Part II. Reference
Prev
Next
Part II. Reference
Table of Contents
14. Installing and administering Symbiosis
14.1. Installing Symbiosis running on Debian 7.0 (wheezy)
14.2. Upgrading Symbiosis running on Debian 6.0 (Squeeze)
14.3. Release notes
14.4. Packages installed by Symbiosis
14.5. Systems administration and Symbiosis
15. Website Configuration
15.1. Getting started
15.2. CGI scripts
15.3. Statistics
15.4. Testing new websites
15.5. Displaying the same content under two domains
15.6. Redirecting to the preferred website domain
15.7. Custom Apache configuration
15.8. SSL Configuration
15.9. Logging
15.10. Configuration layout
16. Email Configuration
16.1. Port Configuration
16.2. Accepting email for a domain
16.3. Email for Unix users.
16.4. Password files
16.5. Suffixes
16.6. Enforcing mailbox size with quotas
16.7. Server-side filtering using Sieve
16.8. Forward files
16.9. Vacation messages
16.10. Email alias lists
16.11. Customising
SpamAssassin
16.12. Filtering mail using headers
16.13. Using real-time blacklists from Spamhaus
16.14. Manually blocking incoming mail from specific sources
16.15. Installing Roundcube webmail
16.16. Configuration layout
17. XMPP Reference
18. Setting up domain based multi-user FTP/FTPS Access
19. Firewall Reference
19.1. Allowing and denying access to services
19.2. Predefined special rules
19.3. An example firewall
19.4. Allowing web applications to make remote connections
19.5. Making custom additions to your firewall
19.6. Blocking abusive remote hosts
19.7. Whitelisting "known-good" IP addresses
19.8. Disabling the firewall
19.9. Configuration layout
20. DNS Hosting
20.1. Example DNS records
20.2. Adding a wild-card hostname record
20.3. Moving domains between machines using the Bytemark content DNS service
20.4. Configuring SPF and DKIM records
21. Scheduled tasks
21.1. Testing the crontab
21.2. System scheduled tasks
22. Database configuration
22.1. Enabling remote
MySQL
access
23. Backup Reference
23.1. Configuration
23.2. Advanced Configuration
23.3. Listing Backup Contents
23.4. Restoring From Backup
23.5. Recovery From Earlier Backups
23.6. Offsite backup storage
23.7. Recovering from the offsite backup storage
23.8. Trimming the size of the local backups.
24. Service Monitoring