Working With Virtual Hosts on Pramati Server
|
|
|
- Bruno Johns
- 10 years ago
- Views:
Transcription
1 Working With Virtual Hosts on Pramati Server 13 Overview Virtual hosting allows a single machine to be addressed by different names. There are two ways for configuring Virtual Hosts. They are: Domain Name Service (DNS) based Virtual Domains let you host more than one site on a single IP. With HTTP 1.1 protocol, and a common extension to HTTP 1.0, server can identify the name with which it is being addressed. IP based A multiple IP system can be configured to start an HTTP listener on a specific IP. This way it can host n number of sites depending on number of IPs assigned to it. Note: This functionality is supported by Netscape Navigator 2.0 or higher, as well as Internet Explorer 3.0 or higher. Pramati HTTP Server supports "name based virtual hosting" and IP multi homing. Virtual Hosts can be used to create multiple document roots on a single machine. By resolving the name-space, multiple "sites" can run on a single machine in an isolated manner. Hosting multiple applications on a single HTTP Server under different domain names, say, and www. def.com allows easier maintenance and better protection through isolation of files. Before setting up virtual hosting on Pramati HTTP Server, you must: Set up the DNS services Register any new domain names that will be used Creating a DNS based Virtual Host using web-config.xml Virtual Hosts are registered with Pramati HTTP server through a configuration file, webconfig.xml and web-cache.xml, located at <install_dir>/server/nodes/<node_name>/ config/. Add an entry in this XML configuration file for every Virtual Host configured. A sample entry is shown below: <virtual-host name ="" doc-root="" > <index-page/> <static-content-headers/> <web-log> <log-on>true</log-on>
2 124 Pramati Server 3.5 Administration Guide <dir-path>$node_dir\abc</dir-path> </web-log> <access-constraint/> <application> <name/> <allow-dir-listing/> </application> <alias> <alias-name/> <alias-directory/> </alias> </virtual-host> In case a Virtual Host is configured in the web-config.xml, and cache-enabled is set to true, the user should make the following entry in the web-cache.xml apart from the entry already available there: <virtual-host name="virtual host name"> <max-cache-size-mb>5</max-cache-size-mb> <max-cacheable-file-size-kb>1000</max-cacheable-file-size-kb> <victim-selection>lru</victim-selection> <cache-rule name="static-cache-rule" request-uri="static-cache-rule"> <custom-invalidator class-name="com.pramati.web.dyncache.staticcacheinvalidator" poll-interval="2" /> </cache-rule> </virtual-host> Definitions of configuration tags Following is a brief description of the various tags and attributes used to configure a Virtual Host: Table 1: Configuration Tags Tags Attributes Description <virtual-host> <index-pages> <static-content-headers> name doc-root This is the root tag for Virtual Hosts. This specifies the domain name by which you want to set up the Virtual Host. DNS should be able to resolve this hostname entry. This specifies the Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html. The default page that would get served if a request is made for a domain in case the URL requested does not include one. This defines the static content headers.
3 CHAPTER 13 Working With Virtual Hosts on Pramati Server 125 Table 1: Configuration Tags <web-log> <log-on> <dir-path> <access-constraint> <application> <name> <allow-dir-listing> <alias> <alias-name> <alias-directory> This is the root tag for web logs. This tag helps enable or disable the web logging at the run time. This tag provides the directory location where the web log will be saved. This tag provides the IP based access control. This is the root tag for application properties. This is the name of the application This defines whether directory listing is to be enabled. This is the root tag for alias properties. This is the alias name This specifies the directory where alias names are stored. A sample code for using configuration tags: <virtual-host name=" doc-root="c:\vh_docroot1"> <index-pages name="index.htm,index.html,pramatiwelcomepage"/> <error-pages > <error code="302" url="/error/302"/> <error code="404" url="/error/404"/> </error-pages> <web-log> <log-on>true</log-on> <dir-path>$node_dir\logs\web</dir-path> </web-log> <alias> <alias-name/> <alias-directory/> </alias> <allow-dir-listing>true</allow-dir-listing> <application> <name>webcontests</name> <masked-entities> <masked-dir-list> <masked-dir>meta-inf</masked-dir> <masked-dir>web-inf</masked-dir> </masked-dir-list> <masked-file-list> <masked-file>.jsp</masked-file> <masked-file>.java</masked-file> </masked-file-list> </masked-entities>
4 126 Pramati Server 3.5 Administration Guide </application> <static-content-headers> <entry> <entry-identifier>static_content_header_2</entry-identifier> <url-pattern>/*</url-pattern> <header> <name>name</name> <value>value</value> </header> </entry> </static-content-headers> <access-constraint> <entry> <entry-identifier>access_constraint_1</entry-identifier> <allow-access>true</allow-access> <url-pattern>/*</url-pattern> <client-ip-address> </client-ip-address> </entry> </access-constraint> </virtual-host> For the entries to take effect, you must restart the Server or node. Creating a DNS based Virtual Host using Console To create a Virtual Host using the Console: 1 Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the Hosts already configured, and the global properties of the web server. 2 Click Add under Host section. This displays the screen to add a Virtual Host (see the figure given above) 3 Provide here the following details: Table 2: Details needed for creating a DNS based Virtual Host Fields Description Name The domain name by which you want to set up the Virtual Host. For example VirTest. DNS should be able to resolve this hostname entry. Document Root The Document Root location from where the Server serves the requested files as *.html, *.gif, *.jsp. For example c:/virtest/doc This is different from the default doc root of the Server, which is: <install_root>/server/nodes/ node_name/archives/public_html Clicking Save brings you back to the main page of web server, displaying the added Virtual Host.
5 CHAPTER 13 Working With Virtual Hosts on Pramati Server 127 Adding a Virtual Host The Settings option Clicking Settings in the Host section displays a summary of the following properties for the Virtual Host: Basic Header Page Settings Cache URL Web Logs Configuring Basic Properties for a Virtual Host The Basic Properties section displays details about: Table 3: Basic Properties of the Host Fields Name Document Root Alias Description Name of the Virtual Host The path where all the applications will be deployed and served for the Host. Alias name for the Virtual Host. You can have more than one alias for a single host.
6 128 Pramati Server 3.5 Administration Guide Editing the Basic Properties To modify the basic properties information, click the Edit icon provided. This displays the following screen: Editing Basic Properties of a Virtual Host You can change the document root for the Virtual Host, and also add an Alias name for the same. To add an Alias name, click Add. On the screen that comes up, add an Alias by providing the Name and Document root for the same.
7 CHAPTER 13 Working With Virtual Hosts on Pramati Server 129 Adding an Alias for a Virtual Host Clicking Save adds the Alias to the Basic properties and takes you back to the Basic Properties screen. You can add or delete more Alias names for the Virtual Host. Configuring Header Properties for a Virtual Host HTTP requests and HTTP responses use headers to send information about the HTTP message. The Header Properties section displays details about the Custom Headers and Content Expiration. Table 4: Header Properties of the Host Fields Custom Headers Content Expiration Description Any custom header that a user wants in response for a static page. The time for expiration of a static page content. Editing the Header Properties To edit the header properties information, click the edit icon. This displays the following screen:
8 130 Pramati Server 3.5 Administration Guide Editing Header Properties of a Virtual Host Using the above screen, you can specify the custom header, and set the content expiration time for the Virtual Host. Adding a Custom Header property Click Add to create a new Custom Header. On the screen that is displayed, provide the Name and Value for the same
9 CHAPTER 13 Working With Virtual Hosts on Pramati Server 131 Adding Custom Header Properties for a Virtual Host Clicking Save adds the Custom Header to the Header properties. You can add or delete more Custom Headers for the Virtual Host. Setting Content Expiration Content expiration can be set for a static page. Table 5: Setting Content Expiration Fields Description Immediately If set as Immediately, the static page will not get cached by the browser or the intermediary proxy. After (specified) Minutes Setting the number of minutes removes the cache content after the time specified. Set the Content Expiration time for the Virtual Host and click Save to go back to the summary screen. Configuring Page Settings for a Virtual Host The Page Settings section displays details about the configured Welcome and Error pages for the Virtual Host. Editing Page Settings To modify the Page Setting properties, click Edit. This displays the following screen:
10 132 Pramati Server 3.5 Administration Guide Configuring Page Settings for a Virtual Host Using the above screen, you can specify the Welcome and Error pages. Adding a Welcome Page To add a Welcome page, click Add. On the screen that comes up, provide the Page name for the same.
11 CHAPTER 13 Working With Virtual Hosts on Pramati Server 133 Adding a Welcome Page Adding an Error Page To add an Error page for the Virtual Host, click Add, and select the Type of error to be displayed from the drop down list provided. The types of Error pages that can be selected are: Table 6: Types of Error Pages Error Type Description 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 412 Precondition Failed 414 Request-URL Too Long 415 Unsupported Media Type 500 Internal Server Error 501 Not Implemented
12 134 Pramati Server 3.5 Administration Guide Table 6: Types of Error Pages Error Type Description 502 Bad Gateway Specify the Page URL, say as /error/errorpage.htm, and click Save to go back to the summary screen. The field is mandatory, and if you try to save without providing a value for it, you will be shown an error message in the Status panel. Adding an Error Page Configuring Cache Properties for a Virtual Host Pramati Web Server provides rule based caching for both static and dynamic contents for performance enhancements. Select Configure > Web Server in the Explore panel to reach the screen displaying the details for the configured Hosts. Select 'Settings' against the Virtual Host that you want to configure the cache for, and scroll down on the page to the Cache section. You can view here the following details: Maximum Cache Size. The default maximum cache size for the Virtual Host is 5MB. Maximum Cacheable File Size. The default maximum cacheable file size is 1000Kb. Victimization Algorithm. The Victimization Algorithm used is the Least Recently Used (LRU). List of Default caching rules. These rules apply for all the context roots. By default there is only one default cache rule present which represents caching of the static content.
13 CHAPTER 13 Working With Virtual Hosts on Pramati Server 135 The list of caching rules for the application. These are by default not there and will be displayed as and when you create a new caching rule for the context root. Click Settings to edit the cache settings. This takes you to the page where you can modify the Maximum cache size. It also gives you the link to add a new cache/avoid-cache/application-basedinvalidation-rule. Please click the link for adding new rules. Read more about caching in the Technical Reference Guide. The details displayed for the Default Application Cache rules are: Viewing Cache details Table 7: Application Cache Rule details Fields Description Name Displays the name for the new cache rule. Type Displays the cache type as Cache, Avoid Cache or Application Based Invalidation. URL Displays the URL pattern for which the rule applies to. HTTP Method Displays the HTTP method. Pramati Server 3.5 supports only the GET and PUT methods. Status Displays the status as either true or false. True signifies that the rule is active. Comment Displays the comment provided for the rule.
14 136 Pramati Server 3.5 Administration Guide Editing Cache Properties To modify the Cache properties, click Edit. This displays the following screen: Editing Cache Properties Using the above screen, you can edit information for the Maximum Cache size and the Maximum Cacheable File size. You can add cache rules at both the Host and application levels, as also clear cache as and when required. The Algorithm used is set as Least Recently Used by default. Adding a Cache Rule Clicking +Add or Click here to add rule displays the Step 1: Add Cache Rule screen:
15 CHAPTER 13 Working With Virtual Hosts on Pramati Server 137 Adding a Cache Rule A caching rule is used to specify which page is to be cached. Provide here the following details: Table 8: Adding a Cache Rule Fields Description Name A unique name for the new cache rule which will be used to identify the rule by the person who defines the rule. This is a mandatory field and not providing a value for it displays an error message in the Status panel. Type Select the cache type as Cache, Avoid Cache or Application Based Invalidation, from the drop down list provided. Comment A comment on the cache rule. Context Root The Context Root of the application. The application does not neccessarily need to have been deployed. If a request is made for that context root, the rule will be evaluated for that request. If the context root is not specified, the rule is considered to be a default rule which will be evaluated for all the requests, whatever be the context root of the request. These kind of rules should be carefully used as they may lower the overall performance of the web server. Click Next to define the properties for the new cache rule.
16 138 Pramati Server 3.5 Administration Guide Step 2 of Adding a Cache Rule Provide here the following details: Table 9: Adding a Cache Rule - Step 2 Fields Type URL HTTP Method Description This non-editable field displays the Cache Type selected in the previous screen. The URL where the cache rule will be stored. This is a mandatory field. The HTTP Method as either GET or POST. Use Input Parameters There are two values for this parameter - all and specified. By default if no value for the field is specified, it is all. Select whether you wish to use all the input parameters in the key or only the specified input-parameters in the key. In case you select No for an input parameter under the Use Condition option, the particular parameter will not be considered. Add Before The rule before which you want to add the new rule. In case nothing is selected, the rule will be added to the end. The order of rules is very important. You must define the rules keeping in the mind the performance, as a rule may be getting evaluated by the request where it need not be. Also there may be logic based on the order of the rules.the order of rules matters only between cache-rule and avoid-cache-rules. They can be merged and constitute the same list of rules for the evaluation. A rule which is significantly more frequently used than the other ones, should be kept higher in the order.
17 CHAPTER 13 Working With Virtual Hosts on Pramati Server 139 Table 9: Adding a Cache Rule - Step 2 Fields Description Expiry Input (Query String) Parameters Cookie (Query String) Settings Header (Query String) Settings Configuring Cache Expiry The cached content must be removed when it is not acceptable. For this, you can define three types of invalidations: 1 Time based 2 Custom based (based on invalidation rule) 3 Application based The expiry time of the Customer Application based cache rules. The Name, Value and Condition of the Input Parameters. Specify whether you wish to use the condition or not. You can add more Input Parameters using the button provided. The Name, Value and Condition of the Cookie Settings. Specify whether you wish to use the condition or not. You can add more Cookie Settings using the button provided. The Name, Value and Condition of the Header Settings. Specify whether you wish to use the condition or not. You can add more Header Settings using the button provided. The rules for invalidation must be defined in close association of caching rule for which the request is cached. Time based Time based expiry for a cached content is defined as part of caching rule where the After field value needs to be specified in minutes, hours or days using the drop down list provided. This is the time after which the content is invalidated after the response is cached. This value should be specified carefully as you must be aware whether the stale content is affordable or not, and if it is, for how much time. A typical usage may be a system where data is updated every day. Here the pages can be cached for expiry of 24 hrs starting from the time the data is updated the first time. Custom based This type of invalidation rule specifies an invalidation mechanism where you are given the flexibility to write your own logic for invalidation of the cached content. This interface provides a customizable means to invalidate the cache. Using this option, you can configure the Cache to expire based on the invalidation rule set earlier. Table 10: Configuring Custom based Cache Expiry Fields Options Description Class Check after Properties Enter here the implementation class. Specify here the time period after which a check has to be made for the expiry of the Cache rule. Specify here the following properties of the Custom based cache.
18 140 Pramati Server 3.5 Administration Guide Table 10: Configuring Custom based Cache Expiry Fields Options Description Name Value Enter here a name for the new cache rule Provide a value for the parameter Application based This type of invalidation is meant for a typical application design where the application has two fronts. A view front which consists of view pages and an update front which consists of pages which exclusively update the data of the cached view pages. That is, there is no other interaction with the data except for the application server. There are two things involved in these kind of invalidations: Defining an application based invalidation rule. Associating cache rule with the application based invalidation rule. Using this option, you can configure application based expiry of the Cache. Table 11: Configuring Application based Cache Expiry Fields Options Description Select Rule Input Mapping Type Source Maps To Value Select the application based invalidation rule from the drop down list provided. Specify which parameter (say, order_no for orderdetails.jsp) of the cached request should match which parameter (say, orderid for updateorder.jsp) of updation page. The first is referred as source and the other as target. Source can be "source-input-param", "source-cookie" or "source-request-header" and target can be "target-input-param", "target-cookie", "target-request-header" or an absolute value say "002" in our example. It must be kept in mind that: If source is "source-input-param" target has to be "target-input-param" or an absolute value. if source is "source-cookie" target has to be "target-cookie" or an absolute value. if source is "source-request-header" target has to be "target-request-header" or an absolute value. Select here the Input Mapping type from the drop-down list as Input Parameter, Cookie, or Request Header. Enter here the name of the source parameter. Select here whether the Mapping has to be set to a target parameter or some literal value. Provide a name for the target parameter or literal value based on the value of Maps To field. One application based invalidation rule can be referred by more than one cache rules. For example if there are two pages say orderlines.jsp and orderdetails.jsp,both depend on some common
19 CHAPTER 13 Working With Virtual Hosts on Pramati Server 141 JSP say updateorder.jsp, then we need to define an application based invalidation rule which is satisfied by updateorder.jsp and as and when a request comes to this rule the concerned cached content for orderdetails.jsp and orderlines.jsp will be invalidated. Configuring Input Parameters This mapping may be specified for a rule if the response varies based upon the presence of an inputparameter or the value of it. Provide the following details for Input Parameters: Table 12: Configuring Input Parameters Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the input parameter. Select the cache type from the drop down list provided. This parameter has three values - mandatory, disallowed and optional. It means that the input-parameter has to be present for the page to be cached. It means that the input-parameter must not be present for the page to be cached. This input-parameter is optional, but if it is present, its value must match the value in the rule for the input-parameter. Select whether a particular condition is to be used or not. Configuring Cookies This mapping may be specified for a rule if the response varies based upon the presence of a cookie or the value of it. Provide the following details for configuring cookies: Table 13: Configuring Cookies Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new cache rule. This is an optional value for the cookie. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the cookie has to be present for the page to be cached. It means that the cookie must not be present for the page to be cached. This cookie is optional, but if it is present, its value must match the value in the rule for the cookie. Default value is optional. Select whether a particular condition is to be used or not.
20 142 Pramati Server 3.5 Administration Guide Configuring Input, Cookie and Header strings Configuring Headers This mapping may be specified for a rule if the response varies based upon the presence of a requestheader or its value. Provide the following details for configuring Headers: Table 14: Configuring Headers Fields Options Description Name Value Exists Parameter in key mandatory disallowed optional Enter here a name for the new request-header. This is an optional value for the request-header. Select the cache type as mandatory, optional or disallowed, from the drop down list provided. It means that the request-header has to be present for the page to be cached. It means that the request-header must not be present for the page to be cached. It means that this request-header is optional, but if it is present, its value must match the value in the rule for the request-header. Default value is optional. Select whether a particular condition is to be used or not. Remember, for using this option, the Use Input Parameter field must be selected as specified.
21 CHAPTER 13 Working With Virtual Hosts on Pramati Server 143 Configuring URL Properties for a Virtual Host The URL Properties section displays details about masked directory/extensions that have been defined for applications defined on the Virtual Host. Editing URL Properties To view the URLs for a deployed application, you first need to deploy an application. If no application is deployed, the following screen is displayed: URL Properties of a Virtual Host To modify the URL properties information, click Edit. This displays the following screen:
22 144 Pramati Server 3.5 Administration Guide Editing URL Properties of a Virtual Host Using the above screen, you can select whether the Directory listing is to be enabled or disabled, select the Context Root, and add Masked Directories and Extensions. Adding Masked Directories If a directory is specified as masked, the contents of the directory are hidden, and any requests on them are not served. To add Masked Directories, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Directory.
23 CHAPTER 13 Working With Virtual Hosts on Pramati Server 145 Adding a Masked Directory Clicking Save adds the Masked Directory and takes you back to the URL Properties screen. Adding Masked Extensions If a file extension is masked, files of that type cannot be accessed. To add Masked Extensions, you must first select the Context Root from the drop-down list, and then click Add. On the screen that is displayed, provide the Name and Context Root for the Masked Extension. Clicking Save adds the Masked Extension and takes you back to the URL Properties screen. Deleting a Virtual Host To delete a Virtual Host, select it using the checkbox provided and click Delete. Note: You cannot delete the Default Virtual Host. Configuring web logs for a Virtual Host The web logs are used to maintain the logged records of the activities on the created Virtual Host. If the logging activity is disabled, the logs of activities being performed cannot be maintained. Clicking Edit in this section takes you to the following screen:
24 146 Pramati Server 3.5 Administration Guide Configuring web log properties Using this screen, you can specify the directory path where the log file would be generated, and enable or disable logging. By default, logging is enabled. Configuring global properties for a web server You can set the following global properties for a web server: Denial of Service attacks MIME Types Connections Socket Properties Read more about setting the global properties for a web server in Configuring Pramati Web Server. Deploying an application on a Virtual Host In an application deployment, the WAR may be deployed on a Virtual Host. To select the Virtual Host: Open the Deploy Tool and select the application to be deployed.
25 CHAPTER 13 Working With Virtual Hosts on Pramati Server 147 Click on Web Properties node to open the General properties panel. A list of Virtual Hosts is displayed at the bottom of the screen. Select the Virtual Host you need. Deploying an application on a Virtual Host If you select Default, the content is deployed on default Virtual Host. If no Virtual Host is configured, deployment is only on the default host. Accessing information from a Virtual Host When the Server receives a request, it checks for the name by which it is addressed. There are two possibilities: the name corresponds to one of the configured Virtual Hosts, and the Server tries to serve the content from the appropriate document root (public or secure) for that Virtual Host. the name is not found in the configuration file, and the request is served out of the default Virtual Host. Current limitations for Virtual Hosts Virtual Hosts run on the same port as the default host. No separate port number configuration is provided for them.
26 148 Pramati Server 3.5 Administration Guide
Monitoring Pramati Web Server
Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,
Configuring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS
HOW TO CONFIGURE PASS-THRU PROXY FOR ORACLE APPLICATIONS Overview of Oracle JInitiator Oracle JInitiator enables users to run Oracle Forms applications using Netscape Navigator or Internet Explorer. It
Configuring Microsoft IIS 5.0 With Pramati Server
Configuring Microsoft IIS 5.0 With Pramati Server 46 Microsoft Internet Information Services 5.0 is a built-in web server that comes with Windows 2000 operating system. An earlier version, IIS 4.0, is
Pass Through Proxy. How-to. Overview:..1 Why PTP?...1
Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x
Configuring Secure Socket Layer (SSL) for use with BPM 7.5.x Configuring Secure Socket Layer (SSL) communication for a standalone environment... 2 Import the Process Server WAS root SSL certificate into
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
An Introduction To The Web File Manager
An Introduction To The Web File Manager When clients need to use a Web browser to access your FTP site, use the Web File Manager to provide a more reliable, consistent, and inviting interface. Popular
LabVIEW Internet Toolkit User Guide
LabVIEW Internet Toolkit User Guide Version 6.0 Contents The LabVIEW Internet Toolkit provides you with the ability to incorporate Internet capabilities into VIs. You can use LabVIEW to work with XML documents,
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
ShoreTel Advanced Applications Web Utilities
INSTALLATION & USER GUIDE ShoreTel Advanced Applications Web Utilities ShoreTel Advanced Applications Introduction The ShoreTel Advanced Application Web Utilities provides ShoreTel User authentication
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Deploying Intellicus Portal on IBM WebSphere
Deploying Intellicus Portal on IBM WebSphere Intellicus Web-based Reporting Suite Version 4.5 Enterprise Professional Smart Developer Smart Viewer Intellicus Technologies [email protected] www.intellicus.com
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Securing Adobe connect Server and CQ Server
Securing Adobe connect Server and CQ Server To Enable SSL on Connect Server and CQ server (Index) Configure custom.ini File Uncomment the SSL TAGs in Server.xml file. Configure the Four components of connect
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
App Orchestration 2.5
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications
Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Configuring Load Balancing
When you use Cisco VXC Manager to manage thin client devices in a very large enterprise environment, a single Cisco VXC Manager Management Server cannot scale up to manage the large number of devices.
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
CloudOYE CDN USER MANUAL
CloudOYE CDN USER MANUAL Password - Based Access Logon to http://mycloud.cloudoye.com. Enter your Username & Password In case, you have forgotten your password, click Forgot your password to request a
Security Guidelines for MapInfo Discovery 1.1
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Diagnostic Manager. User Guide. Publication Date: September 04, 2015
Diagnostic Manager Publication Date: September 04, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip
Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
kalmstrom.com Business Solutions
HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...
Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław
Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6
Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
Quick Guide of HiDDNS Settings (with UPnP)
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
App Orchestration 2.5
App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
It should be noted that the installer will delete any existing partitions on your disk in order to install the software required to use BLËSK.
Installation Guide Introduction... 3 1. Booting from the CD... 4 2. Choose the server type to install... 5 3. Disk formatting and installation... 6 4. Confirmation of disk formatting... 7 5. Program installation...
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Table of Contents. This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync.
This whitepaper outlines how to configure the operating environment for MailEnable s implementation of Exchange ActiveSync. Table of Contents Overview... 2 Evaluating Exchange ActiveSync for MailEnable...
Description of Microsoft Internet Information Services (IIS) 5.0 and
Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
App Orchestration 2.0
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
Immersion Day. Creating an Elastic Load Balancer. Rev 2015-01
Rev 2015-01 Table of Contents Overview...3 Launch a Second Web Server...4 Create an ELB...6 Copyright 2015, Amazon Web Services, All Rights Reserved Page 2 Overview This lab will walk the user through
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft IIS Prerequisites and configuration
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
Ciphermail for BlackBerry Quick Start Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Quick Start Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. Introduction This guide will explain how to setup and configure a Ciphermail
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
KeyControl Installation on Amazon Web Services
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
V Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
SurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
MailFoundry Users Manual. MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved
MailFoundry User Manual Revision: MF2005071100 Copyright 2005, Solinus Inc. All Rights Reserved Page 1 of 91 Chapter 1: Introduction... 4 What are Spam Profiles?... 4 Models Covered In This Manual... 4
DDNS Management System User Manual V1.0
DDNS Management System User Manual V1.0 1 03/01/2012 Table of Contents 1. Introduction.3 2. Network Configuration 3 2.1. Configuring DDNS locally through DVR Menu..3 2.2. Configuring DDNS through Internet
Deploying the BIG-IP System v10 with Oracle Application Server 10g R2
DEPLOYMENT GUIDE Deploying the BIG-IP System v10 with Oracle Application Server 10g R2 Version 1.1 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Oracle s Application Server 10g
Working Folder Linkage Setup Guide
For models listed below, see the respective "Working Foloder Linkage Setup Guide". wfs-mfp-installguide-09_en.pdf - ApeosPort-IV C5570/C4470/C3371/C3370/C2270 - ApeosPort-IV C7780/C6680/C5580 - ApeosPort-IV
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE
Jeff Schertz MVP, MCITP, MCTS, MCP, MCSE A comprehensive excerpt from Jeff Schertz s Lync Server MVP Blog Lync Web Services Load Balancing with KEMP VLM This article addresses a standard DNS Load Balanced
KB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5
DEPLOYMENT GUIDE DEPLOYING THE BIG-IP LTM SYSTEM WITH CITRIX PRESENTATION SERVER 3.0 AND 4.5 Deploying F5 BIG-IP Local Traffic Manager with Citrix Presentation Server Welcome to the F5 BIG-IP Deployment
Working with WebSphere 4.0
44 Working with WebSphere 4.0 This chapter is for developers who are familiar with WebSphere Application Enterprise Server, version 4.0 (WAS 4.0) and would like to deploy their applications using WAS 4.0.
About Email Archiving for Microsoft Exchange Server
Setup Guide Revision A McAfee SaaS Email Archiving Service Configuring Microsoft Exchange Server 2013 About Email Archiving for Microsoft Exchange Server The McAfee SaaS Email Archiving service stores
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5 Deploying F5 with Microsoft IIS 7.0 and 7.5 F5's BIG-IP system can increase the existing benefits of deploying
PaperCut Payment Gateway Module CyberSource Quick Start Guide
PaperCut Payment Gateway Module CyberSource Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and testing the
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ
CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting
