Working With Virtual Hosts on Pramati Server

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Working With Virtual Hosts on Pramati Server"

Transcription

1 Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name Service (DNS) based Virtual Domains let you host more than one site on a single IP. With HTTP 1.1 protocol, and a common extension to HTTP 1.0, server can identify the name with which it is being addressed. IP based A multiple IP system can be configured to start an HTTP listener on a specific IP. This way it can host n number of sites depending on number of IPs assigned to it. Note: This functionality is supported by Netscape Navigator 2.0 or higher, as well as Internet Explorer 3.0 or higher. Pramati HTTP Server supports "name based virtual hosting" and IP multi homing. Virtual Hosts can be used to create multiple document roots on a single machine. By resolving the name-space, multiple "sites" can run on a single machine in an isolated manner. Hosting multiple applications on a single HTTP Server under different domain names, say, and www. def.com allows easier maintenance and better protection through isolation of files. Before setting up virtual hosting on Pramati HTTP Server, you must: Set up the DNS services Register any new domain names that will be used Creating a DNS based Virtual Host using web-config.xml Virtual Hosts are registered with Pramati HTTP server through a configuration file, webconfig.xml and web-cache.xml, located at <install_dir>/server/nodes/<node_name>/ config/. Add an entry in this XML configuration file for every Virtual Host configured. A sample entry is shown below: <virtual-host name ="" doc-root="" > <index-page/> <static-content-headers/> <web-log> <log-on>true</log-on>

2 124 Pramati Server 3.5 Administration Guide <dir-path>$node_dir\abc</dir-path> </web-log> <access-constraint/> <application> <name/> <allow-dir-listing/> </application> <alias> <alias-name/> <alias-directory/> </alias> </virtual-host> In case a Virtual Host is configured in the web-config.xml, and cache-enabled is set to true, the user should make the following entry in the web-cache.xml apart from the entry already available there: <virtual-host name="virtual host name"> <max-cache-size-mb>5</max-cache-size-mb> <max-cacheable-file-size-kb>1000</max-cacheable-file-size-kb> <victim-selection>lru</victim-selection> <cache-rule name="static-cache-rule" request-uri="static-cache-rule"> <custom-invalidator class-name="com.pramati.web.dyncache.staticcacheinvalidator" poll-interval="2" /> </cache-rule> </virtual-host> Definitions of configuration tags Following is a brief description of the various tags and attributes used to configure a Virtual Host: Table 1: Configuration Tags Tags Attributes Description <virtual-host> <index-pages> <static-content-headers> name doc-root This is the root tag for Virtual Hosts. This specifies the domain name by which you want to set up the Virtual Host. DNS should be able to resolve this hostname entry. This specifies the Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html. The default page that would get served if a request is made for a domain in case the URL requested does not include one. This defines the static content headers.

3 CHAPTER 13 Working With Virtual Hosts on Pramati Server 125 Table 1: Configuration Tags <web-log> <log-on> <dir-path> <access-constraint> <application> <name> <allow-dir-listing> <alias> <alias-name> <alias-directory> This is the root tag for web logs. This tag helps enable or disable the web logging at the run time. This tag provides the directory location where the web log will be saved. This tag provides the IP based access control. This is the root tag for application properties. This is the name of the application This defines whether directory listing is to be enabled. This is the root tag for alias properties. This is the alias name This specifies the directory where alias names are stored. A sample code for using configuration tags: <virtual-host name=" doc-root="c:\vh_docroot1"> <index-pages name="index.htm,index.html,pramatiwelcomepage"/> <error-pages > <error code="302" url="/error/302"/> <error code="404" url="/error/404"/> </error-pages> <web-log> <log-on>true</log-on> <dir-path>$node_dir\logs\web</dir-path> </web-log> <alias> <alias-name/> <alias-directory/> </alias> <allow-dir-listing>true</allow-dir-listing> <application> <name>webcontests</name> <masked-entities> <masked-dir-list> <masked-dir>meta-inf</masked-dir> <masked-dir>web-inf</masked-dir> </masked-dir-list> <masked-file-list> <masked-file>.jsp</masked-file> <masked-file>.java</masked-file> </masked-file-list> </masked-entities>

4 126 Pramati Server 3.5 Administration Guide </application> <static-content-headers> <entry> <entry-identifier>static_content_header_2</entry-identifier> <url-pattern>/*</url-pattern> <header> <name>name</name> <value>value</value> </header> </entry> </static-content-headers> <access-constraint> <entry> <entry-identifier>access_constraint_1</entry-identifier> <allow-access>true</allow-access> <url-pattern>/*</url-pattern> <client-ip-address> </client-ip-address> </entry> </access-constraint> </virtual-host> For the entries to take effect, you must restart the Server or node. Creating a DNS based Virtual Host using Console To create a Virtual Host using the Console: 1 Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the Hosts already configured, and the global properties of the web server. 2 Click Add under Host section. This displays the screen to add a Virtual Host (see the figure given above) 3 Provide here the following details: Table 2: Details needed for creating a DNS based Virtual Host Fields Description Name The domain name by which you want to set up the Virtual Host. For example VirTest. DNS should be able to resolve this hostname entry. Document Root The Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. For example c:/virtest/doc This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html Clicking Save brings you back to the main page of web server, displaying the added Virtual Host.

5 CHAPTER 13 Working With Virtual Hosts on Pramati Server 127 Adding a Virtual Host The Settings option Clicking Settings in the Host section displays a summary of the following properties for the Virtual Host: Basic Header Page Settings Cache URL Web Logs Configuring Basic Properties for a Virtual Host The Basic Properties section displays details about: Table 3: Basic Properties of the Host Fields Name Document Root Alias Description Name of the Virtual Host The path where all the applications will be deployed and served for the Host. Alias name for the Virtual Host. You can have more than one alias for a single host.

6 128 Pramati Server 3.5 Administration Guide Editing the Basic Properties To modify the basic properties information, click the Edit icon provided. This displays the following screen: Editing Basic Properties of a Virtual Host You can change the document root for the Virtual Host, and also add an Alias name for the same. To add an Alias name, click Add. On the screen that comes up, add an Alias by providing the Name and Document root for the same.

7 CHAPTER 13 Working With Virtual Hosts on Pramati Server 129 Adding an Alias for a Virtual Host Clicking Save adds the Alias to the Basic properties and takes you back to the Basic Properties screen. You can add or delete more Alias names for the Virtual Host. Configuring Header Properties for a Virtual Host HTTP requests and HTTP responses use headers to send information about the HTTP message. The Header Properties section displays details about the Custom Headers and Content Expiration. Table 4: Header Properties of the Host Fields Custom Headers Content Expiration Description Any custom header that a user wants in response for a static page. The time for expiration of a static page content. Editing the Header Properties To edit the header properties information, click the edit icon. This displays the following screen:

8 130 Pramati Server 3.5 Administration Guide Editing Header Properties of a Virtual Host Using the above screen, you can specify the custom header, and set the content expiration time for the Virtual Host. Adding a Custom Header property Click Add to create a new Custom Header. On the screen that is displayed, provide the Name and Value for the same

9 CHAPTER 13 Working With Virtual Hosts on Pramati Server 131 Adding Custom Header Properties for a Virtual Host Clicking Save adds the Custom Header to the Header properties. You can add or delete more Custom Headers for the Virtual Host. Setting Content Expiration Content expiration can be set for a static page. Table 5: Setting Content Expiration Fields Description Immediately If set as Immediately, the static page will not get cached by the browser or the intermediary proxy. After (specified) Minutes Setting the number of minutes removes the cache content after the time specified. Set the Content Expiration time for the Virtual Host and click Save to go back to the summary screen. Configuring Page Settings for a Virtual Host The Page Settings section displays details about the configured Welcome and Error pages for the Virtual Host. Editing Page Settings To modify the Page Setting properties, click Edit. This displays the following screen:

10 132 Pramati Server 3.5 Administration Guide Configuring Page Settings for a Virtual Host Using the above screen, you can specify the Welcome and Error pages. Adding a Welcome Page To add a Welcome page, click Add. On the screen that comes up, provide the Page name for the same.

11 CHAPTER 13 Working With Virtual Hosts on Pramati Server 133 Adding a Welcome Page Adding an Error Page To add an Error page for the Virtual Host, click Add, and select the Type of error to be displayed from the drop down list provided. The types of Error pages that can be selected are: Table 6: Types of Error Pages Error Type Description 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 412 Precondition Failed 414 Request-URL Too Long 415 Unsupported Media Type 500 Internal Server Error 501 Not Implemented

12 134 Pramati Server 3.5 Administration Guide Table 6: Types of Error Pages Error Type Description 502 Bad Gateway Specify the Page URL, say as /error/errorpage.htm, and click Save to go back to the summary screen. The field is mandatory, and if you try to save without providing a value for it, you will be shown an error message in the Status panel. Adding an Error Page Configuring Cache Properties for a Virtual Host Pramati Web Server provides rule based caching for both static and dynamic contents for performance enhancements. Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the configured Hosts. Select 'Settings' against the Virtual Host that you want to configure the cache for, and scroll down on the page to the Cache section. You can view here the following details: Maximum Cache Size. The default maximum cache size for the Virtual Host is 5MB. Maximum Cacheable File Size. The default maximum cacheable file size is 1000Kb. Victimization Algorithm. The Victimization Algorithm used is the Least Recently Used (LRU). List of Default caching rules. These rules apply for all the context roots. By default there is only one default cache rule present which represents caching of the static content.

13 CHAPTER 13 Working With Virtual Hosts on Pramati Server 135 The list of caching rules for the application. These are by default not there and will be displayed as and when you create a new caching rule for the context root. Click Settings to edit the cache settings. This takes you to the page where you can modify the Maximum cache size. It also gives you the link to add a new cache/avoid-cache/application-basedinvalidation-rule. Please click the link for adding new rules. Read more about caching in the Technical Reference Guide. The details displayed for the Default Application Cache rules are: Viewing Cache details Table 7: Application Cache Rule details Fields Description Name Displays the name for the new cache rule. Type Displays the cache type as Cache, Avoid Cache or Application Based Invalidation. URL Displays the URL pattern for which the rule applies to. HTTP Method Displays the HTTP method. Pramati Server 3.5 supports only the GET and PUT methods. Status Displays the status as either true or false. True signifies that the rule is active. Comment Displays the comment provided for the rule.

14 136 Pramati Server 3.5 Administration Guide Editing Cache Properties To modify the Cache properties, click Edit. This displays the following screen: Editing Cache Properties Using the above screen, you can edit information for the Maximum Cache size and the Maximum Cacheable File size. You can add cache rules at both the Host and application levels, as also clear cache as and when required. The Algorithm used is set as Least Recently Used by default. Adding a Cache Rule Clicking +Add or Click here to add rule displays the Step 1: Add Cache Rule screen:

15 CHAPTER 13 Working With Virtual Hosts on Pramati Server 137 Adding a Cache Rule A caching rule is used to specify which page is to be cached. Provide here the following details: Table 8: Adding a Cache Rule Fields Description Name A unique name for the new cache rule which will be used to identify the rule by the person who defines the rule. This is a mandatory field and not providing a value for it displays an error message in the Status panel. Type Select the cache type as Cache, Avoid Cache or Application Based Invalidation, from the drop down list provided. Comment A comment on the cache rule. Context Root The Context Root of the application. The application does not neccessarily need to have been deployed. If a request is made for that context root, the rule will be evaluated for that request. If the context root is not specified, the rule is considered to be a default rule which will be evaluated for all the requests, whatever be the context root of the request. These kind of rules should be carefully used as they may lower the overall performance of the web server. Click Next to define the properties for the new cache rule.

16 138 Pramati Server 3.5 Administration Guide Step 2 of Adding a Cache Rule Provide here the following details: Table 9: Adding a Cache Rule - Step 2 Fields Type URL HTTP Method Description This non-editable field displays the Cache Type selected in the previous screen. The URL where the cache rule will be stored. This is a mandatory field. The HTTP Method as either GET or POST. Use Input Parameters There are two values for this parameter - all and specified. By default if no value for the field is specified, it is all. Select whether you wish to use all the input parameters in the key or only the specified input-parameters in the key. In case you select No for an input parameter under the Use Condition option, the particular parameter will not be considered. Add Before The rule before which you want to add the new rule. In case nothing is selected, the rule will be added to the end. The order of rules is very important. You must define the rules keeping in the mind the performance, as a rule may be getting evaluated by the request where it need not be. Also there may be logic based on the order of the rules.the order of rules matters only between cache-rule and avoid-cache-rules. They can be merged and constitute the same list of rules for the evaluation. A rule which is significantly more frequently used than the other ones, should be kept higher in the order.

17 CHAPTER 13 Working With Virtual Hosts on Pramati Server 139 Table 9: Adding a Cache Rule - Step 2 Fields Description Expiry Input (Query String) Parameters Cookie (Query String) Settings Header (Query String) Settings Configuring Cache Expiry The cached content must be removed when it is not acceptable. For this, you can define three types of invalidations: 1 Time based 2 Custom based (based on invalidation rule) 3 Application based The expiry time of the Customer Application based cache rules. The Name, Value and Condition of the Input Parameters. Specify whether you wish to use the condition or not. You can add more Input Parameters using the button provided. The Name, Value and Condition of the Cookie Settings. Specify whether you wish to use the condition or not. You can add more Cookie Settings using the button provided. The Name, Value and Condition of the Header Settings. Specify whether you wish to use the condition or not. You can add more Header Settings using the button provided. The rules for invalidation must be defined in close association of caching rule for which the request is cached. Time based Time based expiry for a cached content is defined as part of caching rule where the After field value needs to be specified in minutes, hours or days using the drop down list provided. This is the time after which the content is invalidated after the response is cached. This value should be specified carefully as you must be aware whether the stale content is affordable or not, and if it is, for how much time. A typical usage may be a system where data is updated every day. Here the pages can be cached for expiry of 24 hrs starting from the time the data is updated the first time. Custom based This type of invalidation rule specifies an invalidation mechanism where you are given the flexibility to write your own logic for invalidation of the cached content. This interface provides a customizable means to invalidate the cache. Using this option, you can configure the Cache to expire based on the invalidation rule set earlier. Table 10: Configuring Custom based Cache Expiry Fields Options Description Class Check after Properties Enter here the implementation class. Specify here the time period after which a check has to be made for the expiry of the Cache rule. Specify here the following properties of the Custom based cache.

18 140 Pramati Server 3.5 Administration Guide Table 10: Configuring Custom based Cache Expiry Fields Options Description Name Value Enter here a name for the new cache rule Provide a value for the parameter Application based This type of invalidation is meant for a typical application design where the application has two fronts. A view front which consists of view pages and an update front which consists of pages which exclusively update the data of the cached view pages. That is, there is no other interaction with the data except for the application server. There are two things involved in these kind of invalidations: Defining an application based invalidation rule. Associating cache rule with the application based invalidation rule. Using this option, you can configure application based expiry of the Cache. Table 11: Configuring Application based Cache Expiry Fields Options Description Select Rule Input Mapping Type Source Maps To Value Select the application based invalidation rule from the drop down list provided. Specify which parameter (say, order_no for orderdetails.jsp) of the cached request should match which parameter (say, orderid for updateorder.jsp) of updation page. The first is referred as source and the other as target. Source can be "source-input-param", "source-cookie" or "source-request-header" and target can be "target-input-param", "target-cookie", "target-request-header" or an absolute value say "002" in our example. It must be kept in mind that: If source is "source-input-param" target has to be "target-input-param" or an absolute value. if source is "source-cookie" target has to be "target-cookie" or an absolute value. if source is "source-request-header" target has to be "target-request-header" or an absolute value. Select here the Input Mapping type from the drop-down list as Input Parameter, Cookie, or Request Header. Enter here the name of the source parameter. Select here whether the Mapping has to be set to a target parameter or some literal value. Provide a name for the target parameter or literal value based on the value of Maps To field. One application based invalidation rule can be referred by more than one cache rules. For example if there are two pages say orderlines.jsp and orderdetails.jsp,both depend on some common

19 CHAPTER 13 Working With Virtual Hosts on Pramati Server 141 JSP say updateorder.jsp, then we need to define an application based invalidation rule which is satisfied by updateorder.jsp and as and when a request comes to this rule the concerned cached content for orderdetails.jsp and orderlines.jsp will be invalidated. Configuring Input Parameters This mapping may be specified for a rule if the response varies based upon the presence of an inputparameter or the value of it. Provide the following details for Input Parameters: Table 12: Configuring Input Parameters Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the input parameter. Select the cache type from the drop down list provided. This parameter has three values - mandatory, disallowed and optional. It means that the input-parameter has to be present for the page to be cached. It means that the input-parameter must not be present for the page to be cached. This input-parameter is optional, but if it is present, its value must match the value in the rule for the input-parameter. Select whether a particular condition is to be used or not. Configuring Cookies This mapping may be specified for a rule if the response varies based upon the presence of a cookie or the value of it. Provide the following details for configuring cookies: Table 13: Configuring Cookies Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the cookie. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the cookie has to be present for the page to be cached. It means that the cookie must not be present for the page to be cached. This cookie is optional, but if it is present, its value must match the value in the rule for the cookie. Default value is optional. Select whether a particular condition is to be used or not.

20 142 Pramati Server 3.5 Administration Guide Configuring Input, Cookie and Header strings Configuring Headers This mapping may be specified for a rule if the response varies based upon the presence of a requestheader or its value. Provide the following details for configuring Headers: Table 14: Configuring Headers Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new request-header. This is an optional value for the request-header. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the request-header has to be present for the page to be cached. It means that the request-header must not be present for the page to be cached. It means that this request-header is optional, but if it is present, its value must match the value in the rule for the request-header. Default value is optional. Select whether a particular condition is to be used or not. Remember, for using this option, the Use Input Parameter field must be selected as specified.

21 CHAPTER 13 Working With Virtual Hosts on Pramati Server 143 Configuring URL Properties for a Virtual Host The URL Properties section displays details about masked directory/extensions that have been defined for applications defined on the Virtual Host. Editing URL Properties To view the URLs for a deployed application, you first need to deploy an application. If no application is deployed, the following screen is displayed: URL Properties of a Virtual Host To modify the URL properties information, click Edit. This displays the following screen:

22 144 Pramati Server 3.5 Administration Guide Editing URL Properties of a Virtual Host Using the above screen, you can select whether the Directory listing is to be enabled or disabled, select the Context Root, and add Masked Directories and Extensions. Adding Masked Directories If a directory is specified as masked, the contents of the directory are hidden, and any requests on them are not served. To add Masked Directories, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Directory.

23 CHAPTER 13 Working With Virtual Hosts on Pramati Server 145 Adding a Masked Directory Clicking Save adds the Masked Directory and takes you back to the URL Properties screen. Adding Masked Extensions If a file extension is masked, files of that type cannot be accessed. To add Masked Extensions, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Extension. Clicking Save adds the Masked Extension and takes you back to the URL Properties screen. Deleting a Virtual Host To delete a Virtual Host, select it using the checkbox provided and click Delete. Note: You cannot delete the Default Virtual Host. Configuring web logs for a Virtual Host The web logs are used to maintain the logged records of the activities on the created Virtual Host. If the logging activity is disabled, the logs of activities being performed cannot be maintained. Clicking Edit in this section takes you to the following screen:

24 146 Pramati Server 3.5 Administration Guide Configuring web log properties Using this screen, you can specify the directory path where the log file would be generated, and enable or disable logging. By default, logging is enabled. Configuring global properties for a web server You can set the following global properties for a web server: Denial of Service attacks MIME Types Connections Socket Properties Read more about setting the global properties for a web server in Configuring Pramati Web Server. Deploying an application on a Virtual Host In an application deployment, the WAR may be deployed on a Virtual Host. To select the Virtual Host: Open the Deploy Tool and select the application to be deployed.

25 CHAPTER 13 Working With Virtual Hosts on Pramati Server 147 Click on Web Properties node to open the General properties panel. A list of Virtual Hosts is displayed at the bottom of the screen. Select the Virtual Host you need. Deploying an application on a Virtual Host If you select Default, the content is deployed on default Virtual Host. If no Virtual Host is configured, deployment is only on the default host. Accessing information from a Virtual Host When the Server receives a request, it checks for the name by which it is addressed. There are two possibilities: the name corresponds to one of the configured Virtual Hosts, and the Server tries to serve the content from the appropriate document root (public or secure) for that Virtual Host. the name is not found in the configuration file, and the request is served out of the default Virtual Host. Current limitations for Virtual Hosts Virtual Hosts run on the same port as the default host. No separate port number configuration is provided for them.

26 148 Pramati Server 3.5 Administration Guide

Monitoring Pramati Web Server

Monitoring Pramati Web Server Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

Configuring Nex-Gen Web Load Balancer

Configuring Nex-Gen Web Load Balancer Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting

More information

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

Configuring Microsoft IIS 5.0 With Pramati Server

Configuring Microsoft IIS 5.0 With Pramati Server Configuring Microsoft IIS 5.0 With Pramati Server 46 Microsoft Internet Information Services 5.0 is a built-in web server that comes with Windows 2000 operating system. An earlier version, IIS 4.0, is

More information

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS

HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

<Insert Picture Here> Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

An Introduction To The Web File Manager

An Introduction To The Web File Manager An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010

DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010 DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x

Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) communication for a standalone environment... 2 Import the Process Server WAS root SSL certificate into

More information

Deploying Intellicus Portal on IBM WebSphere

Deploying Intellicus Portal on IBM WebSphere Deploying Intellicus Portal on IBM WebSphere Intellicus Web-based Reporting Suite Version 4.5 Enterprise Professional Smart Developer Smart Viewer Intellicus Technologies info@intellicus.com www.intellicus.com

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5

Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...

More information

LabVIEW Internet Toolkit User Guide

LabVIEW Internet Toolkit User Guide LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Securing Adobe connect Server and CQ Server

Securing Adobe connect Server and CQ Server Securing Adobe connect Server and CQ Server To Enable SSL on Connect Server and CQ server (Index) Configure custom.ini File Uncomment the SSL TAGs in Server.xml file. Configure the Four components of connect

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1

More information

App Orchestration 2.5

App Orchestration 2.5 Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration

Introducing the BIG-IP and SharePoint Portal Server 2003 configuration Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on

More information

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012

Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 Web+Center Version 7.x Windows Quick Install Guide 2 Tech Free Version Rev March 7, 2012 1996-2012 Internet Software Sciences Welcome to the Web+Center Installation and Configuration guide. This document

More information

Configuring Load Balancing

Configuring Load Balancing When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.

It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK. Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...

More information

Quick Guide of HiDDNS Settings (with UPnP)

Quick Guide of HiDDNS Settings (with UPnP) Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

CYAN SECURE WEB APPLIANCE. User interface manual

CYAN SECURE WEB APPLIANCE. User interface manual CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network

More information

Working with WebSphere 4.0

Working with WebSphere 4.0 44 Working with WebSphere 4.0 This chapter is for developers who are familiar with WebSphere Application Enterprise Server, version 4.0 (WAS 4.0) and would like to deploy their applications using WAS 4.0.

More information

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

XIA Configuration Server

XIA Configuration Server XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration

More information

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment

More information

ShoreTel Advanced Applications Web Utilities

ShoreTel Advanced Applications Web Utilities INSTALLATION & USER GUIDE ShoreTel Advanced Applications Web Utilities ShoreTel Advanced Applications Introduction The ShoreTel Advanced Application Web Utilities provides ShoreTel User authentication

More information

Installation Guide For ChoiceMail Enterprise Edition

Installation Guide For ChoiceMail Enterprise Edition Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Diagnostic Manager. User Guide. Publication Date: September 04, 2015

Diagnostic Manager. User Guide. Publication Date: September 04, 2015 Diagnostic Manager Publication Date: September 04, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2

Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide

Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

CloudOYE CDN USER MANUAL

CloudOYE CDN USER MANUAL CloudOYE CDN USER MANUAL Password - Based Access Logon to http://mycloud.cloudoye.com. Enter your Username & Password In case, you have forgotten your password, click Forgot your password to request a

More information

Directory Manager Segmented Installation

Directory Manager Segmented Installation Directory Manager Segmented Installation Background Directory Manager is a Web-based utility that allows an authorized user to update other user s information in the Active Directory. The Directory Manager

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Using TestLogServer for Web Security Troubleshooting

Using TestLogServer for Web Security Troubleshooting Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part

More information

KeyControl Installation on Amazon Web Services

KeyControl Installation on Amazon Web Services KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync.

Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...

More information

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry HRC Advanced Citrix Troubleshooting Guide Advanced Troubleshooting procedures: 1. Add https://mobile.hrc.army.mil to Internet Explorer s trusted sites list. Click on Tools Internet Options Security. Click

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

V Series Rapid Deployment Version 7.5

V Series Rapid Deployment Version 7.5 V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Using IIS and UltraDev Locally page 1

Using IIS and UltraDev Locally page 1 Using IIS and UltraDev Locally page 1 IIS Web Server Installation IIS Web Server is the web server provided by Microsoft for platforms running the various versions of the Windows Operating system. It is

More information

App Orchestration 2.5

App Orchestration 2.5 App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...

More information

USING MANAGED PRINTER LISTS

USING MANAGED PRINTER LISTS USING MANAGED PRINTER LISTS for the HP Universal Print Driver with HP Web Jetadmin CONTENTS Introduction... 2 Operation overview... 2 Assumptions... 2 Exporting device Groups as XML Managed Printer Lists...

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Information Security Practice II. Installation and set-up of Web Server and FTP accounts

Information Security Practice II. Installation and set-up of Web Server and FTP accounts Information Security Practice II Installation and set-up of Web Server and FTP accounts Installation of IIS Setup of laboratory 3 virtual machines are required in this laboratory: 1. Win2003 the web server

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0

SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 SonicWALL DHCP Server Enhancements in SonicOS Enhanced 4.0 Document Scope This document describes the DHCP enhancements in SonicOS Enhanced 4.0, including DHCP server options and DHCP server persistence.

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE

CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE CONSOLEWORKS WINDOWS EVENT FORWARDER START-UP GUIDE BEFORE YOU BEGIN This document assumes some things: You are using ConsoleWorks 4.6 or later (required), it s currently running, and a browser displaying

More information

Description of Microsoft Internet Information Services (IIS) 5.0 and

Description of Microsoft Internet Information Services (IIS) 5.0 and Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version

More information

PaperCut Payment Gateway Module CyberSource Quick Start Guide

PaperCut Payment Gateway Module CyberSource Quick Start Guide PaperCut Payment Gateway Module CyberSource Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and testing the

More information

About Email Archiving for Microsoft Exchange Server

About Email Archiving for Microsoft Exchange Server Setup Guide Revision A McAfee SaaS Email Archiving Service Configuring Microsoft Exchange Server 2013 About Email Archiving for Microsoft Exchange Server The McAfee SaaS Email Archiving service stores

More information

Working Folder Linkage Setup Guide

Working Folder Linkage Setup Guide For models listed below, see the respective "Working Foloder Linkage Setup Guide". wfs-mfp-installguide-09_en.pdf - ApeosPort-IV C5570/C4470/C3371/C3370/C2270 - ApeosPort-IV C7780/C6680/C5580 - ApeosPort-IV

More information

kalmstrom.com Business Solutions

kalmstrom.com Business Solutions HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...

More information

Cache Configuration Reference

Cache Configuration Reference Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Virtual Code Authentication User Guide for Administrators

Virtual Code Authentication User Guide for Administrators Virtual Code Authentication User Guide for Administrators Virtual Code Authentication - User Guide for Administrators Document No.: 05-001 2001-2015 All rights reserved. Under copyright laws, this document

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS)

Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) Microsoft Office Web Apps Server 2013 Integration with SharePoint 2013 Setting up Load Balanced Office Web Apps Farm with SSL (HTTPS) December 25 th, 2015 V.1.0 Prepared by: Manoj Karunarathne MCT, MCSA,

More information

OrgPublisher EChart Server Setup Guide

OrgPublisher EChart Server Setup Guide Table of Contents Table of Contents Introduction... 3 Role Requirements for Installation... 3 Prerequisites for Installation... 3 About OrgPublisher ECharts... 3 About EChart Rich Client Publishing...

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information