panel ............................................................................................................................ 27
25
26
Mailbox quota. Displays the amount of disk space in kilobytes that is allocated for storing e-mail messages and autoresponder attachment files to each mailbox in your domain. Maximum number of databases (available only for Linux hosting). Displays the number of databases that can be hosted in your domain. Maximum number of MySQL databases and Maximum number of Microsoft SQL server databases (available only for Windows hosting). Displays the maximum number of MySQL and Microsoft SQL Server databases that can be used by your domain. MySQL databases quota and Microsoft SQL databases quota (available only for Windows hosting). Displays the maximum disk space amount in megabytes that MySQL and Microsoft SQL Server databases used by your domain can occupy. Maximum number of ODBC connections (available only for Windows hosting). Displays the total number of ODBC connections that can be used by your domain. Maximum number of ColdFusion DSN connections (available only for Windows hosting). Displays the total number of ColdFusion DSN connections that can be used by your domain. Maximum number of Java applications. Displays the maximum number of Java applications or applets that you can install in a domain. Maximum number of shared SSL links (available only for Windows hosting). Displays the total number of shared SSL links that can be used on your domain. Validity period. Shows the term for a hosting account. At the end of the term, your domain/web site will be suspended, its Web, FTP and mail services will no longer be accessible to the Internet users, and you will not be able to log in to the control panel.
3. Click OK.
27
Viewing the Permissions for Operations You Can Perform through the Control Panel
To view the permissions for operations you can perform through your control panel:
1. Go to Home > Domain Administrator Access. 2. The permissions are listed in the Permissions group:
Physical hosting management. Shows whether you can fully control hosting account for your Web site. If it says No, then you can only change FTP password for accessing your Web space. Hosting performance management. Shows whether you can limit bandwidth usage and number of connections to your Web site. FTP password management. Shows whether you are allowed to change your credentials for access to Web space through FTP. Management of access to server over SSH (available only for Linux hosting) or Management of access to server over Remote Desktop (available only for Windows hosting). Shows whether you can access the server through Secure Shell (for Linux hosting) or Remote Desktop (for Windows hosting) protocols. Hard disk quota assignment. Shows whether you can set up the hard quota on disk space allocated to your site. Subdomains management. Shows whether you can set up, modify and remove subdomains in your domain. Domain aliases management. Shows whether you can set up additional alternative domain names for your Web site. Log rotation management. Shows whether you can adjust the cleanup and recycling of processed log files for your site. Anonymous FTP management. Shows whether you can have an FTP directory where all users could download and upload files without the need to enter login and password. A Web site should reside on a dedicated IP address in order to use anonymous FTP service. FTP accounts management (available only for Windows-based hosting). Shows whether you can create and manage FTP accounts. Scheduler management. Shows whether you can schedule tasks in the system. Scheduled tasks can be used for running scripts or utilities on schedule. DNS zone management. Shows whether you can manage the DNS zone of your domain. Java applications management. Shows whether you can install Java applications and applets on your Web site through the control panel.
28
Web statistics management. Shows whether you can manage Web statistics for this site. Mailing lists management. Shows whether you can use mailing lists provided by the GNU Mailman software. Spam filter management. Shows whether you can use spam filter provided by the SpamAssassin software. Antivirus management. Shows whether you can use server-side antivirus protection for filtering incoming and outgoing mail. Backup and restore functions. Shows whether you can use the control panel's facilities to backup and restore your site. Scheduled and on-demand backups are supported. Ability to use Sitebuilder. Shows whether you can use Sitebuilder for creating and editing your site. IIS application pool management (available only for Windows hosting). Shows whether you can manage your IIS application pool. Additional write/modify permissions management (available only for Windows hosting). Shows whether you can manage additional write/modify permissions for your site. These permissions are required if your Web applications are using a file-based database (like Jet) located in the root of httpdocs or httpsdocs folders. Home page management. Shows whether you can customize and manage your Home page. Ability to select a database server. Shows whether you can select a database server of each type for creating your databases, not only use the default database server.
3. Click OK.
CHAPTER 5
In this chapter:
Creating and Publishing Your Site ...................................................................... 30 Previewing Your Site ........................................................................................... 41 Configuring ASP.NET (Windows Hosting) .......................................................... 41 Setting PHP Version for a Domain (Windows Hosting)....................................... 48 Deploying Databases .......................................................................................... 49 Accessing Data From External Databases (Windows Hosting) .......................... 52 Configuring Data Source Names for Adobe ColdFusion (Windows Hosting) ..... 54 Installing Applications.......................................................................................... 57 Using IIS Application Pool (Windows Hosting).................................................... 61 Securing Online Transactions on Your Site With SSL Encryption ...................... 63 Restricting Bandwidth Usage for Sites ................................................................ 69 Restricting the Amount of Simultaneous Connections to Sites ........................... 69 Protecting Sites From Bandwidth Stealing (Windows Hosting)........................... 70 Restricting Access to Web Server's Resources With Password Protection ........ 70 Setting File and Directory Access Permissions (Linux Hosting) ......................... 73 Setting File and Directory Access Permissions (Windows Hosting) ................... 74 Organizing Your Site Structure With Subdomains .............................................. 78 Setting Up Additional Domain Names for a Site (Domain Aliases) ..................... 82 Using Virtual Directories (Windows Hosting) ...................................................... 85 Hosting Personal Web Pages on Your Web Server............................................ 93 Setting Up Anonymous FTP Access to the Server ............................................. 95 Customizing Web Server Error Messages (Linux Hosting) ................................. 96 Customizing Web Server Error Messages (Windows Hosting) ........................... 98 Customizing DNS Zone Configuration for Your Domain ..................................... 100 Serving Your Site with External Domain Name Servers ..................................... 105 Changing Web Hosting Type from Physical to Forwarding ................................. 107
30
In this section:
Creating and Publishing Web Sites Using Sitebuilder ........................................ 30 Publishing a Site Through FTP ........................................................................... 31 Publishing a Site Through Parallels Plesk Panel's File Manager ........................ 33 Publishing a Site Through SSH Connection ....................................................... 34 Publishing a Site From Microsoft FrontPage (Windows Hosting) ....................... 34 Using Additional Microsoft FrontPage Accounts (Windows Hosting) .................. 37 Changing Microsoft FrontPage Settings (Windows Hosting) .............................. 39 Publishing a Site From Adobe Dreamweaver ..................................................... 40
31
2. Upload files and directories that should be accessible through HTTP protocol to the httpdocs directory, and files/directories that should be transferred securely over SSL protocol to the httpsdocs directory. 3. Place your CGI scripts into the cgi-bin directory. 4. Close your FTP session.
In this section:
Changing Your FTP Account Credentials ........................................................... 31 Using Additional FTP Accounts (Windows Hosting) ........................................... 31
In this section:
Creating Additional FTP Accounts (Windows Hosting) ....................................... 32 Changing Settings of Additional FTP Accounts .................................................. 32 Removing Additional FTP Accounts.................................................................... 33
32
33
To copy or move a file or directory to another location, select the required file or directory using the appropriate check box, and click Copy/Move. Specify the destination for the file or directory to be copied or renamed to, then click Copy to copy, or Move to move it.
34
To update the file or directory creation date, click Change timestamp. The time stamp will be updated with the current local time. To remove a file or directory, select the corresponding check box, and click Remove. Confirm removal and click OK. When you upload Web content through File Manager or FTP, your control panel automatically sets the appropriate access permissions for files and directories. If you need to change the permissions for files and directories, refer to the sections: Setting File and Directory Access Permissions (Linux hosting) (see page 73). Setting File and Directory Access Permissions (Windows hosting) (see page 74).
35
2. To manage a site, which is not protected by SSL, open the Web Site group title menu, and click Frontpage Webadmin. To manage an SSLenabled site, open the Web Site group title menu, and click Frontpage SSL Webadmin. 3. Type your FrontPage administrators login name and password, and click OK.
For instructions on using FrontPage server extensions, see online help (Frontpage Webadmin > Help) or visit Microsoft Web site.
In this section:
Publishing Sites From Microsoft FrontPage Through FTP.................................. 35 Publishing Sites From Microsoft FrontPage Through HTTP ............................... 36
6. Click the Publish Web site button in the lower-right corner of the window.
36
9. Click the Publish Web site button in the lower-right corner of the window.
37
In this section:
Creating Additional Microsoft FrontPage Accounts............................................. 37 Changing Settings of Additional Microsoft FrontPage Accounts ......................... 37 Removing Additional Microsoft FrontPage Accounts .......................................... 38
38
When the specified limit is exceeded, the account owner will not be able to add files to his or her Web space.
39
If you use FrontPage forms that submit information by e-mail on your site, you may want to specify the following preferences: SMTP mail server that will be used for sending mail. By default, SMTP server specified in the domain's DNS zone is used for sending mail. If no SMTP server is specified in the zone, then FrontPage uses the mail service running on the server where the domain (site) is hosted. Sender's e-mail address. By default, domain owner's e-mail address is used. If the domain owner's e-mail address is not specified in domain owner's profile, then FrontPage uses the e-mail address of the client, to whom the domain belongs. If the client's e-mail address is not specified in the client's profile, then the server administrator's e-mail address is used.
40
4. From the Category menu, select the Remote Info item. 5. From the Access menu, select the FTP option. Most likely, your server supports publishing through FTP (File Transfer Protocol, commonly used for transferring files over the Internet). 6. Specify the following settings:
FTP host. Type your FTP host name without the ftp:// prefix. For example, your-domain.com. Host directory. Specify the directory on the server where your site will reside. In most cases, this is httpdocs. Login and password. Specify the login name and password that your provider gave you. Use passive FTP. Select this option only if your computer is behind a firewall.
7. To ensure that you specified the correct login and password, and that Dreamweaver can connect to the server, click the Test button. 8. To save the settings, click OK.
41
In this section:
Configuring ASP.NET for Your Domain .............................................................. 42 Configuring ASP.NET for Virtual Directories ....................................................... 45 Restoring Default ASP.NET Configuration.......................................................... 47 Changing .NET Framework Version for Your Domain ........................................ 47 Changing .NET Framework Version for Virtual Directories ................................. 48
42
3. Set up custom error messages that will be returned by ASP.NET applications in the Custom Error Settings field:
To set the custom error messages mode, select an appropriate option from the Custom error mode menu: On - custom error messages are enabled. Off - custom error messages are disabled and detailed errors are to be shown. RemoteOnly - custom error messages are displayed only to remote clients, and ASP.NET errors are shown to the local host. To add a new custom error message (which will be applied unless the Off mode was selected), enter the values in the Status Code and Redirect URL fields, and click . Status Code defines the HTTP status code resulting in redirection to the error page. Redirect URL defines the web address of the error page presenting information about the error to the client. Due to possible conflicts, you cannot add a new custom error message with an error code that already exists, but you can redefine the URL for the existing code. To remove a custom error message from the list, click next to it.
43
To enable compiling retail binaries, leave the Switch on debugging check box empty. To enable compiling debug binaries, select the Switch on debugging check box. In this case, the source code fragments containing error will be shown in a diagnostic page message. Note. When running applications in debug mode, a memory and/or performance overhead occurs. It is recommended to use debugging when testing an application and to disable it before deploying the application into production scenario.
5. Configure encoding settings for ASP.NET applications in the Globalization Settings section:
To set an adopted encoding of all incoming requests, enter an encoding value into the Request encoding field (default is utf-8). To set an adopted encoding of all responses, enter an encoding value into the Response encoding field (default is utf-8). To set an encoding which must be used by default for parsing of .aspx, .asmx, and .asax files, enter an encoding value into the File encoding field (default is Windows-1252). To set a culture which must be used by default for processing incoming web requests, select an appropriate item from the Culture list. To set a culture which must be used by default when processing searches for a locale-dependent resource, select an appropriate item from the UI Culture list.
6. Set a code access security trust level for ASP.NET applications in the Code Access Security field.
CAS trust level is a security zone to which applications execution is assigned, defining what server resources the applications will have access to. Important. When an assembly is assigned a trust level that is too low, it does not function correctly. For more information on the permissions levels see http://msdn.microsoft.com/library/enus/dnnetsec/html/THCMCh09.asp?frame=true#c09618429_010.
7. Enable the usage of the auxiliary scripts in the Script Library Settings field. Specifying the script library settings is necessary if the validation web controls are used on your web site. This option is available only for ASP.NET 1.1.x.
If you need to use auxiliary scripts (specifically, scripts implementing objects for validating input data), provide the settings for .NET framework script library. To do so, enter the path beginning with the domain root directory preceded by the forward slash into the Path to Microsoft script library field, or click the folder icon next to the Path to Microsoft script library field and browse for the required location. To initiate the auto-installation of files containing the scripts to the specified location, select the Install check box. If the files already exist there, they will be rewritten.
44
To set up the default authentication mode for applications, select an appropriate item from the Authentication mode list. Windows authentication mode should be selected if any form of IIS authentication is used. To set up time that a session can idle before it is abandoned, enter appropriate number minutes into the Session timeout field.
45
5. Set up custom error messages that will be returned by ASP.NET applications in the Custom Error Settings field:
To set the custom error messages mode, select an appropriate option from the Custom error mode menu: On - custom error messages are enabled. Off - custom error messages are disabled and detailed errors are to be shown. RemoteOnly - custom error messages are displayed only to remote clients, and ASP.NET errors are shown to the local host. To add a new custom error message (which will be applied unless the Off mode was selected), enter the values in the Status Code and Redirect URL fields, and click . Status Code defines the HTTP status code resulting in redirection to the error page. Redirect URL defines the web address of the error page presenting information about the error to the client. Due to possible conflicts, you cannot add a new custom error message with an error code that already exists, but you can redefine the URL for the existing code. To remove a custom error message from the list, click next to it.
46
To determine the programming language to be used as default in dynamic compilation files, choose an entry from Page default language list. To enable compiling retail binaries, leave the Switch on debugging check box empty. To enable compiling debug binaries, select the Switch on debugging check box. In this case, the source code fragments containing error will be shown in a diagnostic page message. Note. When running applications in debug mode, a memory and/or performance overhead occurs. It is recommended to use debugging when testing an application and to disable it before deploying the application into production scenario.
7. Configure encoding settings for ASP.NET applications in the Globalization Settings section:
To set an adopted encoding of all incoming requests, enter an encoding value into the Request encoding field (default is utf-8). To set an adopted encoding of all responses, enter an encoding value into the Response encoding field (default is utf-8). To set an encoding which must be used by default for parsing of .aspx, .asmx, and .asax files, enter an encoding value into the File encoding field (default is Windows-1252). To set a culture which must be used by default for processing incoming web requests, select an appropriate item from the Culture list. To set a culture which must be used by default when processing searches for a locale-dependent resource, select an appropriate item from the UI Culture list.
8. Set a code access security trust level for ASP.NET applications in the Code Access Security field.
CAS trust level is a security zone to which applications execution is assigned, defining what server resources the applications will have access to. Important. When an assembly is assigned a trust level that is too low, it does not function correctly. For more information on the permissions levels see http://msdn.microsoft.com/library/enus/dnnetsec/html/THCMCh09.asp?frame=true#c09618429_010.
9. Enable the usage of the auxiliary scripts in the Script Library Settings field. Specifying the script library settings is necessary if the validation web controls are used on your web site. This option is available only for ASP.NET 1.1.x.
If you need to use auxiliary scripts (specifically, scripts implementing objects for validating input data), provide the settings for .NET framework script library. To do so, enter the path beginning with the domain root directory preceded by the forward slash into the Path to Microsoft script library field, or click the folder icon next to the Path to Microsoft script library field and browse for the required location. To initiate the auto-installation of files containing the scripts to the specified location, select the Install check box. If the files already exist there, they will be rewritten.
47
To set up the default authentication mode for applications, select an appropriate item from the Authentication mode list. Windows authentication mode should be selected if any form of IIS authentication is used. To set up time that a session can idle before it is abandoned, enter appropriate number minutes into the Session timeout field.
48
49
Deploying Databases
If your web server incorporates data processing applications or is designed to generate web pages dynamically, you will likely need a database for storing and retrieving data. You can either create a new database for your site or import the data from your previously backed up MySQL, PostgreSQL, or Microsoft SQL database.
In this section:
Creating or Importing a Database ....................................................................... 50 Creating a Database User Account..................................................................... 51 Changing Password of a Database User ............................................................ 51 Removing a Database User Account .................................................................. 52 Removing a Database......................................................................................... 52
50
4. Select the database type that you are going to use: MySQL, PostgreSQL or Microsoft SQL Server. 5. Select the database server of the selected type from the list. Click OK. 6. To set up database administrators credentials, click Add New Database User. 7. Type a user name and a password that will be used for accessing the contents of the database. 8. Click OK.
4. Select the database type that you are going to use: MySQL, PostgreSQL or Microsoft SQL Server. Click OK. 5. To set up database administrators credentials, click Add New Database User. 6. Type a user name and a password that will be used for accessing the contents of the database. Click OK. 7. Click the DB WebAdmin icon in the Tools group.
An interface to phpMyAdmin, phpPgAdmin, or ASPEnterpriseManager database management tool will open in a separate browser window. If you have a MySQL database:
a. Click Query window in the left frame, click the Import files tab,
51
b. Select the text file that contains the data and click Go. c. Click the Insert data from a text file link.
If you have a MS SQL database:
a. Click the name of your database in the left frame b. Click Query (the magnifying glass button) c. Copy the text of your script into the text area and click Run Query.
To manage your databases and their contents, use your favorite MySQL, PostgreSQL, or Microsoft SQL Server client or the Web based database management tool accessible from Parallels Plesk Panel (Home > Databases > database name > DB WebAdmin).
52
Removing a Database
To remove a database with its contents:
1. On your Home page, click Databases. 2. Select a check box corresponding to the database that you wish to remove.
If the required check box appears grayed out, this means that this database is used by a Web application and you can remove it only by uninstalling the respective application.
In this section:
Creating ODBC Connections to External Databases .......................................... 53 Changing Settings Of Existing ODBC Connections ............................................ 53 Removing Connections to External Databases................................................... 54
53
54
In this section:
Creating a New Data Source Name .................................................................... 55 Changing Settings of a Data Source Name ........................................................ 55 Removing a Data Source Name ......................................................................... 56
55
56
57
Installing Applications
To enhance your Web site with valuable features, such as guest books, forums, hit counters, photo galleries, and e-commerce solutions, you can install the respective applications from control panel's application vault (Home > Web Applications). The number and variety of available applications depend on your providers policy and your hosting plan.
2. Click Add New Application. 3. In the left menu, select a category to which the application you need belongs. 4. Select the required application in the list, and then click Install. 5. Some applications will display a license agreement. Read the license agreement carefully, and if you agree with it, select the I agree check box and click Next >>. 6. Specify whether you wish to create a hyperlink to the application and place it in the control panel. 7. Specify the installation preferences and other information that may be required by the application (the requirements may vary among applications). Click Install. 8. If you have chosen to create a hyperlink button inside your Parallels Plesk Panel, specify its properties:
Type the text that will show on your button in the Button label box. Choose the location for your button. To place it in the right frame of your Home page, select the Domain Administration page value as the location. To place it in the left frame (navigation pane) of your control panel, select the Navigation pane value. Specify the priority of the button. Parallels Plesk Panel will arrange your custom buttons on the control panel in accordance with the priority you define: the lower the number the higher is priority. Buttons are placed in the left-to-right order. To use an image for a button background, type the path to its location or click Browse to browse for the desired file. It is recommended that you use a 16x16 pixels GIF or JPEG image for a button to be placed in the navigation pane, and 32x32 pixels GIF or JPEG image for buttons placed in the main frame. Type the hyperlink to be attached to the button into the URL box.
58
Using the check boxes, specify whether to include the data, such as domain id and domain name to be transferred within the URL. These data can be used for processing by external web applications. In the Context help tip contents input field, type in the help tip that will be displayed when you hover the mouse pointer over the button. Select the Open URL in the control panel check box if you wish the destination URL to be opened in the control panel's right frame, otherwise leave this check box unchecked to open the URL in a separate browser window. If you wish to make this button visible to the e-mail users whom you granted access to control panel, select the Visible to all sub-logins check box. Click OK to complete creation. Now the application is installed and you can insert a link to this application into the web pages of your site, for example, on your Home page. Otherwise, you and your users will have to access this application by typing its URL, which can be long enough to remember. To access the Web interface of an application, do any of the following: Type the URL in your browser. For example: http://your-domain.com/forum/. Go to Home > Web Applications, and click an icon application. , corresponding to the
If you chose to add a hyperlink button to your Parallels Plesk Panel during installation of an application, then on your Home page, click the respective button in the Custom buttons group or navigation pane. To reconfigure an application, change the application administrators password, or to install a license key for a commercial application, go to Home > Web Applications, and click an icon , corresponding to the application. To upgrade an application to a newer version (if it is available on the server), go to Home > Web Applications, and click a corresponding shortcut in the U column. To remove an application, go to Home > Web Applications, and select a check box corresponding to the application that you no longer need. Then click Remove. The application and its databases will be removed from the server.
In this section:
Installing Java Web Applications......................................................................... 59 Installing Ruby Web Applications (Linux Hosting)............................................... 60
59
2. Click Install New Application. 3. Specify the path to an application package you wish to install (this can be an application package in WAR format saved on your computers hard drive), or click Browse to navigate to it, then click OK.
Now the application is installed and the respective entry is added to the list of installed Java applications (Home > Web Applications > Java Applications).
To access the web interface of a Java Web application, do any of the following:
From your Home page, go to Home > Web Applications > Java Applications, and click a respective hyperlink in the Path column. Type the URL in your browser. For example: http://yourdomain.com:9080/storefront/.
60
7. Create a file with name .htaccess in the directory <your_domain_name>/httpdocs/<your_application>/public, open it with a text editor of your choice and add the following lines into the file:
AddHandler fcgid-script .fcgi Options +FollowSymLinks +ExecCGI RewriteEngine On RewriteBase /<your_application> RewriteRule ^$ index.html [QSA] RewriteRule ^([^.]+)$ $1.html [QSA] RewriteCond %{REQUEST_FILENAME} !-f RewriteRule ^(.*)$ dispatch.fcgi [QSA,L] ErrorDocument 500 "<h2>Application error</h2>Rails application failed to start properly"
61
9. Make sure that the proper path to the Ruby interpreter is specified in the file public/dispatch.fcgi: issue the commands head -n1 dispatch.fcgi and which ruby. The both commands must return identical values.
Now the Web application will be accessible at the following URL: http://yourdomain.com/your_application.
In this section:
Setting Up IIS Application Pool ........................................................................... 62 Disabling IIS Application Pool ............................................................................. 62
62
63
In this section:
Obtaining and Installing SSL Certificates from Comodo, GeoTrust, Inc. or GoDaddy ............................................................................................................................ 64 Obtaining and Installing SSL Certificates from Other Certification Authorities.... 65 Creating and Installing Free Self-signed SSL Certificate .................................... 66 Uninstalling a Certificate from Your Site ............................................................. 67 Using SSL Certificate Shared By Another Domain (Windows Hosting Only)...... 68
64
Obtaining and Installing SSL Certificates from Comodo, GeoTrust, Inc. or GoDaddy
To purchase an SSL certificate through MyPleskCom online store and secure your site:
1. Go to Home > SSL Certificates and click Add SSL Certificate. 2. Specify the certificate properties:
Certificate name. This will help you identify this certificate in the repository. Encryption level. Choose the encryption level of your SSL certificate. We recommend that you choose a value more than 1024 bit. Specify your location and organization name. The values you enter should not exceed the length of 64 symbols. Specify the domain name for which you wish to purchase an SSL certificate. This should be a fully qualified domain name. Example: www.your-domain.com Enter the domain administrator's e-mail address.
3. Make sure that all the provided information is correct and accurate, as it will be used to generate your private key. Click Buy SSL Certificate.
Your private key and certificate signing request will be generated do not delete them. MyPlesk.com login page will open in a new browser window.
4. Register or login to an existing MyPlesk.com account and you will be taken step by step through the certificate purchase procedure. 5. Choose the type of certificate that you wish to purchase. 6. Click Proceed to Buy and order the certificate. 7. In the Approver E-Mail drop-down box, please select the correct Approver e-mail.
The approver e-mail is an e-mail address that can confirm that certificate for specific domain name was requested by an authorized person. Once your certificate request is processed, you will be sent a confirmation e-mail. After you confirm, the SSL certificate will be sent to your e-mail.
8. When you receive your SSL certificate, save it on your local machine or network. 9. Return to the SSL Certificates repository (Home > SSL Certificates). 10. Click Browse and navigate to the location of the saved certificate. 11. Select the saved certificate, and then click Send File.
This will upload and install the certificate against the corresponding private key.
12. Return to your Home page and click Web Hosting Settings.
65
13. Select the SSL certificate that you wish to install from the Certificate drop-down box.
If there is no Certificate drop-down box on the screen, this means that you are on a shared hosting account; therefore, you need to upgrade your hosting package and purchase a dedicated IP address from your hosting provider.
14. Select the SSL support check box and click OK.
3. Make sure that all the provided information is correct and accurate, as it will be used to generate your private key. Click Request.
Your private key and certificate signing request will be generated and stored in the repository.
4. In the list of certificates, click the name of the certificate you need. A page showing the certificate properties opens. 5. Locate the CSR section on the page, and copy the text that starts with the line -----BEGIN CERTIFICATE REQUEST----- and ends with the line -----END CERTIFICATE REQUEST----- to the clipboard. 6. Visit the Web site of the certification authority from which you want to purchase an SSL certificate, and follow the links on their site to start a certificate ordering procedure. When you are prompted to specify CSR text, paste the data from the clipboard into the online form and click Continue. The certification authority will create an SSL certificate in accordance with the information you supplied.
66
7. When you receive your SSL certificate, save it on your local machine or network. 8. Return to the SSL Certificates repository (Home > SSL Certificates). 9. Click Browse in the middle of the page and navigate to the location of the saved certificate. 10. Select it, and then click Send File.
This will upload and install the certificate against the corresponding private key.
11. Return to your Home page and click Web Hosting Settings. 12. Select the SSL certificate that you wish to install from the Certificate drop-down box.
If there is no Certificate drop-down box on the screen, this means that you are on a shared hosting account; therefore, you need to upgrade your hosting package and purchase a dedicated IP address from your hosting provider.
13. Select the SSL support check box and click OK.
3. Click Self-Signed.
Your certificate will be generated and stored in the repository.
67
5. Select the self-signed SSL certificate from the Certificate drop-down box.
If there is no Certificate drop-down box on the screen, this means that you are on a shared hosting account; therefore, you need to upgrade your hosting package and purchase a dedicated IP address from your hosting provider.
68
To use SSL certificate of the Master SSL Domain, enabling shared SSL use:
1. Click Shared SSL on your Home page. 2. Select the Switch on shared SSL check box. 3. Specify the virtual directory name in the corresponding input field. The virtual directory with the supplied name will be created on the Master SSL Domain. This directory will be used for accessing your site through SSL.
For example, let us suppose that you have a domain named mydomain.com, Master SSL Domain is defined as master_ssl_domain.com, and the virtual directory name you supplied is my_virtual_dir. In this case, to access your site through SSL, you need to use the following address: https://master_ssl_domain.com/my_virtual_dir. Note. You cannot use your domain name (e.g., mydomain.com) to access your site via SSL if you are using shared SSL.
4. Select the directory where protected content is located on your domain. The documents within specified directory will be accessible only through SSL. You can only choose either httpdocs or httpsdocs as a target directory. 5. To make your domain accessible via SSL only, select the Require SSL check box. 6. Click OK.
To stop using SSL certificate of the Master SSL Domain, disabling shared SSL use:
1. Click Shared SSL on your Home page. 2. Clear the Switch on shared SSL check box.
69
3. Click OK.
70
In this section:
Protecting a Resource......................................................................................... 71 Adding and Removing Authorized Users ............................................................ 72 Unprotecting a Resource .................................................................................... 73
71
Protecting a Resource
To password protect a directory in your site and to specify authorized users:
1. On your Home page, click Password Protected Directories. 2. Click Add New Directory. 3. Specify the path to the directory that you wish to password protect in the Directory name box.
This can be any directory existing in your site, for example: /private. If the directory that you would like to protect has not yet been created, specify the path and the directory name Parallels Plesk Panel will create it for you.
4. Specify in what location (also called document root) your password protected directory resides or will reside (available only for Linux hosting).
For example: To protect the httpdocs/private directory, type '/private' in the Directory name box and select the Non-SSL check box. To protect the httpsdocs/private directory, type '/private' in the Directory name box and select the SSL check box. To protect your CGI scripts stored in the cgi-bin directory, leave the '/' value in the Directory name box and select the cgi-bin check box. Make sure there are no white spaces after the slash symbol; otherwise, a protected directory will be created with the name consisting of white spaces.
5. In the Header Text box, type a resource description or a welcoming message that your users will see when they visit your protected area. 6. Click OK.
The directory you specified will be protected.
7. To add authorized users, click Add New User. 8. Specify the login name and password that will be used for accessing the protected area.
The password should be from 5 to 14 symbols in length.
9. Click OK. 10. To add more authorized users for this protected resource, repeat the steps 7 and 8.
72
4. Click OK.
2. Click on the users name. 3. Specify the new password and re-type it for confirmation. 4. Click OK.
2. Select a check box corresponding to the users name. 3. Click Remove. 4. Confirm the operation and click OK.
73
Unprotecting a Resource
To remove password protection and make the resource available to the public:
1. Go to Home > Password Protected Directories.
A list of password protected directories will open.
2. Select a check box corresponding to the name of the directory, from which you want to remove protection. 3. Click Remove.
The protection will be removed and the contents of the directory will be accessible to the public without restrictions.
74
In this section:
Setting and Changing Access Permissions for Groups and Users ..................... 75 Removing Access Permissions from Groups and Users .................................... 76 Setting Up Access Permissions Inheritance for Files and Folders ...................... 76 Setting, Changing and Removing Special Access Permissions ......................... 77 Setting Access Permissions for Virtual Directories ............................................. 78
75
To change or remove permissions from a group or user, click the required name in the Group or user names list. To set permissions for a group or user, which is not in the Group or user names list, select the required user/group name from the drop-down box located above the list and click : the user/group appears in the list. Select it.
3. To allow or deny permissions to a selected group/user, select the Allow or Deny check boxes corresponding to permissions listed under Permissions for [user/group name].
Note. If check boxes in Allow and/or Deny columns are shaded, it means that the corresponding permissions are inherited from a parent folder. To deny the permission, which are inherited from a parent object as allowed, select the required check boxes under Deny. This will override inherited permissions for this file/folder. To allow the permission, which are inherited from a parent object as denied, clear the Allow inheritable permissions from the parent to propagate to this object and all child objects. Include these with entries explicitly defined here check box: this removes the inherited permissions. Then select the required check boxes under Allow and Deny.
4. Click OK.
76
3. Select the required name in the Group or user names list and click to it.
Note: The icons appear unavailable for entries with permissions inherited from a parent object.
4. Select the required entry. 5. Clear the Allow inheritable permissions from the parent to propagate to this object and all child objects. Include these with entries explicitly defined here check box. 6. Select the entry again and click 7. Click OK. .
3. To make the file/folder inherit permissions from a parent folder (if it does not), select the Allow inheritable permissions from the parent to propagate to this object and all child objects. Include these with entries explicitly defined here check box. 4. To make the files and folders, which are contained in this folder, inherit the folder permissions defined here, select the Replace permission entries on all child objects with entries shown here that apply to child objects check box. 5. Click OK.
77
4. Click OK.
78
In this section:
Setting Up Subdomains (Linux Hosting) ............................................................. 79 Setting Up Subdomains (Windows Hosting) ....................................................... 80 Removing Subdomains ....................................................................................... 82
79
4. If this subdomain will require secure transactions, select the SSL support check box.
Then, the SSL certificate installed under the parent domain will be used for encrypting transactions. By default, when you publish the site, you need to upload the web content that should be accessible via secure connections to the httpsdocs directory, and the content that should be accessible via plain HTTP, to the httpdocs directory. For your convenience, you can choose to publish all content through a single location httpdocs directory. To do this, select the option Use a single directory for housing SSL and non-SSL content.
5. If this subdomain will hold a part of your own Web site that you manage on your own, leave the Use the FTP user account of the parent domain option selected. If this subdomain will hold a separate web site that will belong to or will be managed by another person, select the Create a separate user account for this subdomain option, and specify the login name and password that will be used for accessing the web space through FTP and publishing web site content. 6. If you wish to limit the amount of disk space that can be occupied by web content under this subdomain, type the desired value in megabytes into the Hard disk quota box.
When the specified limit is exceeded, you will not be able to add files to the web space, and editing existing files may corrupt them.
80
4. Type the subdomain name as required. This can be, for example, a topic of a site, organization department, or any other combination of letters, numbers and hyphens (up to 63 characters in length). To add the WWW prefix, select the appropriate check box.
The subdomain name must begin with an alphabet character. Subdomain names are case insensitive.
5. If you are creating subdomain on subfolder, specify the physical location for the subdomain files in the Site home directory field:
Clear the Create physical directory for subdomain check box and specify the existing directory to the right of httpdocs field. You can click to browse for the required directory, select it and click OK. Leave the Create physical directory for subdomain check box selected to create a corresponding physical directory with the same name as the subdomain.
6. If you are creating subdomain with physical hosting, specify the FTP user account for it:
If this subdomain will hold a part of your own Web site that you manage on your own, leave the Use the FTP user account of the main domain option selected. If this subdomain will hold a separate web site that will belong to or will be managed by another person, select the Create a separate user account for this subdomain option, and specify the login name and password that will be used for accessing the web space through FTP and publishing web site content. Specify the hard disc quota in the appropriate field in megabytes or leave the Unlimited check box selected. When the specified limit is exceeded, you will not be able to add files to the web space, and editing existing files may corrupt them.
7. If you wish to limit the amount of disk space that can be occupied by web content under this subdomain, type the desired value in megabytes into the Hard disk quota box.
When the specified limit is exceeded, you will not be able to add files to the web space, and editing existing files may corrupt them.
81
8. Leave the Publish site with SiteBuilder check box selected to be able to access SiteBuilder and build web site through your Parallels Plesk Panel interface. When the Publish site with SiteBuilder option is selected, a site will be created in SiteBuilder. All publishing parameters will be set in the paths predefined: for subdomain with Physical hosting /subdomains/SUBDOMAINNAME/httpdocs/sitebuilder; for subdomain with Subdomain on subfolder - /httpdocs/SUBDOMAINNAME/. 9. If you want to enable Microsoft FrontPage support, select the appropriate check box. Enable or disable Remote Microsoft FrontPage authoring by selecting the appropriate option. 10. Specify the programming languages support in the Services group by selecting the required languages. Use select all or clear all to select or clear all of the languages available.
If the ASP.NET support is disabled on the domain for which you are creating subdomain, it is also unavailable on Subdomain on subfolder. In case the ASP.NET support is enabled on the domain, the ASP.NET is available for subdomain created on a subfolder.
11. To allow you to view the information on the number of people visited the site and the pages of the site they viewed, select a module in Web statistics drop-down menu and select the accessible via password protected directory /plesk-stat/webstat check box, if required. This will install the selected statistical software module, which will generate reports and place them into the password protected directory. The subdomain administrator will then be able to access Web statistics at the URL: https://subdomain.domain.com/plesk-stat/webstat using their FTP account login and password.
Note. If you change the FTP credentials, web statistics access credentials do not change. The original login and password specified upon the subdomain creation should always be used for accessing password-protected web statistics directory.
12. Select the Additional write/modify permissions option if this subdomain's web applications will use a file-based database (like Jet) located in the root of httpdocs or httpsdocs folders. Please note that selecting this option might seriously compromise the web site security. 13. To complete the setup, click OK. It may take up to 48 hours for the information on new subdomain to spread in the Domain Name System and become available to the Internet users.
To publish web content to the subdomains web space, follow the instruction presented in the Creating and Publishing Your Site (see page 30) section. To preview the web content published under the subdomain, on your Home page, click Subdomains, and then click the icon corresponding to the subdomain name.
82
Removing Subdomains
To remove a subdomain with its web content:
1. On your Home page, click Subdomains. 2. Select a check box corresponding to the subdomain name that you wish to remove. 3. Click Remove. Confirm removal and click OK.
The subdomain configuration and its web content will be removed from the server.
In this section:
Setting Up a Domain Alias .................................................................................. 83 Modifying Properties of a Domain Alias .............................................................. 84 Removing a Domain Alias ................................................................................... 84
83
4. Select the Synchronize DNS zone with the primary domain check box if you want the domain alias to use the same DNS zone resource records as in primary domain. With this setting, any subsequent changes in resource records of the primary domain's zone will be applied to the DNS zone of this domain alias. 5. Select the Mail check box, if you want e-mail directed at the e-mail addresses under the domain alias to be redirected to the e-mail addresses under your original domain name.
Example: You have an e-mail address [email protected]. You have set up an alias for your domain name, for example, alias.com. If you want to receive mail to your mailbox [email protected] when it is sent to [email protected], select the Mail check box.
6. Select the Web check box. Otherwise, the Web server will not serve the Web content to users coming to your site by typing the domain alias in their browsers. 7. If you use hosting services based on a Linux platform, and you have Java applications installed on your site that you want to make accessible through the domain alias, select the Java Web applications check box. 8. Click OK.
84
85
In this section:
Creating Virtual Directories ................................................................................. 86 Changing Virtual Directory Settings .................................................................... 88 Adding and Removing MIME Types.................................................................... 90 Setting PHP Version for Virtual Directories ......................................................... 92 Removing Virtual Directories............................................................................... 92
86
87
ASP Settings - set specific settings for ASP-based Web applications. If you are using ASP-based applications that cannot operate correctly under data transfer restrictions currently set by IIS, clear the Defined by parent directory check box corresponding to the field you want to change and type in the required number. If you want to enable debugging of ASP applications on the server side, clear the corresponding Defined by parent directory check box and select the Enable ASP server-side script debugging check box. If you want to enable debugging of ASP applications on the client side, clear the corresponding Defined by parent directory check box and select the Enable ASP client-side script debugging check box. Note that if you are trying to change ASP Settings for the root Web directory, the default check box names will be Defined by IIS instead of Defined by parent directory.
88
89
Allow application execution in MTA (multi-threaded apartment) mode - select this check box to allow the application execution in multi-threaded apartment (MTA) mode. Otherwise the application will run in a single-threaded apartment (STA) mode. Using STA, each application pool is executed in a dedicated process. With MTA, several concurrent application pools are executed in one thread which can increase performance in some cases. Use default documents - select this check box to allow the use of default documents for the current web directory. The default document is sent when users access the directory on the Web without a specific file name (for example, using 'http://www.parallels.com' as opposed to 'http://www.parallels.com/index.html'). If this check box is cleared and the Directory browsing check box is selected, the Web server returns a folder listing. If this check box is cleared and the Directory browsing check box is cleared as well, the Web server returns an "Access Forbidden" error message. Default documents search order - specifies the order in which IIS searches for the default document, sending user the first available file it finds. If no match is found, IIS behaves as in the cases when the default content page is disabled. Allow anonymous access - select this check box if you want to make the directory public so that web users could access it without authentication. Require SSL - select this check box to enable SSL-only access to the folder. ASP Settings - set specific settings for ASP-based web applications. If you are using ASP-based applications that cannot operate correctly under data transfer restrictions currently set by IIS, clear the Defined by parent directory check box corresponding to the field you want to change and type in the required number. If you want to enable debugging of ASP applications on the server side, clear the corresponding Defined by parent directory check box and select the Enable ASP server-side script debugging check box. If you want to enable debugging of ASP applications on the client side, clear the corresponding Defined by parent directory check box and select the Enable ASP client-side script debugging check box. Note that if you are trying to change ASP Settings for the root web directory, the default check box names will be Defined by IIS.instead of Defined by parent directory.
90
In this section:
Adding MIME Types ............................................................................................ 91 Changing MIME Types........................................................................................ 91 Removing MIME Types ....................................................................................... 92
91
92
93
To accommodate a personal Web page on your server, allocate a separate Web space and set up an FTP account for publishing:
1. On your Home page, click Web Users. 2. Click Preferences. 3. If you wish to allow execution of scripts embedded in personal web pages, select the Allow the web users scripting check box. 4. Click OK.
The settings you have defined at the step 3 are common for all personal Web pages you might host on your Web server. Therefore, you will not need to perform steps 2 to 4 next time you set up a Web space for a personal Web page.
5. Click Add New Web User. 6. Specify a user name and password that will be used for accessing the Web space through FTP and publishing the Web page.
You can use only lowercase alphanumeric, hyphen and underscore symbols in user name. The user name should begin with an alphabet character. It cannot contain white spaces. The password cannot contain quotation marks, white space, user's login name, and should be between 5 and 14 characters in length.
7. If you wish to limit the amount of disk space that can be occupied by the Web page content, clear the Unlimited check box and type the desired value in megabytes into the Hard disk quota box.
When the specified limit is exceeded, the Web page owner will not be able to add files to his or her Web space.
8. Specify the programming languages that should be supported for the Web page.
For example, if the Web page is written in PHP, select the PHP support check box.
9. Click OK.
Now you can tell your user the FTP account credentials, so that he or she can publish their Web page.
94
In this section:
Changing FTP Password for a Web Page Owner............................................... 94 Allocating More Disk Space to the Web Page Owner ......................................... 94 Removing Web Page Owner's Account .............................................................. 94
95
4. To allow visitors to upload files to the /incoming directory, select the Allow uploading to incoming directory check box. 5. To allow users to create subdirectories in the /incoming directory, select the Allow creation of directories in the incoming directory check box. 6. To allow downloading files from the /incoming directory, select the Allow downloading from the incoming directory check box. 7. To limit the amount of disk space that can be occupied by uploaded files, clear the Unlimited check box corresponding to the Limit disk space in the incoming directory option, and specify the amount in kilobytes.
This is the hard quota: the users will not be able to add more files to the directory when the limit is reached.
8. To limit the number of simultaneous connections to the anonymous FTP server, clear the Unlimited check box corresponding to the Limit number of simultaneous connections option and specify the number of allowed connections. 9. To limit the bandwidth for anonymous FTP connections, clear the Unlimited check box corresponding to the Limit download bandwidth for this virtual FTP domain option and enter the maximum bandwidth in kilobytes per second. 10. Click OK.
96
97
414 Request-URI Too Long. The server is refusing to service the request because the Request-URI is longer than the server is willing to interpret. This rare condition is only likely to occur when a client has improperly converted a POST request to a GET request with long query information, when the client has descended into a URI "black hole" of redirection (e.g., a redirected URI prefix that points to a suffix of itself), or when the server is under attack by a client attempting to exploit security holes present in some servers using fixed-length buffers for reading or manipulating the Request-URI. 415 Unsupported Media Type. The server is refusing to service the request because the entity of the request is in a format not supported by the requested resource for the requested method. 500 Internal Server Error. Could not retrieve the HTML document because of serverconfiguration problems. 501 Not Implemented. The server does not support the functionality required to fulfill the request. This is the appropriate response when the server does not recognize the request method and is not capable of supporting it for any resource. 502 Bad Gateway. The server, while acting as a gateway or proxy, received an invalid response from the upstream server it accessed in attempting to fulfill the request.
To configure Parallels Plesk Panels Web server to show your custom error pages:
1. Switch on support for custom error documents through Parallels Plesk Panel. On your Home page, click Web Hosting Settings, select the Custom error documents check box and click OK. 2. Connect to your FTP account on the Parallels Plesk Panel server, and go to the error_docs directory. 3. Edit or replace the respective files. Be sure to preserve the correct file names:
400 Bad File Request - bad_request.html 401 Unauthorized - unauthorized.html 403 Forbidden/Access denied - forbidden.html 404 Not Found - not_found.html 405 Method Not Allowed - method_not_allowed.html 406 Not Acceptable - not_acceptable.html 407 Proxy Authentication Required proxy_authentication_required.html 412 Precondition Failed - precondition_failed.html 414 Request-URI Too Long - request-uri_too_long.html 415 Unsupported Media Type - unsupported_media_type.html 500 Internal Server Error - internal_server_error.html 501 Not Implemented - not_implemented.html 502 Bad Gateway - bad_gateway.html
98
4. Wait for a few hours till your Web server is restarted. After that, the Web server will start using your error documents.
To configure Parallels Plesk Panels Web server to show custom error pages for a domain:
1. Switch on support for custom error documents through Parallels Plesk Panel. a. Go to Home > Web Hosting Settings. b. Select the Custom error documents check box. c. Click OK. 2. Go to Home > Virtual Directories to see the list of error documents for the root Web directory (error documents located here are used for all domain Web pages). If you want to customize error pages for a certain Web directory, go to that directory. 3. Click Error Documents tab and click the required error document in the list.
To use the default document provided by IIS for this error page, select Default in the Type menu.
99
To use a custom HTML document already located in the error_docs directory on a domain, select File in the Type menu and specify the file name in the Location field. To use a custom HTML document located in directory other than error_docs on a domain, select URL in the Type menu and enter the path to your document in the Location field. The path should be relative to the virtual host root (that is, <vhosts>\<domain>\httpdocs). For example, you have created a file forbidden_403_1.html and saved it in the my_errors directory located in the httpdocs. To use this file as an error document, the following path should be entered in the Location filed: /my_errors/forbidden_403_1.html. Note. You can use both FTP and File Manager to upload your custom error document to the server. By default, all error documents are stored in the /vhosts/your-domain.com/error_docs/ directory (located in C:\InetPub by default).
4. Once the Web server is restarted, it will start using your error documents.
100
In this section:
Adding Resource Records .................................................................................. 101 Modifying Resource Records .............................................................................. 102 Removing Resource Records ............................................................................. 103 Restoring the Original Zone Configuration .......................................................... 103
101
102
3. Click OK.
Usage of serial number format recommended by IETF and RIPE is mandatory for many domains registered in some high-level DNS zones, mostly European ones. If your domain is registered in one of these zones and your registrar refuses your SOA serial number, using serial number format recommended by IETF and RIPE should resolve this issue. Parallels Plesk Panel servers use UNIX timestamp syntax for configuring DNS zones. UNIX timestamp is the number of seconds since January 1, 1970 (Unix Epoch). The 32-bit timestamp will overflow by July 8, 2038. RIPE recommends using YYYYMMDDNN format, where YYYY is year (four digits), MM is month (two digits), DD is day of month (two digits) and NN is version per day (two digits). The YYYYMMDDNN format won't overflow until the year 4294.
103
To change the Start of Authority (SOA) serial number format to YYYYMMDDNN for a domain:
1. Go to Home > DNS Settings (in the Web Site group) > SOA Record. 2. Select the Use serial number format recommended by IETF and RIPE check box.
Note: See the sample of SOA serial number generated with the selected format. If the resulting number is less, than the current zone number, the modification may cause temporary malfunction of DNS for this domain. Zone updates may be invisible to Internet users for some time.
3. Click OK.
To restore the default Start of Authority (SOA) serial number format (UNIX timestamp) for a domain:
1. Go to Home > DNS Settings (in the Web Site group) > SOA Record.
104
2. Clear the Use serial number format recommended by IETF and RIPE check box.
Note: See the sample of SOA serial number generated with the selected format. If the resulting number is less, than the current zone number, the modification may cause temporary malfunction of DNS for this domain. Zone updates may be invisible to Internet users for some time.
3. Click OK.
105
To make the control panel's DNS server act as a secondary name server:
1. Go to Home > DNS Settings (in the Web Site group). 2. Click Switch DNS Service Mode. 3. Click Add Record, specify the IP address of the primary (master) DNS server, and click OK.
To make the control panels DNS server act as a primary for a zone:
1. Go to Home > DNS Settings (in the Web Site group). 2. Click Switch DNS Service Mode. The original resource records for the zone will be restored.
If you host a web site on this server and rely entirely on other machines to perform the Domain Name Service for your site (there are two external name servers - a primary and a secondary), switch off the control panels DNS service for each site served by external name servers.
To switch off the control panels DNS service for a site served by an external name server:
1. Go to Home > DNS Settings (in the Web Site group). 2. Click Switch Off the DNS Service. Turning the DNS service off for the zone will refresh the screen, so that only a list of name servers remains.
Note: The listed name server records have no effect on the system. They are only presented on the screen as clickable links to give you a chance to validate the configuration of the zone maintained on the external authoritative name servers.
106
2. Add the entries pointing to the appropriate name servers that are authoritative for the zone to the list of DNS records: click Add Record, specify a name server, and click OK. Repeat this for each name server you would like to test. 3. The records will appear in the list. 4. Click on the records that you have just created. Parallels Plesk Panel will retrieve the zone file from a remote name server and check the resource records to make sure that domains resources are properly resolved.
The results will be interpreted and displayed on the screen.
107
3. Specify the destination URL: the current Web site address that you would like this domain to point to. 4. Click OK.
CHAPTER 6
In this chapter:
Creating Mailboxes ............................................................................................. 109 Accessing Your Mail............................................................................................ 111 Protecting Mailboxes From Spam ....................................................................... 129 Protecting Mailboxes From Viruses .................................................................... 134 Suspending and Unsuspending Mailboxes ......................................................... 135 Removing Mailboxes ........................................................................................... 136 Setting Up Mail Forwarding to a Single E-mail Address ..................................... 136 Setting Up Mail Forwarding to Multiple E-mail Addresses .................................. 137 Removing Mail Forwarders ................................................................................. 139 Setting Up Automatic Reply ................................................................................ 140 Switching off Automatic Reply............................................................................. 142 Setting Up Site-wide Preferences for Handling Mail to Nonexistent Users ......... 143 Introducing Changes to a Number of Mail Accounts at Once ............................. 144 Maintaining Mailing Lists ..................................................................................... 144
109
Creating Mailboxes
If you wish to have an e-mail address associated with your site, like [email protected], you should create a mailbox.
3. Specify a password that you will use for accessing your mailbox. 4. Make sure that a check mark is present in the Mailbox check box. 5. Click OK.
Now your mailbox is created on the providers server, and you can set up your favorite e-mail program so as to receive and send e-mail messages through your new mailbox.
3. Specify a password that mailbox owner will use for accessing his or her mailbox. 4. Specify the settings related to the appearance of user's control panel, if desired: interface language, theme (skin), the limit on number of characters that can appear on custom buttons placed into the control panel by the mailbox owner. 5. Leave the Allow multiple sessions check box selected to allow the mailbox owner to have several simultaneous sessions in the control panel. 6. Leave the Prevent users from working with the control panel until interface screens are completely loaded check box selected.
This will forbid users from submitting data or performing operations until the control panel is ready to accept them.
110
7. Make sure that a check mark is present in the Mailbox check box. 8. If required, limit the amount of disk space that this mailbox and it's autoresponder attachment files can use. To do this, under Mailbox quota select the Enter size option and type the desired value in kilobytes. 9. Click OK. 10. To allow the mailbox owner configure and use spam filter and antivirus, click Permissions, select the respective check boxes and click OK.
Now, the mailbox is created, and a separate e-mail administration panel has been set up in Parallels Plesk Panel. To enter it, the mailbox owner should visit the URL https://your-domain.com:8443, type his or her e-mail address into the Login box, type the password for the mailbox into the Password box, and then click Login.
111
To access webmail:
In a Web browser, visit the URL webmail.example.com, where example.com is the Internet address of your website. When prompted, specify your full e-mail address as the username (for example, [email protected]), and specify the password that you use for logging in to the Panel.
In this section:
Setting Up Microsoft Office Outlook 2007 ........................................................... 112 Setting Up Microsoft Outlook Express 6 ............................................................. 115 Setting Up Mozilla Thunderbird ........................................................................... 119 Setting Up Apple Mail.......................................................................................... 124
112
113
5. Select the check box Manually configure server settings or additional server types. Click Next.
114
115
116
117
118
119
120
121
122
8. Click Next. 9. In the Incoming User Name box, specify your full e-mail address.
123
10. Click Next. 11. Enter the name by which you would like to refer to this account (for example, Work Account) and click Next.
12. Verify that the information you entered is correct, and click Finish. 13. Click OK to close the Account Settings wizard.
124
2. Open the Adding Mail Account wizard: a. Click Mail > Preferences.... b. Select the Accounts tab. c. Click the + button at the bottom left corner. 3. Enter the account information:
Your full name Your full e-mail address The password you use to log in to the Panel.
125
126
6. Click Continue. 7. (Optional) Specify the incoming mail security options: a. Select the Use Secure Sockets Layer (SSL) check box. b. Select the authentication method.
Keep the default method if you are not sure which to select. Apple Mail displays this setup screen only if a mail server bundled with the Panel supports SSL for the selected account type (POP or IMAP).
127
128
11. Select the Take account online check box and click Create.
129
In this section:
Setting Up Additional Disposable E-mail Addresses for Your Mailbox (E-mail Aliases) ............................................................................................................................ 130 Setting Up Spam Filter ........................................................................................ 130
130
Setting Up Additional Disposable E-mail Addresses for Your Mailbox (E-mail Aliases)
To set up an e-mail alias for a mailbox:
1. Go to Home > Mail Accounts > e-mail address > Add New Mail Alias. 2. Type a desired name and click OK.
The messages addressed to your additional e-mail address (e-mail alias) will get to your mailbox. You can see the list of currently used mail aliases by clicking Show Aliases in the list of mail accounts under the domain.
In this section:
Switching On SpamAssassin Spam Filter ........................................................... 131 Improving Accuracy of Spam Detection .............................................................. 133 Clearing Spam Filter's Database ........................................................................ 133 Switching Off Spam Filter.................................................................................... 134
131
132
4. If you do not want to receive e-mail from specific domains or individual senders, click the Black List tab, and then add the respective entries to the spam filters black list:
To add entries to the black list, click Add Addresses. If you have a list of entries stored in a file, click Browse to specify it, and then click OK. Otherwise, select the From List option, and type the e-mail addresses into the E-mail addresses box. Place each address in one row, or separate addresses with a coma, a colon, or a white space. You can use an asterisk (*) as a substitute for a number of letters, and question mark (?) as a substitute for a single letter. For example: [email protected], [email protected], *@spammers.net. Specifying *@spammers.net will block the entire mail domain spammers.net. To save the entries you added, click OK, then confirm adding, and click OK again. To remove entries from the black list, under the Black List tab, select the entries and click Remove. Confirm removal and click OK.
5. If you want to be sure that you will not miss e-mail from specific senders, click the White List tab, and then add e-mail addresses or entire domains to the spam filters white list:
To add entries to the white list, click Add Addresses. If you have a list of entries stored in a file, click Browse to specify it, and then click OK. Otherwise, select the From List option, and type the e-mail addresses into the E-mail addresses box. Place each address in one row, or separate addresses with a coma, a colon, or a white space. You can use an asterisk (*) as a substitute for a number of letters, and question mark (?) as a substitute for a single letter. For example: [email protected], [email protected], *@mycompany.com. Specifying *@mycompany.com will add to the white list all e-mail addresses that are under the mycompany.com mail domain. To save the entries you added, click OK, then confirm adding, and click OK again. To remove entries from the white list, under the White List tab, select the entries and click Remove. Confirm removal and click OK.
133
3. Once finished with training, you can remove spam e-mails from your mailbox using your e-mail program or webmail interface.
134
In this section:
Switching On Anti-virus Protection ...................................................................... 134 Switching Off Anti-virus Protection ...................................................................... 135
3. Click OK.
135
136
Removing Mailboxes
To remove a mailbox:
1. Go to Home > Mail Accounts. 2. Select a check box corresponding to the mailbox that you wish to remove. 3. Click Remove. Confirm removal and click OK.
4. Select the Redirect check box and type the destination e-mail address to which you would like to forward e-mail. 5. Click Finish.
In this section:
Suspending and Unsuspending Mail Forwarders ............................................... 137
137
3. Enter the desired external e-mail address into the E-mail input box or select one or more of the listed mail accounts using check boxes. 4. Click OK. 5. Click Switch On.
In this section:
Adding and Removing Recipient Addresses ....................................................... 138 Switching off Mail Forwarding to Multiple E-mail Addresses ............................... 139
138
To remove an external e-mail address from the list of mail accounts that receive forwarded e-mail correspondence:
1. Go to Home > Mail Accounts > e-mail address > Mail Group. 2. Select the check box corresponding to the mail account you wish to remove from the list. 3. Click Remove. Confirm removal and click OK.
To add an e-mail address registered on the server to the list of mail accounts that receive forwarded e-mail correspondence:
1. Go to Home > Mail Accounts > e-mail address > Groups. 2. Select the required multiple e-mail forwarder in the Available mail groups list. 3. Click Add >>. 4. Click OK.
An e-mail address registered on your server can also be added to the subscription list using the procedure for adding an external e-mail address (see above).
To remove an e-mail address registered on your server from the list of mail accounts that receive forwarded e-mail correspondence:
1. Go to Home > Mail Accounts > e-mail address > Groups. 2. Select the required multiple e-mail forwarder in the Member of the following mail groups list. 3. Click << Remove.
139
4. Click OK.
An e-mail address registered on your server can also be removed from the subscription list using the procedure for removing an external e-mail address (see above).
140
c. Once finished, click Up Level and proceed to the next step. 3. Click the Add New Autoresponder icon in the Tools group. 4. Configure the automatic reply: a. Type a name for this automatic reply into the Autoresponder name box.
For example, 'Vacation notice'.
b. If you want your incoming mail to be forwarded to another e-mail address while you are away, specify an e-mail address in the Upon automatic response, forward the original message to the specified email box. c. If you want this automatic reply to be sent in reply to any incoming e-mail message, in the Conditions group, leave the always respond option selected. If you wish to automatically reply only to e-mail messages that contain specific words in the message text or subject line, select the appropriate option, and type the word combination in the input box. d. By default, the subject line of incoming e-mail will be inserted into the automated reply. To use a custom subject, type it into the Reply subject input box.
141
e. As your correspondents may not figure out that the message they received from you was an automatic response, they may want to respond to your auto-reply. So, you should specify your e-mail address as the Return address, otherwise, their messages will be directed at the autoresponders address. f. Specify the automatic reply message format (plain text or HTML) and character encoding (UTF-8 is recommended). If you use HTML tags in your auto-reply message, you should select the HTML option. g. Type your message in the Reply with text field. h. To limit the number of automated responses per day to the same e-mail address, enter the desired number in the respective input box under Limits.
The default setting is to respond no more than ten times in one day to the same e-mail address.
i. To reduce mail server load, you may want to limit the number of unique addresses that the autoresponder will remember. To do this, enter the desired number into the Store up to box. j. Attach your files, if needed. To do this, click the Add New Attachment button, select the check box corresponding to the file that you previously uploaded to the attachment storage, and click OK. To remove an attached file from the automatic reply, select the corresponding check box, and click Remove. 5. Click OK. 6. Click the Switch On icon in the Tools group.
142
143
144
5. Click OK.
In this section:
Setting Up a Mailing List ..................................................................................... 145 Subscribing and Unsubscribing Users ................................................................ 146 Posting to Your Mailing List................................................................................. 146 Removing Mailing Lists ....................................................................................... 146
145
5. Specify the password that will be used for administering the mailing list. 6. Specify the mailing list administrators e-mail. 7. Leave the Notify administrator of the mailing list creation check box selected.
You will receive instructions on using and managing the mailing list at the administrators e-mail you specified. Keep that message for your records.
8. Click OK.
Alternately, you can access the mailing list configuration the following way (on Linux hosting):
1. In your Web browser, enter the following URL: http://lists.yourdomain.com/mailman/admin/listname (where your-domain.com is your domain name, and listname is the name of the mailing list (that is, the left part of the mailing lists e-mail address before the @ sign).
A login screen opens.
146
CHAPTER 7
3. Click OK.
Note: When you switch from one statistical program to another, all reports generated by the previously used statistical program are removed from the server.
To find out how many people visited a site, from what countries, and what pages of the site they viewed:
1. Go to Home > Web Statistics. 2. View the statistics for the web pages or files downloaded from or uploaded to specific areas of your site:
To view the statistics for web pages transferred from your site over hypertext transfer protocol (HTTP), click Web Stats. To view the statistics for web pages transferred from your site over secure hypertext transfer protocol (HTTPS), click Web Stats SSL. To view statistics for files transferred over file transfer protocol (FTP), click FTP Stats. To view statistics for files transferred via anonymous FTP, click Anon.FTP Stats. To view the bandwidth usage by months, click Traffic History. To view the bandwidth usage by FTP, Web and mail services in this domain, click Traffic. Note: If you use Webalizer statistical package on your account, you can customize the graphical reports shown by Webalizer. For instructions, refer to the Adjusting Preferences for Web Statistics Presentation by Webalizer section. Alternately, you can view the Web statistics for a site by visiting the following URL: https://your-domain.com/plesk-stat/webstat. When prompted for username and password, specify the credentials for your FTP account.
148
Common operations on reports: To get more details, select the Full Report option from the Report drop-down menu. To adjust the amount of information presented in a report, click Customize, and then modify an existing report template (to do this, click a report template name) or create a new report template (to do this, click Add New Layout). Next, specify how much information you want in each section of the report: select None if you do not want any information, select Summary if you want a concise overview, or select Full if you need a detailed report. Select the Use as default report check box and click OK. To delete a custom report layout, select the check box corresponding to the report layout name and click Remove. To print the report, click Print. A report will open in a separate browser window. Select the File > Print option from the browser's menu to print the report. To send the report by e-mail, type the recipient's e-mail address into the input box located to the right of the Report group and click Send by E-mail. If you are the recipient, then you do not need to specify an e-mail address: the system assumes by default that you are the report recipient and specifies your e-mail address registered with your control panel account. To have the reports automatically generated and delivered by e-mail on a daily, weekly, or monthly basis, click Report Delivery and follow the instructions supplied in the Automating Report Generation and Delivery by E-mail section.
In this chapter:
Adjusting Preferences for Web Statistics Presentation by Webalizer ................. 149 Automating Report Generation and Delivery by E-mail ...................................... 152 Viewing Log Files and Configuring Recycling of Log Files ................................. 153
149
In this section:
Hiding and Unhiding Internal References from Your and Other Sites ................. 150 Grouping and Ungrouping References from Other Sites .................................... 151 Hiding and Unhiding Direct Requests ................................................................. 151
150
Hiding and Unhiding Internal References from Your and Other Sites
To hide the internal references or references from other sites:
1. Go to Home > Web Statistics > Preferences. 2. Click Hide Entries. 3. In the Entry type drop-down box, leave the Referrer value selected. 4. In the Referrer field, type the domain name from which you do not want the referrers shown in web statistics reports.
You can use the '*' wildcard character to specify a part of domain name.
5. Click OK.
To unhide references:
1. Go to Home > Web Statistics > Preferences. 2. Select the check boxes corresponding to the entries you wish to unhide and click Remove. 3. Confirm the operation and click OK.
151
4. Click OK.
152
153
To prevent these log files from growing too large, you should enable automatic cleanup and recycling of log files:
1. Go to Home > Log Manager > Log Rotation and click Switch On in the Tools group. 2. Specify when to recycle log files and how many instances of each log file to store on the server. Also specify whether they should be compressed and sent to an e-mail address after processing. 3. Click OK.
To remove a processed log file from the server, select a corresponding check box, click Remove, confirm removal and click OK.
CHAPTER 8
In this chapter:
Configuring Control Panel for Using FTP Repository.......................................... 155 Backing Up Your Domain .................................................................................... 155 Backing Up Databases (Windows Hosting) ........................................................ 156 Scheduling Backups............................................................................................ 156 Restoring Data From Backup Archives ............................................................... 158 Restoring Databases........................................................................................... 159 Maintaining Your Backup Files Repository ......................................................... 160 Maintaining Database Backup Files Repository (Windows Hosting) .................. 162
155
3. Click OK.
156
4. Click Back Up. The backup process will start and the progress will be shown under the Current Back Up Tasks tab. You can use the Refresh button to update the information on the screen.
When backing up is finished, the backup file will be saved to the repository you selected, and will be accessible either from the FTP server, or from the location Home > Backup Manager.
Scheduling Backups
To schedule backup of your domain (Web site):
1. Go to Home > Backup Manager.
157
2. Click Scheduled Backup Settings. 3. Select the Activate this backup task check box and specify the following:
When and how often to run the backup. Backup file name. Splitting of the backup file. To create a multivolume backup, select the respective check box and specify volume size in megabytes. Note that volume size cannot exceed 4095 megabytes. Location where to store the backup file. Select the repository where you would like to store the backup file. Maximum number of backup files stored in the repository. Type a number if you want to recycle backup files: When this limit is reached, the oldest backup files are removed. E-mail notification on backing up errors. If you want to send an e-mail notice when something goes wrong during backing up, type the e-mail address you need. What data to back up. You can back up only the Web hosting settings, or the Web hosting settings and Web site content.
4. Click OK.
158
4. Click Restore.
In case if any errors or conflicts occur during restoration of data, the wizard will prompt you to select an appropriate resolution. Follow the instructions provided on the screen to complete the wizard. Note: The Overwrite data restoring mode means that all objects will be restored from the backup files regardless of their current presence in the system. The Overwrite mode works as follows: If an object or settings from the backup file are not present in the Parallels Plesk Panel, then they are created or set in the Parallels Plesk Panel. If an object or settings from the backup file are present in the Parallels Plesk Panel, then the object or settings from the backup file replace the corresponding object or settings that are present in the Parallels Plesk Panel. If an object or settings are present in the Parallels Plesk Panel, but are missing from the backup file, then the object or settings currently present in the Parallels Plesk Panel are not changed.
159
Restoring Databases
If the database already exists and you only need to restore its contents:
1. Go to Home > Databases > database name > Database Backup Repository, select the required backup file from the list and click Restore.
If you do not have the backup file on your server, you can upload the backup file to the server repository from your local machine. Refer to Uploading Database Backup Files To Server section for more information.
2. Confirm the restoration by selecting the corresponding check box and click OK.
If you are restoring MS SQL database, there is a possibility that some database users will be orphaned. In order to provide the ability to access and use the database for these users, you need to repair them. Refer to Recovering Orphaned Database Users section for more information.
If the database does not exist and you need to recreate it from scratch:
1. Go to Home > Databases and click Add New Database. 2. Specify the database name, type and server for the database you are restoring.
Note. You can specify a new database name, but you must choose the correct database type: for example, if you are trying to restore a MySQL database, choose MySQL database type.
3. Select the Restore database from backup file check box. 4. Specify the location of the database backup file. You can upload a backup file from your local machine or specify a file located on the server. 5. Provide the default username and password for the restored database. 6. Click OK.
If you are restoring MS SQL database, there is a possibility that some database users will be orphaned. In order to provide the ability to access and use the database for these users, you need to repair them. Refer to Recovering Orphaned Database Users section for more information.
In this section:
Recovering Orphaned Database Users .............................................................. 160
160
In this section:
Uploading Backup Files to Server ....................................................................... 161 Downloading Backup Files from Server .............................................................. 161 Removing Backup Files from Server................................................................... 161
161
3. Select the location where you wish to save the backup file and click Save.
The backup file will be downloaded from the backup repository.
162
In this section:
Uploading Database Backup Files To Server ..................................................... 162 Downloading Database Backup Files From Server ............................................ 163 Removing Database Backup Files From Server ................................................. 163
163
4. Select the location where you want to save the backup file and click Save.
The backup file will be downloaded from the backup repository.
CHAPTER 9
Scheduling Tasks
If you need to run scripts on your site at specific time, use the task scheduler on your provider's server to make the system automatically run the scripts for you.
In this chapter:
Scheduling a Task (Linux Hosting) ..................................................................... 165 Scheduling a Task (Windows Hosting) ............................................................... 166 Suspending and Resuming Execution of Tasks.................................................. 167 Canceling a Task ................................................................................................ 167
Scheduling Tasks
165
5. Specify which command to run. Type it into the Command input box.
For example, if you want to run the backup creation task at the specified time and have the backup file sent to your e-mail, you need to specify the following command in the Command input box: /usr/local/psa/admin/sbin/backupmng
6. Click OK.
166
Scheduling Tasks
4. Specify which command to run. Type it into the Path to executable file input box. If you need to run the command with certain options, type them in the Arguments field.
For example, if you want to run the statistics calculation task to count disc space and see more detailed information for the example.com and example.net domains, you need to specify the following path in the Path to executable file input box: C:\Program Files\Parallels\Plesk\admin\bin\statistics.exe and the following options in the Arguments field: --disk-usage --process-domains=example.com, example.net verbose If you want to run your own php script using the task scheduler, you need to specify the following path in the Path to executable file input box: C:\Program Files (x86)\Parallels\Plesk\Additional\PleskPHP5\php.exe and specify the script location in the Arguments field: C:\Inetpub\vhosts\mydomain.tld\httpdocs\myscript.php
5. Select the appropriate priority in the Task priority field. Task priority can be set to Low, Normal or High. 6. Specify when to run your command by selecting the appropriate check boxes in the Hours, Days of Month, Months or Days of Week fields. 7. Click OK to schedule the task or click Run Now to schedule the task and immediately run it.
Scheduling Tasks
167
Canceling a Task
To cancel a task:
1. On your Home page, click Scheduled Tasks. 2. Select the system user account on whose behalf the task is executed. 3. Select a check box to the left of the task that you want to cancel and click Remove. Confirm removal and click OK.
CHAPTER 10
169
To find out who is connected to your server via FTP, in what directories they currently are and what files they are uploading to or downloading from the server:
1. Go to Home > Active Sessions. 2. Click the FTP Sessions tab. All sessions including yours will be presented and the following details will be displayed:
Type. The type of user who established the session: for users not registered with the control panel. for anonymous FTP users. for domain or web site administrators. for subdomain administrators. for web users (owners of personal web pages without individual domain names). Status. The current status of FTP connection. FTP user login. The login name used for access to FTP account. Domain name. The domain the FTP user is currently connected to. Current location. The directory the FTP user is currently at. File name. The file name being operated on. Speed. Transfer speed in kilobytes. Progress, %. The file transfer operation progress in percentage. IP address. The IP address from which the FTP account is accessed. Logon time. The time lapsed since the moment user logged in. Idle time. The time that user was not doing anything while being connected to the server through FTP.
3. To refresh the list of FTP sessions, click Refresh. 4. To end a session, select the respective check box and click Remove.
170
2. To refresh the list of user sessions, click Refresh. 3. To end a user session, select the respective check box and click Remove, then confirm removal and click OK.
CHAPTER 11
4. Click OK. A new window will open with an area where your interaction with the server's desktop will take place. 5. Log in to the system. By default, Parallels Plesk Panel uses the domain's FTP/Microsoft FrontPage login. You can supply any valid login and password. 6. After logging in to the system you can start working with it as with regular Windows desktop.
172
To finish your Remote Desktop session: Close the browser window with the remote desktop session. This way, the session you had will be detached from your desktop, but it will keep running on the server, so when you log in there next time, you will see the remote desktop in the state you left it, or Select Start > Log off if you want to quit the session permanently (all running sessions consume the server's resources).
CHAPTER 12
Using Help Desk For Requesting Assistance From Your Service Provider
If your service provider offers a Help Desk solution integrated with the control panel, then you can use it to report your problems to your providers technical support staff. Note: If there is no Help Desk link in the navigation pane of your Panel, then it means that Help Desk is not available. In such a case, you should use other means to contact your hosting service provider when you need assistance.
In this chapter:
Submitting a Problem Report to Your Service Provider ...................................... 173 Commenting and Closing Your Trouble Ticket ................................................... 174
2. Type the ticket subject, select the category the issue is related to, and type in the problem description. 3. Click OK.
The ticket is now submitted to the system and sent to your provider. You will be notified by e-mail when the issue is resolved.
174
Using Help Desk For Requesting Assistance From Your Service Provider