1 Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name Service (DNS) based Virtual Domains let you host more than one site on a single IP. With HTTP 1.1 protocol, and a common extension to HTTP 1.0, server can identify the name with which it is being addressed. IP based A multiple IP system can be configured to start an HTTP listener on a specific IP. This way it can host n number of sites depending on number of IPs assigned to it. Note: This functionality is supported by Netscape Navigator 2.0 or higher, as well as Internet Explorer 3.0 or higher. Pramati HTTP Server supports "name based virtual hosting" and IP multi homing. Virtual Hosts can be used to create multiple document roots on a single machine. By resolving the name-space, multiple "sites" can run on a single machine in an isolated manner. Hosting multiple applications on a single HTTP Server under different domain names, say, and www. def.com allows easier maintenance and better protection through isolation of files. Before setting up virtual hosting on Pramati HTTP Server, you must: Set up the DNS services Register any new domain names that will be used Creating a DNS based Virtual Host using web-config.xml Virtual Hosts are registered with Pramati HTTP server through a configuration file, webconfig.xml and web-cache.xml, located at <install_dir>/server/nodes/<node_name>/ config/. Add an entry in this XML configuration file for every Virtual Host configured. A sample entry is shown below: <virtual-host name ="" doc-root="" > <index-page/> <static-content-headers/> <web-log> <log-on>true</log-on>
2 124 Pramati Server 3.5 Administration Guide <dir-path>$node_dir\abc</dir-path> </web-log> <access-constraint/> <application> <name/> <allow-dir-listing/> </application> <alias> <alias-name/> <alias-directory/> </alias> </virtual-host> In case a Virtual Host is configured in the web-config.xml, and cache-enabled is set to true, the user should make the following entry in the web-cache.xml apart from the entry already available there: <virtual-host name="virtual host name"> <max-cache-size-mb>5</max-cache-size-mb> <max-cacheable-file-size-kb>1000</max-cacheable-file-size-kb> <victim-selection>lru</victim-selection> <cache-rule name="static-cache-rule" request-uri="static-cache-rule"> <custom-invalidator class-name="com.pramati.web.dyncache.staticcacheinvalidator" poll-interval="2" /> </cache-rule> </virtual-host> Definitions of configuration tags Following is a brief description of the various tags and attributes used to configure a Virtual Host: Table 1: Configuration Tags Tags Attributes Description <virtual-host> <index-pages> <static-content-headers> name doc-root This is the root tag for Virtual Hosts. This specifies the domain name by which you want to set up the Virtual Host. DNS should be able to resolve this hostname entry. This specifies the Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html. The default page that would get served if a request is made for a domain in case the URL requested does not include one. This defines the static content headers.
3 CHAPTER 13 Working With Virtual Hosts on Pramati Server 125 Table 1: Configuration Tags <web-log> <log-on> <dir-path> <access-constraint> <application> <name> <allow-dir-listing> <alias> <alias-name> <alias-directory> This is the root tag for web logs. This tag helps enable or disable the web logging at the run time. This tag provides the directory location where the web log will be saved. This tag provides the IP based access control. This is the root tag for application properties. This is the name of the application This defines whether directory listing is to be enabled. This is the root tag for alias properties. This is the alias name This specifies the directory where alias names are stored. A sample code for using configuration tags: <virtual-host name="www.abc.com" doc-root="c:\vh_docroot1"> <index-pages name="index.htm,index.html,pramatiwelcomepage"/> <error-pages > <error code="302" url="/error/302"/> <error code="404" url="/error/404"/> </error-pages> <web-log> <log-on>true</log-on> <dir-path>$node_dir\logs\web</dir-path> </web-log> <alias> <alias-name/> <alias-directory/> </alias> <allow-dir-listing>true</allow-dir-listing> <application> <name>webcontests</name> <masked-entities> <masked-dir-list> <masked-dir>meta-inf</masked-dir> <masked-dir>web-inf</masked-dir> </masked-dir-list> <masked-file-list> <masked-file>.jsp</masked-file> <masked-file>.java</masked-file> </masked-file-list> </masked-entities>
4 126 Pramati Server 3.5 Administration Guide </application> <static-content-headers> <entry> <entry-identifier>static_content_header_2</entry-identifier> <url-pattern>/*</url-pattern> <header> <name>name</name> <value>value</value> </header> </entry> </static-content-headers> <access-constraint> <entry> <entry-identifier>access_constraint_1</entry-identifier> <allow-access>true</allow-access> <url-pattern>/*</url-pattern> <client-ip-address> </client-ip-address> </entry> </access-constraint> </virtual-host> For the entries to take effect, you must restart the Server or node. Creating a DNS based Virtual Host using Console To create a Virtual Host using the Console: 1 Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the Hosts already configured, and the global properties of the web server. 2 Click Add under Host section. This displays the screen to add a Virtual Host (see the figure given above) 3 Provide here the following details: Table 2: Details needed for creating a DNS based Virtual Host Fields Description Name The domain name by which you want to set up the Virtual Host. For example VirTest. DNS should be able to resolve this hostname entry. Document Root The Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. For example c:/virtest/doc This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html Clicking Save brings you back to the main page of web server, displaying the added Virtual Host.
5 CHAPTER 13 Working With Virtual Hosts on Pramati Server 127 Adding a Virtual Host The Settings option Clicking Settings in the Host section displays a summary of the following properties for the Virtual Host: Basic Header Page Settings Cache URL Web Logs Configuring Basic Properties for a Virtual Host The Basic Properties section displays details about: Table 3: Basic Properties of the Host Fields Name Document Root Alias Description Name of the Virtual Host The path where all the applications will be deployed and served for the Host. Alias name for the Virtual Host. You can have more than one alias for a single host.
6 128 Pramati Server 3.5 Administration Guide Editing the Basic Properties To modify the basic properties information, click the Edit icon provided. This displays the following screen: Editing Basic Properties of a Virtual Host You can change the document root for the Virtual Host, and also add an Alias name for the same. To add an Alias name, click Add. On the screen that comes up, add an Alias by providing the Name and Document root for the same.
7 CHAPTER 13 Working With Virtual Hosts on Pramati Server 129 Adding an Alias for a Virtual Host Clicking Save adds the Alias to the Basic properties and takes you back to the Basic Properties screen. You can add or delete more Alias names for the Virtual Host. Configuring Header Properties for a Virtual Host HTTP requests and HTTP responses use headers to send information about the HTTP message. The Header Properties section displays details about the Custom Headers and Content Expiration. Table 4: Header Properties of the Host Fields Custom Headers Content Expiration Description Any custom header that a user wants in response for a static page. The time for expiration of a static page content. Editing the Header Properties To edit the header properties information, click the edit icon. This displays the following screen:
8 130 Pramati Server 3.5 Administration Guide Editing Header Properties of a Virtual Host Using the above screen, you can specify the custom header, and set the content expiration time for the Virtual Host. Adding a Custom Header property Click Add to create a new Custom Header. On the screen that is displayed, provide the Name and Value for the same
9 CHAPTER 13 Working With Virtual Hosts on Pramati Server 131 Adding Custom Header Properties for a Virtual Host Clicking Save adds the Custom Header to the Header properties. You can add or delete more Custom Headers for the Virtual Host. Setting Content Expiration Content expiration can be set for a static page. Table 5: Setting Content Expiration Fields Description Immediately If set as Immediately, the static page will not get cached by the browser or the intermediary proxy. After (specified) Minutes Setting the number of minutes removes the cache content after the time specified. Set the Content Expiration time for the Virtual Host and click Save to go back to the summary screen. Configuring Page Settings for a Virtual Host The Page Settings section displays details about the configured Welcome and Error pages for the Virtual Host. Editing Page Settings To modify the Page Setting properties, click Edit. This displays the following screen:
10 132 Pramati Server 3.5 Administration Guide Configuring Page Settings for a Virtual Host Using the above screen, you can specify the Welcome and Error pages. Adding a Welcome Page To add a Welcome page, click Add. On the screen that comes up, provide the Page name for the same.
11 CHAPTER 13 Working With Virtual Hosts on Pramati Server 133 Adding a Welcome Page Adding an Error Page To add an Error page for the Virtual Host, click Add, and select the Type of error to be displayed from the drop down list provided. The types of Error pages that can be selected are: Table 6: Types of Error Pages Error Type Description 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 412 Precondition Failed 414 Request-URL Too Long 415 Unsupported Media Type 500 Internal Server Error 501 Not Implemented
12 134 Pramati Server 3.5 Administration Guide Table 6: Types of Error Pages Error Type Description 502 Bad Gateway Specify the Page URL, say as /error/errorpage.htm, and click Save to go back to the summary screen. The field is mandatory, and if you try to save without providing a value for it, you will be shown an error message in the Status panel. Adding an Error Page Configuring Cache Properties for a Virtual Host Pramati Web Server provides rule based caching for both static and dynamic contents for performance enhancements. Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the configured Hosts. Select 'Settings' against the Virtual Host that you want to configure the cache for, and scroll down on the page to the Cache section. You can view here the following details: Maximum Cache Size. The default maximum cache size for the Virtual Host is 5MB. Maximum Cacheable File Size. The default maximum cacheable file size is 1000Kb. Victimization Algorithm. The Victimization Algorithm used is the Least Recently Used (LRU). List of Default caching rules. These rules apply for all the context roots. By default there is only one default cache rule present which represents caching of the static content.
13 CHAPTER 13 Working With Virtual Hosts on Pramati Server 135 The list of caching rules for the application. These are by default not there and will be displayed as and when you create a new caching rule for the context root. Click Settings to edit the cache settings. This takes you to the page where you can modify the Maximum cache size. It also gives you the link to add a new cache/avoid-cache/application-basedinvalidation-rule. Please click the link for adding new rules. Read more about caching in the Technical Reference Guide. The details displayed for the Default Application Cache rules are: Viewing Cache details Table 7: Application Cache Rule details Fields Description Name Displays the name for the new cache rule. Type Displays the cache type as Cache, Avoid Cache or Application Based Invalidation. URL Displays the URL pattern for which the rule applies to. HTTP Method Displays the HTTP method. Pramati Server 3.5 supports only the GET and PUT methods. Status Displays the status as either true or false. True signifies that the rule is active. Comment Displays the comment provided for the rule.
14 136 Pramati Server 3.5 Administration Guide Editing Cache Properties To modify the Cache properties, click Edit. This displays the following screen: Editing Cache Properties Using the above screen, you can edit information for the Maximum Cache size and the Maximum Cacheable File size. You can add cache rules at both the Host and application levels, as also clear cache as and when required. The Algorithm used is set as Least Recently Used by default. Adding a Cache Rule Clicking +Add or Click here to add rule displays the Step 1: Add Cache Rule screen:
15 CHAPTER 13 Working With Virtual Hosts on Pramati Server 137 Adding a Cache Rule A caching rule is used to specify which page is to be cached. Provide here the following details: Table 8: Adding a Cache Rule Fields Description Name A unique name for the new cache rule which will be used to identify the rule by the person who defines the rule. This is a mandatory field and not providing a value for it displays an error message in the Status panel. Type Select the cache type as Cache, Avoid Cache or Application Based Invalidation, from the drop down list provided. Comment A comment on the cache rule. Context Root The Context Root of the application. The application does not neccessarily need to have been deployed. If a request is made for that context root, the rule will be evaluated for that request. If the context root is not specified, the rule is considered to be a default rule which will be evaluated for all the requests, whatever be the context root of the request. These kind of rules should be carefully used as they may lower the overall performance of the web server. Click Next to define the properties for the new cache rule.
16 138 Pramati Server 3.5 Administration Guide Step 2 of Adding a Cache Rule Provide here the following details: Table 9: Adding a Cache Rule - Step 2 Fields Type URL HTTP Method Description This non-editable field displays the Cache Type selected in the previous screen. The URL where the cache rule will be stored. This is a mandatory field. The HTTP Method as either GET or POST. Use Input Parameters There are two values for this parameter - all and specified. By default if no value for the field is specified, it is all. Select whether you wish to use all the input parameters in the key or only the specified input-parameters in the key. In case you select No for an input parameter under the Use Condition option, the particular parameter will not be considered. Add Before The rule before which you want to add the new rule. In case nothing is selected, the rule will be added to the end. The order of rules is very important. You must define the rules keeping in the mind the performance, as a rule may be getting evaluated by the request where it need not be. Also there may be logic based on the order of the rules.the order of rules matters only between cache-rule and avoid-cache-rules. They can be merged and constitute the same list of rules for the evaluation. A rule which is significantly more frequently used than the other ones, should be kept higher in the order.
17 CHAPTER 13 Working With Virtual Hosts on Pramati Server 139 Table 9: Adding a Cache Rule - Step 2 Fields Description Expiry Input (Query String) Parameters Cookie (Query String) Settings Header (Query String) Settings Configuring Cache Expiry The cached content must be removed when it is not acceptable. For this, you can define three types of invalidations: 1 Time based 2 Custom based (based on invalidation rule) 3 Application based The expiry time of the Customer Application based cache rules. The Name, Value and Condition of the Input Parameters. Specify whether you wish to use the condition or not. You can add more Input Parameters using the button provided. The Name, Value and Condition of the Cookie Settings. Specify whether you wish to use the condition or not. You can add more Cookie Settings using the button provided. The Name, Value and Condition of the Header Settings. Specify whether you wish to use the condition or not. You can add more Header Settings using the button provided. The rules for invalidation must be defined in close association of caching rule for which the request is cached. Time based Time based expiry for a cached content is defined as part of caching rule where the After field value needs to be specified in minutes, hours or days using the drop down list provided. This is the time after which the content is invalidated after the response is cached. This value should be specified carefully as you must be aware whether the stale content is affordable or not, and if it is, for how much time. A typical usage may be a system where data is updated every day. Here the pages can be cached for expiry of 24 hrs starting from the time the data is updated the first time. Custom based This type of invalidation rule specifies an invalidation mechanism where you are given the flexibility to write your own logic for invalidation of the cached content. This interface provides a customizable means to invalidate the cache. Using this option, you can configure the Cache to expire based on the invalidation rule set earlier. Table 10: Configuring Custom based Cache Expiry Fields Options Description Class Check after Properties Enter here the implementation class. Specify here the time period after which a check has to be made for the expiry of the Cache rule. Specify here the following properties of the Custom based cache.
18 140 Pramati Server 3.5 Administration Guide Table 10: Configuring Custom based Cache Expiry Fields Options Description Name Value Enter here a name for the new cache rule Provide a value for the parameter Application based This type of invalidation is meant for a typical application design where the application has two fronts. A view front which consists of view pages and an update front which consists of pages which exclusively update the data of the cached view pages. That is, there is no other interaction with the data except for the application server. There are two things involved in these kind of invalidations: Defining an application based invalidation rule. Associating cache rule with the application based invalidation rule. Using this option, you can configure application based expiry of the Cache. Table 11: Configuring Application based Cache Expiry Fields Options Description Select Rule Input Mapping Type Source Maps To Value Select the application based invalidation rule from the drop down list provided. Specify which parameter (say, order_no for orderdetails.jsp) of the cached request should match which parameter (say, orderid for updateorder.jsp) of updation page. The first is referred as source and the other as target. Source can be "source-input-param", "source-cookie" or "source-request-header" and target can be "target-input-param", "target-cookie", "target-request-header" or an absolute value say "002" in our example. It must be kept in mind that: If source is "source-input-param" target has to be "target-input-param" or an absolute value. if source is "source-cookie" target has to be "target-cookie" or an absolute value. if source is "source-request-header" target has to be "target-request-header" or an absolute value. Select here the Input Mapping type from the drop-down list as Input Parameter, Cookie, or Request Header. Enter here the name of the source parameter. Select here whether the Mapping has to be set to a target parameter or some literal value. Provide a name for the target parameter or literal value based on the value of Maps To field. One application based invalidation rule can be referred by more than one cache rules. For example if there are two pages say orderlines.jsp and orderdetails.jsp,both depend on some common
19 CHAPTER 13 Working With Virtual Hosts on Pramati Server 141 JSP say updateorder.jsp, then we need to define an application based invalidation rule which is satisfied by updateorder.jsp and as and when a request comes to this rule the concerned cached content for orderdetails.jsp and orderlines.jsp will be invalidated. Configuring Input Parameters This mapping may be specified for a rule if the response varies based upon the presence of an inputparameter or the value of it. Provide the following details for Input Parameters: Table 12: Configuring Input Parameters Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the input parameter. Select the cache type from the drop down list provided. This parameter has three values - mandatory, disallowed and optional. It means that the input-parameter has to be present for the page to be cached. It means that the input-parameter must not be present for the page to be cached. This input-parameter is optional, but if it is present, its value must match the value in the rule for the input-parameter. Select whether a particular condition is to be used or not. Configuring Cookies This mapping may be specified for a rule if the response varies based upon the presence of a cookie or the value of it. Provide the following details for configuring cookies: Table 13: Configuring Cookies Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the cookie. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the cookie has to be present for the page to be cached. It means that the cookie must not be present for the page to be cached. This cookie is optional, but if it is present, its value must match the value in the rule for the cookie. Default value is optional. Select whether a particular condition is to be used or not.
20 142 Pramati Server 3.5 Administration Guide Configuring Input, Cookie and Header strings Configuring Headers This mapping may be specified for a rule if the response varies based upon the presence of a requestheader or its value. Provide the following details for configuring Headers: Table 14: Configuring Headers Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new request-header. This is an optional value for the request-header. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the request-header has to be present for the page to be cached. It means that the request-header must not be present for the page to be cached. It means that this request-header is optional, but if it is present, its value must match the value in the rule for the request-header. Default value is optional. Select whether a particular condition is to be used or not. Remember, for using this option, the Use Input Parameter field must be selected as specified.
21 CHAPTER 13 Working With Virtual Hosts on Pramati Server 143 Configuring URL Properties for a Virtual Host The URL Properties section displays details about masked directory/extensions that have been defined for applications defined on the Virtual Host. Editing URL Properties To view the URLs for a deployed application, you first need to deploy an application. If no application is deployed, the following screen is displayed: URL Properties of a Virtual Host To modify the URL properties information, click Edit. This displays the following screen:
22 144 Pramati Server 3.5 Administration Guide Editing URL Properties of a Virtual Host Using the above screen, you can select whether the Directory listing is to be enabled or disabled, select the Context Root, and add Masked Directories and Extensions. Adding Masked Directories If a directory is specified as masked, the contents of the directory are hidden, and any requests on them are not served. To add Masked Directories, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Directory.
23 CHAPTER 13 Working With Virtual Hosts on Pramati Server 145 Adding a Masked Directory Clicking Save adds the Masked Directory and takes you back to the URL Properties screen. Adding Masked Extensions If a file extension is masked, files of that type cannot be accessed. To add Masked Extensions, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Extension. Clicking Save adds the Masked Extension and takes you back to the URL Properties screen. Deleting a Virtual Host To delete a Virtual Host, select it using the checkbox provided and click Delete. Note: You cannot delete the Default Virtual Host. Configuring web logs for a Virtual Host The web logs are used to maintain the logged records of the activities on the created Virtual Host. If the logging activity is disabled, the logs of activities being performed cannot be maintained. Clicking Edit in this section takes you to the following screen:
24 146 Pramati Server 3.5 Administration Guide Configuring web log properties Using this screen, you can specify the directory path where the log file would be generated, and enable or disable logging. By default, logging is enabled. Configuring global properties for a web server You can set the following global properties for a web server: Denial of Service attacks MIME Types Connections Socket Properties Read more about setting the global properties for a web server in Configuring Pramati Web Server. Deploying an application on a Virtual Host In an application deployment, the WAR may be deployed on a Virtual Host. To select the Virtual Host: Open the Deploy Tool and select the application to be deployed.
25 CHAPTER 13 Working With Virtual Hosts on Pramati Server 147 Click on Web Properties node to open the General properties panel. A list of Virtual Hosts is displayed at the bottom of the screen. Select the Virtual Host you need. Deploying an application on a Virtual Host If you select Default, the content is deployed on default Virtual Host. If no Virtual Host is configured, deployment is only on the default host. Accessing information from a Virtual Host When the Server receives a request, it checks for the name by which it is addressed. There are two possibilities: the name corresponds to one of the configured Virtual Hosts, and the Server tries to serve the content from the appropriate document root (public or secure) for that Virtual Host. the name is not found in the configuration file, and the request is served out of the default Virtual Host. Current limitations for Virtual Hosts Virtual Hosts run on the same port as the default host. No separate port number configuration is provided for them.
How-to: Single Sign-On Document version: 1.02 nirva systems firstname.lastname@example.org nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) communication for a standalone environment... 2 Import the Process Server WAS root SSL certificate into
Deploying Intellicus Portal on IBM WebSphere Intellicus Web-based Reporting Suite Version 4.5 Enterprise Professional Smart Developer Smart Viewer Intellicus Technologies email@example.com www.intellicus.com
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
Securing Adobe connect Server and CQ Server To Enable SSL on Connect Server and CQ server (Index) Configure custom.ini File Uncomment the SSL TAGs in Server.xml file. Configure the Four components of connect
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 1996-2012 Internet Software Sciences Welcome to the Web+Center Installation and Configuration guide. This document
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
44 Working with WebSphere 4.0 This chapter is for developers who are familiar with WebSphere Application Enterprise Server, version 4.0 (WAS 4.0) and would like to deploy their applications using WAS 4.0.
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Diagnostic Manager Publication Date: September 04, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
Directory Manager Segmented Installation Background Directory Manager is a Web-based utility that allows an authorized user to update other user s information in the Active Directory. The Directory Manager
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...
HRC Advanced Citrix Troubleshooting Guide Advanced Troubleshooting procedures: 1. Add https://mobile.hrc.army.mil to Internet Explorer s trusted sites list. Click on Tools Internet Options Security. Click
Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Using IIS and UltraDev Locally page 1 IIS Web Server Installation IIS Web Server is the web server provided by Microsoft for platforms running the various versions of the Windows Operating system. It is
App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...
USING MANAGED PRINTER LISTS for the HP Universal Print Driver with HP Web Jetadmin CONTENTS Introduction... 2 Operation overview... 2 Assumptions... 2 Exporting device Groups as XML Managed Printer Lists...
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Information Security Practice II Installation and set-up of Web Server and FTP accounts Installation of IIS Setup of laboratory 3 virtual machines are required in this laboratory: 1. Win2003 the web server
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 Document Scope This document describes the DHCP enhancements in SonicOS Enhanced 4.0, including DHCP server options and DHCP server persistence.
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE BEFORE YOU BEGIN This document assumes some things: You are using ConsoleWorks 4.6 or later (required), it s currently running, and a browser displaying
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
PaperCut Payment Gateway Module CyberSource Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and testing the
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Virtual Code Authentication User Guide for Administrators Virtual Code Authentication - User Guide for Administrators Document No.: 05-001 2001-2015 All rights reserved. Under copyright laws, this document
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying
Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) December 25 th, 2015 V.1.0 Prepared by: Manoj Karunarathne MCT, MCSA,
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,