Systems Integration On Free Software
|
|
- Samuel Goodwin
- 8 years ago
- Views:
Transcription
1 Systems Integration On Free Software Web Server Apache Webmail Roundcube WebProxy Squid Author: Carlos Alberto López Pérez
2 Web Server: Apache Apache Since April 1996 Apache has been the most popular HTTP server software in use. As of May 2011 Apache was estimated to serve 63% of all websites and 66% of the million busiest. Developer Nº servers Percent (05/2011) Apache 61,961, % Microsoft 16,598, % Google 12,651, % nginx 9,499, % lighttpd 678, % 1 / 21
3 Apache: Introduction Multi-Processing Modules (MPMs) event, prefork, worker, itk winnt, netware, os2... Dynamic Shared Objects (DSOs), APXS Cgi Server side scripting languages: perl, php, python, tcl... Virtual hosts Reverse proxy URL rewriting... 2 / 21
4 Apache: Installation 1. Launch the virtual server 2. Open a root console (ssh) into your server (alpha): ssh root@localhost -p Install Apache: apt-get install apache2 4. Control it: service apache2 [stop start restart reload] 3 / 21
5 Apache: Installation 1. Launch the virtual server 2. Open a root console (ssh) into your server (alpha): ssh root@localhost -p Install Apache: apt-get install apache2 4. Control it: service apache2 [stop start restart reload] 3 / 21
6 Apache: Installation 1. Launch the virtual server 2. Open a root console (ssh) into your server (alpha): ssh root@localhost -p Install Apache: apt-get install apache2 4. Control it: service apache2 [stop start restart reload] 3 / 21
7 Apache: Installation 1. Launch the virtual server 2. Open a root console (ssh) into your server (alpha): ssh root@localhost -p Install Apache: apt-get install apache2 4. Control it: service apache2 [stop start restart reload] 3 / 21
8 Apache: Installation 1. Launch the virtual server 2. Open a root console (ssh) into your server (alpha): ssh root@localhost -p Install Apache: apt-get install apache2 4. Control it: service apache2 [stop start restart reload] 3 / 21
9 Apache: Configuration Directory: /etc/apache2 apache2.conf (main system configuration) httpd.conf (user configuration) Subdirectory: conf.d (system packages configuration) Subdirectories: sites-available, sites-enabled (user defined sites) Subdirectories: modules-available, modules-enabled (modules configuration) Utilities: a2enmod a2dismod a2ensite a2dissite apachectl 4 / 21
10 Apache: Configuration (2) Global environment Config root: ServerRoot /etc/apache2 Performance: Timeout, Keepalive, MaxKeepAliveRequests, KeepaliveTimeout, MinSpareServers, MaxSpareServers, StartServers, MaxClient, MaxRequestsPerChild Listen ports (ports.conf): Listen ip:port, BindAddress host <IfModule>: Parses config only if selected module has been loaded 5 / 21
11 Apache: Configuration (3) Virtual host directory options <Directory>, <DirectoryMatch> <Files>, <FilesMatch> <Location>, <LocationMatch> <Options> ExecCGI, FollowSymLinks, Indexes, SymlinksIfOwnerMatch... Allow/Deny from ip/host/mask(*), Order 6 / 21
12 Apache: Configuration (4) Virtual host directory options Unix process user: User, Group Access control: AccessFileName.htaccess UseCanonicalName Default data types: DefaultType text/plain Resolve hostnames to log: HostNameLookups Log levels and files: ErrorLog, LogLevel, LogFormat, CustomLog 7 / 21
13 Apache: Configuration (5) Virtual host directory options Server version: ServerSignature, ServerTokens Aliases: Alias, ScriptAlias Icons, descriptions and headers AddIconByEncoding, AddIconByType, AddIcon, DefaultIcon, AddDescription, ReadmeName, HeaderName, IndexIgnore 8 / 21
14 Apache: Configuration (6) Virtual host directory options Mime types and i18n: AddLanguage, AddCharset, LanguagePriority, AddType, AddHandler Meta info: MetaDir, MetaSuffix Personal error messages: ErrorDocument 9 / 21
15 Apache: Restricting Access Authtype: Basic (plain text password) Digest (cryptographic hash derived from the password) Pluggable Auth modules: mod_authn_file: User authentication using text files mod_authn_dbd: User authentication using a SQL database mod_authnz_ldap: User authentication using a LDAP directory. mod_authnz_external: Allows the admin to implement custom authenticators: radcheckpassword: Checking against external Radius server(s) pwauth: Authentication against Unix shadow password files or via PAM checkpasswd-imap: An IMAP authenticator written in Python (...) [...] 10 / 21
16 Apache: Mod_authn_file Create new passwd file: htpasswd -c /etc/apache2/mypassfile username Create new digest passwd file: htdigest -c /etc/apache2/mypass "Restricted Area" username Configure authentication: AuthType Digest AuthName "Restricted Area" AuthUserFile /etc/apache2/mypassfile AuthGroupFile /etc/apache2/mygroup Require group hackers 11 / 21
17 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
18 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
19 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
20 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
21 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
22 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
23 Apache: Digest The browser sends a hash derived from the password $ echo -n 'misecretpassword' md5sum 02c3868aa2bcd104ea a1c2d55 The advantage of using the hash value is that the password itself is not sent to the server, so it isn't visible to the Bad Guys. Replay attack? Could a Bad Guy who intercepts the Internet traffic reuse the previous hashes sent by the client?. To protect against replay attacks, digest adds a few other things into the mix: the URI, the method, and a nonce. A nonce is simply a number chosen by the server and told to the client, usually different each time. It ensures that the digest is different each time and protects against replay attacks. 12 / 21
24 Apache: Digest Algorithm The client requests a URL. Because that URL is protected, the server replies with error 401, Authentication required, and among the headers, it sends a nonce. The client combines the user's password, the nonce, the method, and the URL, as described previously, then sends the result back to the server. The server does the same thing with the hash of the user's password retrieved from the password file and checks that its result matches. A different nonce is sent the next time, so that the Bad Guy can't use the captured digest to gain access. The digest function looks like this: MD5(MD5(<password>)+":"+<nonce>+":"+MD5(<method>+":"+<url>)) 13 / 21
25 Webmail: Roundcube Roundcube Roundcube is a web-based IMAP client written in the PHP programming language. Roundcube's most prominent feature is the pervasive use of Ajax technology to present a more fluid and responsive user interface than that of traditional webmail clients. Is licensed under the GNU GPL v3. 14 / 21
26 Roundcube: Features Current Roundcube features Available in over 70 languages Drag-&-drop message management Full support for MIME and HTML messages Sophisticated privacy protection Compose messages with attachments Multiple sender identities Full featured address book with groups and LDAP connectors Find-as-you-type address book integration Richtext/HTML message composing Forwarding messages with attachments Searching messages and contacts Threaded message listing IDNA support Spell checking IMAP folder management Shared/global IMAP folders Support for external SMTP server Support for access control lists (ACL) Built-in caching for fast mailbox access Unlimited users and messages Template system for custom skins Plug-in API for flexible exensions 15 / 21
27 Roundcube: Installation Install Roundcube: apt-get install roundcube roundcube-sqlite 16 / 21
28 Roundcube: Configuration /var/lib/roundcube/config/main.inc.php [...] // automatically create a new RoundCube user when log-in the first time. // a new user will be created once the IMAP login succeeds. // set to false if only registered users can use this service $rcmail_config['auto_create_user'] = TRUE; // the mail host chosen to perform the log-in // leave blank to show a textbox at login, give a list of hosts // to display a pulldown menu or set one host as string. $rcmail_config['default_host'] = 'ssl://imap.gmail.com:993'; // TCP port used for IMAP connections $rcmail_config['default_port'] = 993; // use this host for sending mails. // if left blank, the PHP mail() function is used $rcmail_config['smtp_server'] = 'ssl://smtp.gmail.com'; // SMTP port (default is 25; 465 for SSL) $rcmail_config['smtp_port'] = 465; [...] 17 / 21
29 Webproxy: Squid Squid Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid also has extensive access controls so it can be used also as a Web firewall in order to improve security by filtering traffic. It runs on most available operating systems, including Windows and is licensed under the GNU GPL. 18 / 21
30 Squid: Features Features: Web caching proxy (http, https, ftp) High performance Multiplatform (Unix, NT) Flexible Access Control List (ACL) rules Interoperable: Content/antivirus filters (dansguardian, squidguard, addzaper) Internet Cache Protocol (ICP) 19 / 21
31 Squid: Installation Packages: squid (squid-common) 20 / 21
32 Squid: Configuration /etc/squid/squid.conf [...] acl localhost src /32 acl localnet src /8 # RFC1918 possible internal network acl localnet src /12 # RFC1918 possible internal network acl localnet src /16 # RFC1918 possible internal network http_access allow localnet http_access allow localhost http_access deny all http_port 3128 acl forbidden2a url_regex -i ^ acl forbidden2b time 10:00-14:00 http_access deny forbidden2a forbidden2b [...] 21 / 21
Web Server: Principles and Configuration Web Programming 8) Web Server
Web Server: Principles and Configuration Web Programming 8) Web Server Emmanuel Benoist Fall Term 2013-14 Introduction Presentation of Apache Principles of a Web Server Apache Installation Apache Configuration
More informationInstalling Apache Software
Web Server Web Server Is a software application that uses the HyperText Transfer Protocol. Running on computer connected to Internet. Many Web Server software applications: Public domain software from
More informationCreated by : Ashish Shah, J.M. PATEL COLLEGE UNIT-5 CHAP-1 CONFIGURING WEB SERVER
UNIT-5 CHAP-1 CONFIGURING WEB SERVER 1 APACHE SERVER The Apache Web server is the most popular Web server on the planet. Individuals and organizations use Linux primarily to create an inexpensive and stable
More informationApache. Apache. Something odd happening. Modularity 10/02/2014. We talked about it in CSCI110 Now it s time for you to configure an Apache web server
Apache Apache We talked about it in CSCI110 Now it s time for you to configure an Apache web server You won t configure the entire Apache in the labs; there you will simply configure your own public_html
More informationBasic Apache Web Services
Basic Apache Web Services Getting Apache Before you can do anything else, you need to install Apache You can download the rpms from some of your regular sites, or from http://downloadfedoraredhatcom/pub/
More informationSecuring the Apache Web Server
Securing the Apache Web Server Jaqui Lynch Mainline Information Systems Email jaqui.lynch@mainline.com Session I12 Agenda Anatomy of a Web Transaction General Firewall and Network Web Server Parameters
More informationAPACHE. An HTTP Server. Reference Manual
APACHE An HTTP Server Reference Manual David Robinson and the Apache Group, 1995. http://www.apache.org/ All rights reserved. This product or documentation is protected by copyright and is distributed
More informationApache & Virtual Hosts & mod_rewrite
Apache & Virtual Hosts & mod_rewrite Jonathan Brewer Network Startup Resource Center jon@nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
More informationThe course will be run on a Linux platform, but it is suitable for all UNIX based deployments.
Linux Apache Web Server Administration Course Description: The Linux Apache Web Server Administration course is aimed at technical staff who will be responsible for installing, configuring and maintaining
More informationHow To Configure Apa Web Server For High Performance
DEPLOYMENT GUIDE Version 1.0 Deploying F5 with Apache Web Servers Table of Contents Table of Contents Deploying the BIG-IP LTM with the Apache web server Prerequisites and configuration notes... 1 Product
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More informationThe Web Server. Instructor: Yi-Shin Chen Office: EECS 3201 Email: yishin@cs.nthu.edu.tw Office Hour: Tu. 1-2PM, Th. 3-4pm
ISA5575 Web Techniques and Applications The Web Server Instructor: Yi-Shin Chen Office: EECS 3201 Email: yishin@cs.nthu.edu.tw Office Hour: Tu. 1-2PM, Th. 3-4pm Client/Server Architecture Model Terminals
More informationMINIMUM INSTALLATION REQUIREMENTS Processor: RAM: Hard disk: Operating system: Others: Pentium 200 MHz. 64 MB. 80 MB free space. One of the following: Red Hat (version 7.0, 7.1, 7.2, 7.3, 8.0, 9 or Enterprise
More informationAPACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
More informationWEB2CS INSTALLATION GUIDE
WEB2CS INSTALLATION GUIDE FOR XANDMAIL XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING WEB2CS 3 1.1. RETRIEVING THE
More informationInstalling and Configuring Apache
3 Installing and Configuring Apache In this second of three installation-related chapters, you will install the Apache web server and familiarize yourself with its main components, including log and configuration
More informationTECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup
Stormshield Network Firewall Document version: 1.0 Reference: snentno_autobackup CONTENTS INTRODUCTION 3 OPERATION 3 Storing in the Mystormshield.eu client area 3 Storing on a customized server 3 FIREWALL
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationITools Manager User Guide
ITools Manager User Guide Copyright 2002 Tenon Intersystems. All Rights Reserved. Printed in USA. Tenon, itools Manager and the Tenon Logo are trademarks of Tenon Intersystems. Apple, Macintosh, Finder,
More informationBrocade Virtual Traffic Manager and Magento Deployment Guide
September 2015 Brocade Virtual Traffic Manager and Magento Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric
More informationThe current version installed on your server is 2.6.32-431.5.1.el6.x86_64 and it's the latest available.
IP : nnn.nnn.nnn.n 173.255.141.4 Hostname : example.domain.com webserver.theewfinc.org OS : CentOS release 6.6 (Final) The following is a report on the security and performance of your server. It includes
More informationLinux Squid Proxy Server
Linux Squid Proxy Server Descriptions and Purpose of Lab Exercise Squid is caching proxy server, which improves the bandwidth and the reponse time by caching the recently requested web pages. Now a days
More informationBusiness Internet Email service from Bell User Guide
Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office
More informationApache2 Configuration under Debian GNU/Linux. Apache2 Configuration under Debian GNU/Linux
Apache2 Configuration under Debian GNU/Linux Contents Apache2 Configuration under Debian GNU/Linux Files and Directories in /etc/apache2 Tools Using mod_disk_cache SSL Enabling SSL Creating self-signed
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationMPP Manager Users Guide
MPP Manager Users Guide Spam Quarantine and Email Archive Administration \ August, 2008 MPP Mable of Contents 1 About This Guide 4 1.1 MPP Manager Overview 4 1.2 Other Documentation 4 2 Mppserver MPP Manager
More informationC:\www\apache2214\conf\httpd.conf Freitag, 16. Dezember 2011 08:50
This is the main Apache HTTP server configuration file. It contains the configuration directives that give the server its instructions. See for detailed information.
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationMailEnable Connector for Microsoft Outlook
MailEnable Connector for Microsoft Outlook Version 2.23 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for
More informationIntroduction to Apache and Global Environment Directives. S.B.Lal Indian Agricultural Statistics Research Institute, New Delhi 110012
Introduction to Apache and Global Environment Directives S.B.Lal Indian Agricultural Statistics Research Institute, New Delhi 110012 What is a Web Server? A web server is a program that runs on a host
More informationW3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
More informationAPACHE. Presentation by: Lilian Thairu
APACHE AGENDA Introduction Where to get Versions Licensing Use Features Server & Supporting programs Competitors Market structure Pros & Cons Vs Other servers Introduction Web Server Often referred to
More informationMassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
More informationSecure Employee Information System to Manage Integrated Network Services
Secure Employee Information System to Manage Integrated Network Services P.Rama Rao 1, O.Obulesu 2 Department of IT,SVEC,Tirupati,A.P.,India Department of IT,SVEC,Tirupati,A.P.,India Abstract Automation
More informationConfiguring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
More informationRailo Installation on CentOS Linux 6 Best Practices
Railo Installation on CentOS Linux 6 Best Practices Purpose: This document is intended for system administrators who want to deploy their Mura CMS, Railo, Tomcat, and JRE stack in a secure but easy to
More informationSVNManager Installation. Documentation. Department of Public Health Erasmus MC University Medical Center
SVNManager Installation Documentation M. Verkerk Department of Public Health Erasmus MC University Medical Center Page 2 July 2005 Preface Version control in the context of this document is all about keeping
More informationAccess Gateway Guide Access Manager 4.0 SP1
Access Gateway Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP LTM with Apache Tomcat and Apache HTTP Server Table of Contents Table of Contents Deploying the BIG-IP LTM with Tomcat application servers and Apache web
More informationThe Virtual Private Server Handbook
The Virtual Private Server Handbook Unlocking the Power of the Virtual Private Server System viaverio http://www.viaverio.com COPYRIGHT 1995-2001 VERIO INC. ALL RIGHTS RESERVED. VERSION 4.1 Table of Contents
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationGreenstone Documentation
Greenstone Documentation Web library and Remote Collection Building with GLI Client Web Library. This enables any computer with an existing webserver to serve pre-built Greenstone collections. As with
More informationWEB2CS INSTALLATION GUIDE
WEB2CS INSTALLATION GUIDE FOR CPANEL / WHM XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING WEB2CS 4 1.1. ADDING XANDMAIL
More informationTechnical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
More informationSetting up a Squid-Proxy Server
LinuxFocus article number 235 http://linuxfocus.org Setting up a Squid-Proxy Server by D.S. Oberoi About the author: D.S. Oberoi lives in Jammu, India and has currently problems
More informationGlobalSign Enterprise Solutions Google Apps Authentication User Guide
GlobalSign Enterprise Solutions Google Apps Authentication User Guide Using EPKI for Google Apps for Business Single Sign-on and Secure Document Sharing v.1.1 1 Table of Contents Table of Contents... 2
More informationWeb Service Reference
IceWarp Unified Communications Reference Version 11.3 Published on 2/27/2015 Contents... 4 About... 5 Reference... 6 General... 6 Web Site... 7 Options... 9 Access... 11 Scripting... 14 MIME... 16 Documents...
More informationExpresso Quick Install
Expresso Quick Install 1. Considerations 2. Basic requirements to install 3. Install 4. Expresso set up 5. Registering users 6. Expresso first access 7. Uninstall 8. Reinstall 1. Considerations Before
More informationInstalling an open source version of MateCat
Installing an open source version of MateCat This guide is meant for users who want to install and administer the open source version on their own machines. Overview 1 Hardware requirements 2 Getting started
More informationContents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
More informationConfiguration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
More informationFilr 2.0 Administration Guide. April 2016
Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
More informationCSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
More informationDEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
More informationAXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0
AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...
More informationRequirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module
Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common
More informationF-Secure Internet Gatekeeper
F-Secure Internet Gatekeeper TOC F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper...5 1.1 Features...6 Chapter 2: Deployment...8 2.1 System requirements...9 2.2
More informationKerio Connect. Step-by-Step. Kerio Technologies
Kerio Connect Step-by-Step Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio Connect, version 7.2. All additional modifications and
More informationSophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
More informationTalk Internet User Guides Controlgate Administrative User Guide
Talk Internet User Guides Controlgate Administrative User Guide Contents Contents (This Page) 2 Accessing the Controlgate Interface 3 Adding a new domain 4 Setup Website Hosting 5 Setup FTP Users 6 Setup
More informationIIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationHTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology
HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationDEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationAdvanced Linux System Administration Knowledge GNU/LINUX Requirements
Advanced Linux System Administration Knowledge GNU/LINUX Requirements Duration: 112Hours / 28 Classes (4hrs each class Including Theory & Lab Session) (2 Classes/ Week) Class Topic Duration Class 1 History
More informationHow to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
More informationApache 2.2 on Windows: A Primer
Apache 2.2 on Windows: A Primer Published by the Open Source Software Lab at Microsoft. February 2008. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab. Most current
More information1Intro. Apache is an open source HTTP web server for Unix, Apache
Apache 1Intro Apache is an open source HTTP web server for Unix, Microsoft Windows, Macintosh and others, that implements the HTTP / 1.1 protocol and the notion of virtual sites. Apache has amongst other
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationSingle sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
More informationHTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
More informationConfiguring Load Balancing
When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.
More informationCloud Services. Introduction...2 Overview...2. Security considerations... 2. Installation...3 Server Configuration...4
Contents Introduction...2 Overview...2 Security considerations... 2 Installation...3 Server Configuration...4 Management Client Connection...4 General Settings... 4 Enterprise Architect Client Connection
More informationConfiguring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More information1 Introduction to the Axxess Server
1 Introduction to the Axxess Server The Axxess Server is built on a highly reliable, very efficient, fast performing, multi-tasking, multi-user, multi-threading Linux operating system. The Axxess Server
More informationWeb Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP rikjones@computer.org Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
More informationEucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationCollax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
More informationConfiguring Thunderbird with UEA Exchange 2007:
Configuring Thunderbird with UEA Exchange 2007: This document covers Thunderbird v10.0.2 please contact it.linux@uea.ac.uk if you require an upgrade. Mail Account Setup. Step 1: Open Thunderbird, you should
More informationSnapt Balancer Manual
Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt
More information2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
More informationProxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
More informationENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement
More informationLecture 11 Web Application Security (part 1)
Lecture 11 Web Application Security (part 1) Computer and Network Security 4th of January 2016 Computer Science and Engineering Department CSE Dep, ACS, UPB Lecture 11, Web Application Security (part 1)
More informationApache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
More informationWEB2CS INSTALLATION GUIDE
WEB2CS INSTALLATION GUIDE FOR PARALLELS / POA HTTP://WWW.XANDMAIL.COM XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING
More informationWeb Server Manual. Mike Burns (netgeek@speakeasy.net) Greg Pettyjohn (gregp@ccs.neu.edu) Jay McCarthy (jay.mccarthy@gmail.com) November 20, 2006
Web Server Manual Mike Burns (netgeek@speakeasy.net) Greg Pettyjohn (gregp@ccs.neu.edu) Jay McCarthy (jay.mccarthy@gmail.com) November 20, 2006 Copyright notice Copyright c 1996-2006 PLT Permission is
More informationCiphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationWhile are you still in Nagios working directory, create a new file for DNS servers monitoring
NAGIOS MONITORING ----------------- On AUTH1 server 1. Go to Nagios working directory $ cd /usr/local/etc/nagios 2. Copy Nagios sample files To do this, make sure you are in Nagios working directory from
More informationIntroduction... 1. Connecting Via FTP... 4. Where do I upload my website?... 4. What to call your home page?... 5. Troubleshooting FTP...
This guide is designed to show you the different ways of uploading your site using ftp, including the basic principles of understanding and troubleshooting ftp issues. P a g e 0 Introduction... 1 When
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationITOOLS USER S GUIDE ... ... 1123 Chapala Street. Santa Barbara, CA 93101 PH: 805.963.6983 FAX: 805.962.8202. info@tenon.com www.tenon.
1 ITOOLS USER S GUIDE................................... 1123 Chapala Street. Santa Barbara, CA 93101 PH: 805.963.6983 FAX: 805.962.8202 info@tenon.com www.tenon.com itools User s Guide i Copyright 2001
More information