Ftp access docroot best practice

I have installed WS 7.0, created a dir /docroot with owner:group websrvd:webservd. What is a "good" way to send files to /docroot via
ftp? I only ftp over my local lan; access is not allowed outside of the local
lan. Should I set up a new user in group webservd with ftp access?
OR how do I set up a user for example dummy:staff to be able to
write files to /docroot? Thank you, I am trying to figure out what are
the best practices.
Thanks in advance for any assistance.
Mark.

Irek,
This is off subject but I wanted to talk to you about a previous issue that you where having in [This Thread|http://forum.java.sun.com/thread.jspa?messageID=9751068#9751068] .
ireneusz.tarnowski wrote in another thread:
Hi,
I've noticed many failures in my error log. I use SJSWS 6.1u7. Some example are below:
[04/Jul/2007:11:29:11] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:32:40] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:32:40] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:32:41] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:34:53] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:34:53] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:35:45] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)
[04/Jul/2007:11:37:21] failure ( 9310): HTTP3068: Error receiving request from 156.17.73.28 (Connection refused)The IP address which is noticed in error line is a router of some NAT in my corporation. I want to tune my webserver and receive all request from this address.
Any idea?
IrekDid you ever figure out how to fix this issue with the Sun Webserver 6.1 that you had back in July last year with the "Error receiving request from <ip address> (Connection refused)" messages? We are getting the same errors on our Sun ONE / Sun Java System webserver version 6.1 SP6. Please let me know.

Similar Messages

  • Anywhere Access interface best practice

    Hello,
    We are setting up Anywhere Access on Windows 2012 AD/DNS with the following configuration;
    Ethernet 1:
    IP: private
    Subnet: 255.255.255.0
    Gateway: Firewall/Router with private IP address 
    DNS: Ethernet 1 IP address
    Ethernet 2:
    IP: public (remote.domain.com - Anywhere 
    Subnet 255.255.255.248
    Gateway: DSL modem with public IP address
    DNS: Ethernet 1 IP address
    Questions:
    1. Considering only one gateway can be defined for multiple interfaces, from the best practices point of view please advise which one should be the gateway out of two underlined gateways:
    Firewall/Router with private IP address or
    DSL modem with public IP address
    2. Considering Ethernet 2 is configured with public IP addresses, please also advise if DNS for Ethernet 2 is correct or it should be public DNS. 
    Thanks.

    Generally the private interface. This one may help.
    Configuring and Customizing Remote Web Access on Windows
    Server 2012 R2 Essentials
    or try them over here.
    https://social.technet.microsoft.com/Forums/windowsserver/en-US/home?forum=winserveressentials&filter=alltypes%2Cnoreplies&sort=lastpostdesc
    Regards, Dave Patrick ....
    Microsoft Certified Professional
    Microsoft MVP [Windows]
    Disclaimer: This posting is provided "AS IS" with no warranties or guarantees , and confers no rights.

  • Access Connections best practice

    I like the idea of having Lenovo Access Connection change the appropriate settings depending on you network location. Like turning off wifi when you are cabled.
    Althoguh I often find it to be creating more problems than gains.
    Any generel best practice using this tool?
    Regards, Lars.

    Hi!
    Use non overlapping channel 1-6-11 on 3
    consecutive AP's.
    eg.
    AP1-Channel 1
    AP2-Channel 6
    AP3-Channel 11
    AP4-Channel 1
    AP5-Channel 6
    plzz take a look:
    http://www.cisco.com/en/US/products/hw/wirele
    ss/ps441/products_tech_note09186a00800a86d7.shtml#nonover
    HTH
    -Jai

  • Access Point Best Practice

    I have 5 access points, what is the best practice about the configuration of the channel of the access points, all access in the same channel, all access in different channel ? (802.11b/g).
    Thanks

    Hi!
    Use non overlapping channel 1-6-11 on 3
    consecutive AP's.
    eg.
    AP1-Channel 1
    AP2-Channel 6
    AP3-Channel 11
    AP4-Channel 1
    AP5-Channel 6
    plzz take a look:
    http://www.cisco.com/en/US/products/hw/wirele
    ss/ps441/products_tech_note09186a00800a86d7.shtml#nonover
    HTH
    -Jai

  • ACE access-list best practice

    Hi,
    I was wondering what was the best practice for the access-list's on the Cisco ACE.
    Should we permit Any in the access-list, and classify the traffic in the class-maps as seen in a brief example:
    access-list ANY line 10 extended permit ip any any
    access-list EXCH-DMZ-INTERNET-OUT line 10 extended permit tcp 10.134.10.0 255.255.254.0 any eq www
    access-list EXCH-DMZ-INTERNET-OUT line 15 extended permit tcp 10.134.10.0 255.255.254.0 any eq https
    class-map match-all EXCH-DMZ-INTERNET-OUT
      2 match access-list EXCH-DMZ-INTERNET-OUT
    policy-map multi-match EXCH-DMZ-OUT
    class EXCH-DMZ-INTERNET-OUT
        nat dynamic 1 vlan 1001
    interface vlan 756
      description VLAN 744 EXCH DMZ BE
      ip address 10.134.11.253 255.255.255.0
      alias 10.134.11.254 255.255.255.0
      peer ip address 10.134.11.252 255.255.255.0
    access-group input ANY
      service-policy input EXCH-DMZ-OUT
    Or should we also also the access-list for the access-group in the interface as seen bellow:
    access-list EXCH-DMZ-INTERNET-OUT line 10 extended permit tcp 10.134.10.0 255.255.254.0 any eq www
    access-list EXCH-DMZ-INTERNET-OUT line 15 extended permit tcp 10.134.10.0 255.255.254.0 any eq https
    class-map match-all EXCH-DMZ-INTERNET-OUT
      2 match access-list EXCH-DMZ-INTERNET-OUT
    policy-map multi-match EXCH-DMZ-OUT
    class EXCH-DMZ-INTERNET-OUT
        nat dynamic 1 vlan 1001
    interface vlan 756
      description VLAN 744 EXCH DMZ BE
      ip address 10.134.11.253 255.255.255.0
      alias 10.134.11.254 255.255.255.0
      peer ip address 10.134.11.252 255.255.255.0
      access-group input EXCH-DMZ-INTERNET-OUT
      service-policy input EXCH-DMZ-OUT
    Regards,

    Hello,
    I don't think you'll find a "best practice" for this scenario.  It really just comes down to meeting your needs.  The first example you have a far and away the more commonly seen configuration, as you'll only NAT the traffic matching the EXCH-DMZ-INTERNET-OUT, but all other traffic will be forwarded by the ACE whether it is load balanced or not.  The second way will only allow NAT'd traffic, and deny all others.
    Hope this helps,
    Sean

  • Seaching for Best Practice links that work

    Hi,
    past few years I have been able to access SAP Best Practices documents like SAP Best Practices SAP Best Practices for CP and Wholesale Industries
    (this one still works and guides me to the building block and process overview documents!).
    Recently any link I can find to SAP Industry or Baseline Best Practices ends up with a dead link. See for example trying to get from here SAP Best Practices Baseline packages – SAP Help Portal Page
    to Localized for Netherlands V1.607 SAP Best Practices package further below on that page, results in screen shot attached. I have seen that in many more examples (different countries, or in Industry Best Practice Packages instead of Country Baseline packages....)
    Does any know whether and how SAP redesigned their access to Best Practices documents (Configuration Guides, eCatts, Scenario Process Overviews etc.?
    Thanks for your reply.
    Thijs

    Hi, Thijs,
    There is currently a problem with Best Practices on the Help Portal.  On the home page of the portal (http://help.sap.com/) there is a message that reads "Stay Tuned - There are temporary problems when accessing some content types, for example PDF documents or Best Practices. We are working on a solution."
    Our Wholesale Distribution industry group does not manage the Help Portal pages, so, unfortunately, I don't know the status of the problem or when it might be resolved.
    Lynn

  • _h and _v Content, Best Practice

    Hello
    while i am working on the same content of an article as _h and _v, i noticed in _h i added 7 pages while in the _v there are 6 pages,
    and i relised this is not good to get the perfect result.
    so i add one more page in the _v, and started to change the size of the images so the contents goes to page 7.
    i was able to do that, and then i noticed that the 14th subtitle in the _h is in the 5th page and the same subtitle in the _v is in the 6the page.
    is this normal? or do i have to math the content so the reader when rotatiting will get the same result so he can folow reading.
    regards

    Hi Greg:
    To access the Best Practices using Business Content  do the following:
    1.-Open this URL: http://help.sap.com/bp_bw370/html/index.htm
    2.-Click on the "Preconfigured Scenarios" link.
    3.-Click on the Links to navigate on the different available scenarios and to see the documents you can download (Scenario Documentation, Scenario Installation Guide and Building Blocks).
    *Financials
    -- Financial Accounting Analysis
    -- Controlling Analysis
    -- CO-PA Analysis
    -- Cost Center Planning
    -- Reporting Financials EhP3
    *Customer Relationship Management
    -- Sales Analysis
    -- Cross-Functional Analysis: Financial and Sales Data
    -- Booking Billing Backlog Analysis
    -- Sales Planning
    -- Scheduling Agreements Analysis
    -- CRM Analytics
    *Supply Chain Management
    -- Purchasing Analysis
    -- Manufacturing Analysis
    -- Inventory Analysis
    -- Demand Planning Analysis
    -- Resource and Operation Data Analysis
    *Product Lifecycle Management
    -- Project System - Controlling and Dates
    *Human Capital Management
    -- Cross-Application Time Sheet
    -- Time Management - Time and Labor
    -- Personnel Development - Qualifications
    -- Travel Management - Travel Expenses
    *General
    -- Data Mining - ABC Classification
    Regards,
    Francisco Milán.

  • Business Content Best Practice

    How do we go about evaluating Business Content for a project? Any tips/tricks/best practice used when dealing with Business Content?
    What are the dos and don't of Business Content?

    Hi Greg:
    To access the Best Practices using Business Content  do the following:
    1.-Open this URL: http://help.sap.com/bp_bw370/html/index.htm
    2.-Click on the "Preconfigured Scenarios" link.
    3.-Click on the Links to navigate on the different available scenarios and to see the documents you can download (Scenario Documentation, Scenario Installation Guide and Building Blocks).
    *Financials
    -- Financial Accounting Analysis
    -- Controlling Analysis
    -- CO-PA Analysis
    -- Cost Center Planning
    -- Reporting Financials EhP3
    *Customer Relationship Management
    -- Sales Analysis
    -- Cross-Functional Analysis: Financial and Sales Data
    -- Booking Billing Backlog Analysis
    -- Sales Planning
    -- Scheduling Agreements Analysis
    -- CRM Analytics
    *Supply Chain Management
    -- Purchasing Analysis
    -- Manufacturing Analysis
    -- Inventory Analysis
    -- Demand Planning Analysis
    -- Resource and Operation Data Analysis
    *Product Lifecycle Management
    -- Project System - Controlling and Dates
    *Human Capital Management
    -- Cross-Application Time Sheet
    -- Time Management - Time and Labor
    -- Personnel Development - Qualifications
    -- Travel Management - Travel Expenses
    *General
    -- Data Mining - ABC Classification
    Regards,
    Francisco Milán.

  • FTP best practice with XI

    What is the best practice in using FTP adapter which is in vendor network ( external) ? If the connection parameter is set as permanent, or file per transfer, whats the major difference in performance and security? The vendor FTP has uname and pwd for each interfaces from SAP system. If I use file per transfer, everytime the data is sent, FTP takes it in a directory using uname and pwd access. Will it affect the performance ?
    Thanks
    Ricky

    > In per file transfer,  is there any way to avoid
    > checking the uname and pwd always so that performance
    > can be increased.
    Dont think this can be done. If you do not want User Id and password check the FTP server should allow Anonymous Login and then in the File Adapter you can select Anonymous Login.
    And what was the slight performance
    > issue you were talking about in per file transfer
    As the File Adapter will connect to the FTP server every time it polls in the case of the sender file adapter or every time it wants to transfer a file  in the case of a receiver file adapter , there will be a slight issue when comapred to permanenet ( dont think we will even be able to see the difference in the runtime )  . But dont think it will be an issue at all.
    Regards
    Bhavesh

  • Looking for some best practice regarding Content Administrator access

    Hi. I am looking for some best practice or rule of thumb from SAP or from different companies how they address Portal Content Administrator access in Production environment. Basically, our company is implementing portal to work with SAP BW.  We are on SP 9. Basically, I am trying to determine if we should have 1-2 Portal Content Administrator in Production with 24/7 access or we should limit them from NOT having this.  Can you share with me some ideas of what is right? and what is not?
    Should we have access in Production? Or Should we have this access but limited? By the way, our users are allow to Publish BI reports/queries into Production.

    Hello Michael,
    Refer to this guide about managing initial content in portal.
    https://www.sdn.sap.com/irj/sdn/go/portal/prtroot/docs/library/uuid/00bfbf7c-7aa1-2910-6b9e-94f4b1d320e1
    Regards
    Deb
    [Reward Points for helpful answers]

  • Best practice for external but secure access to internal data?

    We need external customers/vendors/partners to access some of our company data (view/add/edit).  It’s not so easy as to segment out those databases/tables/records from other existing (and put separate database(s) in the DMZ where our server is).  Our
    current solution is to have a 1433 hole from web server into our database server.  The user credentials are not in any sort of web.config but rather compiled in our DLLs, and that SQL login has read/write access to a very limited number of databases.
    Our security group says this is still not secure, but how else are we to do it?  Even if a web service, there still has to be a hole in somewhere.  Any standard best practice for this?
    Thanks.

    Security is mainly about mitigation rather than 100% secure, "We have unknown unknowns". The component needs to talk to SQL Server. You could continue to use http to talk to SQL Server, perhaps even get SOAP Transactions working but personally
    I'd have more worries about using such a 'less trodden' path since that is exactly the areas where more security problems are discovered. I don't know about your specific design issues so there might be even more ways to mitigate the risk but in general you're
    using a DMZ as a decent way to mitigate risk. I would recommend asking your security team what they'd deem acceptable.
    http://pauliom.wordpress.com

  • What is best practice in FR ? Original Report access to Users or Snapshot

    Hi,
    can any one pls. let me know on what is the best practice in FR ? I need to give access to original reports to my users or the snapshot access only ? Users are not happy with snapshot access mainly during the closing time. What are the complications if i give access to original reports ? I'm using Batch scheduler, but users are unable to see the data some times. What will be the reason for this ?
    Thanks,
    PVR

    Hi,
    There are certainly many variables to have a look at. Server sizes is one concern, report size is another. Giving access to original reports is fine as long as concurrency and heavy usage don't take the servers down. That said, the reports that will be given access to their originals shouldn't run for 10 minutes for each query. Having 10 user connected to such reports will probably take reporting services down which makes the entire system useless. These types of reports should better be scheduled and shown as snapshots. However, some of these reports might have time-dependent information which needs to be refreshed at query time. In this case you could either give the access to original reports or schedule the reports to run say every 2 hours.
    Cheers,
    Alp

  • Best practice for select access to users

    Not sure if this is the correct forum to post, if not then let me know where should I post.
    From my understanding this is the best forum to ask this questions.
    Are you aware of any "Best Practice Document" to grant select accesses to users on databases. These users are developers which select data out of database for the investigation and application bug fix.
    From time to time user want more and more access to different tables so that they can do investigation properly.
    Let me know if there exists a best practice document around this space.
    Asked in this forum as this is related to PL/SQL access.

    Welcome to the forum!
    Whenever you post provide your 4 digit Oracle version.
    >
    Are you aware of any "Best Practice Document" to grant select accesses to users on databases. These users are developers which select data out of database for the investigation and application bug fix.
    From time to time user want more and more access to different tables so that they can do investigation properly.
    Let me know if there exists a best practice document around this space.
    >
    There are many best practices documents about various aspects of security for Oracle DBs but none are specific to developers doing invenstigation.
    Here is the main page for Oracles' OPAC white papers about security.
    http://www.oracletechnetwork-ap.com/topics/201207-Security/resources_whitepaper.cfm
    Take a look at the ones on 'Oracle Identity Management' and on 'Developers and Identity Services'.
    http://www.dbspecialists.com/files/presentations/implementing_oracle_11g_enterprise_user_security.pdf
    This paper by Database Specialists shows how to use Oracle Identity Management to limit access to users such as developers through the use of roles. It shows some examples of users using their own account but having limited privileges based on the role they are given.
    http://www.dbspecialists.com/files/presentations/implementing_oracle_11g_enterprise_user_security.pdf
    And this Oracle White Paper, 'Oracle Database Security Checklist', is a more basic security doc that discusses the entire range of security issues that should be considered for an Oracle Database.
    http://www.oracle.com/technetwork/database/security/twp-security-checklist-database-1-132870.pdf
    You don't mention what environment (PROD/QA/TEST/DEV) you are even talking about or whether the access is to deal with emergency issues or general reproduction and fixing of bugs.
    Many sites create special READONLY roles, eg. READ_ONLY_APP1, and then grant privileges to those roles for tables/objects that application uses. Then that role can be granted to users that need privileges for that application and can be revoked when they no longer need it.
    Some sites prefer creating special READONLY users that have those read only roles. If a user needs access the DBA changes the password and provides the account info to the user. When the user has completed their duties the DBA resets the password to something no one else knows.
    Those special users have auditing on them and the user using them is responsible for all activity recorded in the logs during the time the user has access to that account.
    In general you grant the minimum privileges needed and revoke them when they are no longer needed; generally through the use of roles.
    >
    Asked in this forum as this is related to PL/SQL access.
    >
    Please explain that. Your question was about 'access to different tables'. How does PL/SQL access fit into that?
    The important reason for the difference is that access is easily controlled thru the use of roles but in named PL/SQL blocks roles are disabled. So those special roles and accounts mentioned above are well-suited to allowing developers to query data but are not well-suited if the user needs to execute PL/SQL code belonging to another schema (the app schema).

  • Direct access to document image via webservice - best practice?

    Howdy,
       Rookie "Post-er".... be gentle.  I've searched and I've read... didn't find this.  I've not taken training.  I may be way off base.
    We have multiple manufacturing sites around the world with local Operator Qualification appls that want to access the enterprise SAP DMS mfg document images (stop dual maint - enterprise & local)....  without dependency on SAP ECC being up.  If we can pass them DMS meta-data via near-realtime msgs (including the document image access "key" data); then we would assume they can direclty access KPRO for the document image as needed.
    Would this be considered a "best practice"?   Webservice controlled (access only from known source).
    Is PHIO-ID the only dynamic variable needed (based on info below I found in WIKI)?
    *Alternatively, the url as below can be used to retrieve the documents from the content server[*http://<Server_Name>:<Port_No>/archive.dll?get&pVersion=<Version_No>&contRep=<Content_Rep>&docId=<PHIO_ID|http://<Server_Name>:<Port_No>/archive.dll?get&pVersion=<Version_No>&contRep=<Content_Rep>&docId=<PHIO_ID|\||]>
                <Server_Name> = Content server (IP address or name of content server)
                <Port_No> = Port No. of the server
                <Version_No> = Version No of content server (Transaction OACT)
                <Content_Rep> = content category of the server (Transaction OAC0)
                <PHIO_ID> = PHIO Id derived for each upload method

    Hello,
    This reply posted to help others who may refer this in the future.
    As Amit Maheshwari mentioned, it is possible to give access to a document stored in the Content Server even when the partner system(ECC) is down.
    As per your requirement, you want to access documents when the ECC System is down, but the content server is up and running.
    The following steps can be of help to you:
    1 - Create a program, that will create URL for the documents stored in the content server and send the URL to the external system.(Refer: FM- SDOK_PHIO_GET_URL_FOR_GET)
    The URL refers to the public IP of the Internet Server on which the content server is hosted on.
    2 - With this URL and few configurations on the Content Server (to allow access from external systems) you can fetch the file from the content server to the external system. Access privileges may vary based on your security settings.
    Note: Since the ECC system will be down, creating URL for all the documents can be a bottleneck.
    Probable Solution: While adding a document to the ECC system, the respective URL can be created and transferred to the external system along with the master details and stored there.
    This can be undertaken if it is really important for the business, as it will increase the load for the external system. The solution can be modified based on the business requirement.
    Thank you,
    Regards,
    Tamilnesan G

  • Need best practice when accessing an ucm content after being transferred.

    Hi All,
    I have a business requirement where I need to auto-transfer the content to another UCM when this content expires in the source UCM.
    This content needs to be deleted after it spends a certain duration in the target UCM.
    Can anybody advise me the best practice to do this in the Oracle UCM?
    I have set up an expiration date and trying to auto Replicate the content to the target UCM once the content reaches the expiration date.
    I am not aware of the best practice to access the content when it is in the target UCM?
    Any help in this case would be greatly appreciated.
    Regards,
    Ashwin

    SR,
    Unfortunately temp tables are the way to go. In Apex we call them collections (not the same as PL/SQL collections) and there's an API for working with them. In other words, the majority of the leg work has already been done for you. You don't have to create the tables or worry about tying data to different sessions. Start you learning here:
    http://download.oracle.com/docs/cd/E14373_01/appdev.32/e11838/advnc.htm#BABFFJJJ
    Regards,
    Dan
    http://danielmcghan.us
    http://sourceforge.net/projects/tapigen
    http://sourceforge.net/projects/plrecur
    You can reward this reply by marking it as either Helpful or Correct ;-)

Maybe you are looking for

  • Printing Word document as pdf files whilst  retaining active internal links

    Hi, I have a Word file (Word 2004 for Mac Version 11.3.5) with active links to various sections within the document. However, when I print this as a pdf file all the links become inactive. Is anyone aware of a way to prevent this? Kind regards, Damon

  • The GCU expiration date portion of the MyBB page is GONE....again

    I know you guys did this during Black Friday and it came back soon after that. But it's MIA once again. What's the deal with that?

  • Problem with HTTP load balancing

    Hello Experts I have a problem when i do loadbalancing for links like http://1.1.1.1/site/home where 1.1.1.1 is the VIP address (i got http not found), while it is working fine when the link is http://1.1.1.1, the link is working fine on the real ser

  • Problems installing Netweaver Developer Workplace 2004

    Dear Netweaver experts, I have severe problems installing Netweaver Developer Workplace 2004 on windows XP. I used sapinst for installing the Java sytem (Menue Java System->Oracle->Custom Installation). After running through 34 of the 35 phases durin

  • Only upper case in geocoding servie response?

    when calling the geocoding service, I always get the the result in upper case (i.e. http://elocation.oracle.com/geocoder/gcdemo.jsp?country=DE&match_mode=DEFAULT&address=ctive+media+NEUHAUS%0D%0Asteinstr.+75%0D%0A81667+m%FCnchen Is it possible to get