The first two letters of vsftpd stand for “very secure” and the program was built to have strongest protection against possible FTP vulnerabilities.
Step One—Install vsftpd
You can quickly install vsftpd on your virtual private server in the command line:
We also need to install the FTP client, so that we can connect to an FTP server:
sudo yum install ftp
Once the files finish downloading, vsftpd will be on your VPS. Generally speaking, the virtual private server is already configured with a reasonable amount of security. However, it does provide access to anonymous users.
Step Two—Configure VSFTP
Once VSFTP is installed, you can adjust the configuration.
Open up the configuration file:
sudo vi /etc/vsftpd/vsftpd.conf
One primary change you need to make is to change the Anonymous_enable to No:
Prior to this change, vsftpd allowed anonymous, unidentified users to access the VPS’s files. This is useful if you are seeking to distribute information widely, but may be considered a serious security issue in most other cases. After that, uncomment the local_enable option, changing it to yes.
Finish up by uncommenting command to chroot_local_user. When this line is set to Yes, all the local users will be jailed within their chroot and will be denied access to any other part of the server.
Finish up by restarting vsftpd:
sudo service vsftpd restart
In order to ensure that vsftpd runs at boot, run chkconfig:
chkconfig vsftpd on
Step Three—Access the FTP server
Once you have installed the FTP server and configured it to your liking, you can now access it.
You can reach an FTP server in the browser by typing the domain name into the address bar and logging in with the appropriate ID. Keep in mind, you will only be able to access the user’s home directory.
Alternatively, you can reach the FTP server through the command line by typing:
Then you can use the word, “exit,” to get out of the FTP shell.
Source : Digitalocean