LECTURE 6 NETWORK SERVICES PART2: WEB SERVICE
|
|
|
- Shanon Joseph
- 9 years ago
- Views:
Transcription
1 SYSTEM ADMINISTRATION MTAT LECTURE 6 NETWORK SERVICES PART2: WEB SERVICE Prepared By: Amnir Hadachi and Artjom Lind University of Tartu, Institute of Computer Science [email protected] / [email protected] 1
2 OUTLINE Web server: 1.Apache 2.Virtual hosts 3.Common directives 4.Log analyzers 5.FTP filer server 6.NFS file server 7.Windows shares with Samba 8.HTTP/FTP proxy 9.LDAP directory 2
3 1. APACHE 3
4 APACHE INFO: what is web server? It is a computer program capable of accepting Hypertext Transfer Protocol (HTTP) request from clients (known as web browsers) and serving them HTTP responses along with optional data contents (known as web pages). INFO: Apache is the most widely used web server; however, there are others which can offer better performance with lack of certain features and modules. (e.g. other web servers: nginx, lightpd,etc.) Apache installation is done via installing the apache package The name apache comes from the concept of extensive patching of existing code Why apache because it is: Free or available at reasonable price 4
5 APACHE Apache2 packages contains many modules even MPM: Multi-processing modules (MPM), Gives apache the ability to handle parallel processing of many requests. MPM strongly affects the way apache works and handles threads INFO: (FULL LIST OF MODULES) 5
6 APACHE Apache web server characteristics: Apache supports many features, many are implemented as compiled modules that extend the core functionality. These can range from server-side programming language support to authentication schemes. Apache contains also compression modules such as: mod-gzip that helps in reducing the size of web pages served over HTTP. 6
7 APACHE Apache core components: Component Description http_protocol.c http_main.c These components are in charge of handling other extensions and their processes in order to keep the good functioning of the server. as example Authentication. http_request.c http_core.c 7 Its the handle of all the basic functionality of the server like allocating requests, pooling all the connections,etc.
8 APACHE Core components interactions: HTTP_MAIN (SERVER LOOP) to/from HTTP client HTTP_PROTOCOL (IMPLEMENTATION) HTTP_REQUEST (PHASES OF REQUEST) de-patch to modules HTTP_CORE (MAIN FUNCTIONALITY) UTILITIES ALLOC (RES POOLS) 8
9 APACHE Handling Requests 9 source:
10 2. VIRTUAL HOST 10
11 VIRTUAL HOSTS QUOTE: A virtual host is an extra identity for the web server DEFINITION: Virtual hosts means running multiple virtual web sites in one system. Virtual hosts types: Virtual hosts based on the IP address Virtual hosts based on the domain name of the web server. 11
12 VIRTUAL HOSTS Virtual hosts types: Virtual hosts based on the IP address: Requires allocating a different IP address for each site. Virtual hosts based on the domain name of the web server: Can work only on a single IP address Sites are differentiated by the hostname sent by the HTTP client. 12
13 VIRTUAL HOSTS Virtual hosts are described by a file: location: /etc/apache2/sites-available/ EXAMPLE: THE /ETC/APACHE2/SITES-AVAILABLE/ FILE <VirtualHost *:80> ServerName ServerAlias myspace.ee DocumentRoot /srv/www/ </VirtualHost> 13
14 VIRTUAL HOSTS Virtual hosts log file: uses one log file for all virtual hosts (defaults) Can be modified by adding Customlog directives in the definition of the virtual host. Location: /etc/apache2/conf-available/customlog.conf And enabling it with a2enconf customlog EXAMPLE: THE /ETC/APACHE2/CONF.D/CUSTOMLOG.CONF FILE # New log format including (virtual) host name LogFormat %v %h %l %u %t \ %r\ %>s %b \ %{Referer}i\ \ %{User-Agent}i\ vhost # Now let s use this vhost format by default CustomLog /var/log/apache2/access.log vhost 14
15 3. COMMON DETECTIVES ConFig 15
16 COMMON DETECTIVES OBJECTIVE: In this section we will try to focus on putting the spot light on the commonly used Apache configuration detectives. The main directives are related to: Directive blocks Requiring authentication Restricting access 16
17 COMMON DETECTIVES Directory blocks: DEFINITION: The main configuration file contains usually many directive block. this latter allow the specification of different behaviors for the server depending the location of the file being served. (e.g. block which includes Options & AllowOverride) EXAMPLE: DIRECTORY BLOCK <Directory /var/www> Options Includes FollowSymlinks AllowOverride All DirectoryIndex index.php index.html index.htm </Directory> 17
18 COMMON DETECTIVES Directory blocks Within the directory blocks we have: DirectoryIndex Options AllowOverride 18
19 COMMON DETECTIVES Directory blocks DirectoryIndex: INFO: DirectoryIndex contains a list of file to try when the client request matches a directory. The first file existing in the list is used and sent as a answer. 19
20 COMMON DETECTIVES Directory blocks Options: INFO: Options directive is followed by a list of options to enable. (None value disable all the options) Option Description ExecCGI Means CGI scripts can be executed FollowSymlinks SymlinksIfOwnerMatch MultiViews 20 Means symbolic links can be followed Tells the server to follow symbolic links, but only when the link and the its target have the same owner. Enables content negotiation
21 COMMON DETECTIVES Directory blocks AllowOverride: INFO: AllowOverride directive lists all the options that can be enabled or disabled by way of a.htaccess file. 21
22 COMMON DETECTIVES Requiring authentication: INFO: In some case it is necessary to restrict the access to some parts of the website; therefore, only the appropriate users can access by providing a username and password. EXAMPLE:.HTACCESS FILE REQUIRING AUTHENTICATION Require valid-user AuthName Private directory AuthType Basic AuthUserFile /etc/apache2/authfiles/htpasswd-private 22
23 COMMON DETECTIVES Requiring authentication: AuthUserFile /etc/apache2/authfiles/htpasswd-private INFO: The /etc/apache2/authfiles/htpasswd-private file contains a list of users and their passwords. it is commonly manipulated with the htpasswd command. EXAMPLE COMMAND TO ADD USERS OR CHANGE THEIR PASSWORDS # htpasswd /etc/apache2/authfiles/htpasswd-private user New password: Re-type new password: Adding password for user user 23
24 COMMON DETECTIVES Restricting Access: INFO: Restricting access is used to control access to specific directories and their subdirectories recursively based on many criteria. Example of type of restrictions: based on IP ONLY ALLOW FROM THE LOCAL NETWORK Order deny,allow Allow from /16 Deny from all 24
25 4. LOG Logs ANALYZERS 25
26 LOG ANALYZERS INFO: Log analyzers are useful for following the activity on your websites and the most important gives the administrators a praise idea about usage patterns on their web servers. Example of Log analyzer advanced web statistics AWStats. 26
27 LOG ANALYZERS AWStats: configuration: can be customized through cons file, location: /etc/awstats/awstats.conf EXAMPLE AWSTATS CONFIGURATION FILE AND ITS PARAMETERS LogFile= /var/log/apache2/access.log LogFormat = %virtualname %host %other %logname %time1 %methodurl %code %bytesd % å refererquot %uaquot SiteDomain= HostAliases= myspace.ee REGEX[^.*\.myspace\.ee$] DNSLookup=1 LoadPlugin= tooltips 27
28 LOG ANALYZERS AWStats: Access to stats: AWStats statistics are web based and there no restriction in accdeissnf them by default; however, it is possible to put access restriction based on IP addresses using AllowAccessFromWebToFollowingIPAddresses parameter For each virtual host you need AWStats configuration file associate to it. EXAMPLE: AWSTATS CONFIGURATION FILE FOR A VIRTUAL HOST Include /etc/awstats/awstats.conf SiteDomain= HostAliases= myspace.ee 28
29 CAUTION: To make AWStats take into account all the logs file it needs to be run right before the Apache log files are rotated. This matter can be solved by looking at the perorate directive /etc/ logrotate.d/apache2 file and adding a symlink to /usr/share/awstats/ tools/update.sh in /etc/ logrotate.d/httpdprerotate LOG ANALYZERS $ cat /etc/logrotate.d/apache2 /var/log/apache2/*.log { daily missingok rotate 14 compress delaycompress notifempty create 644 root adm sharedscripts postrotate if /etc/init.d/apache2 status > /dev/null ; then \ /etc/init.d/apache2 reload > /dev/null; \ fi; endscript prerotate if [ -d /etc/logrotate.d/httpd-prerotate ]; then \ run-parts /etc/logrotate.d/httpd-prerotate; \ fi; \ endscript } $ sudo mkdir -p /etc/logrotate.d/httpd-prerotate $ sudo ln -sf /usr/share/awstats/tools/update.sh \ /etc/logrotate.d/httpd-prerotate/awstats 29
30 5. FTP FILE SERVER 30
31 FTP FILE SERVER DEFINITION: File Transfer Protocol (FTP) was issued in 1985 and it was used to distribute files before web was even born. it allows both file upload and downloads. FTP Commands FTP Replies FTP Client Data Connection FTP Server 31
32 FTP FILE SERVER Requirement for using FTP: FTP client installed on your machine Information about FTP server FTP server address authentication access (username, password) 32
33 FTP FILE SERVER FTP Client has two modes of connection: Active mode Active FTP connection, the client opens a port and listens and the server actively connects to it Passive mode The server opens a port and listens (passively) and the client connects to it 33
34 6. NFS FILE SERVER 34
35 NFS FILE SERVER DEFINITION: Network File System (NFS) is a protocol allowing remote access to a filesystem via the network. Limitation: The latest version is hard to configure, Managing the security features such as authentication or encryption is not a straight forward task, 35
36 NFS FILE SERVER NFS Procedures: Procedures Functions LOOKUP MKDIR RMDIR READDIR RENAME REMOVE CREATE READ WRITE GETATTR SETATTR Returns a file handle and attribute corresponding to a file name in a specified directory Create a directory Delete a directory Read a directory Rename a file Delete a file Create a file Read from a file, by specify the file handle, starting offset and max. no. of bytes to read (up to 8192). Write to a file Returns the attributes of a file: type of file, permissions, size, owner, last-access time, and so on. Set the attributes of a file: permissions, owner, group, size,and last-access and lastmodification time. 36
37 NFS FILE SERVER NFS Procedures: Procedures Functions LINK Create a Unix hard link to a file. SYMLINK Create a symbolic link to a file. READLINK Returns the name of the file to whidh the symbolic link points. STATFS Returns the status of a file system. Used by the Unix df command, for example. 37
38 NFS FILE SERVER Securing NFS: Easy way is to use kerberos-based security features If not: Ensure that NFS can get connected to RPC servers. Firewall is up and must block IP spoofing. DEFINITION: RCP Remote Procedure Call is a UNIX standard for remote services. 38
39 DONEC QUIS NUNC NFS Server: One configuration file: /etc/exports Defines a location, a list of authorized clients, and options Client identified by: 1.Machine name 2. Wildcards on a domain name 3.A netgroup (if NIS is used) An IP address Options include: rw, ro, root_squash, all_squash, anonuid 39
40 DONEC QUIS NUNC NFS Server start: Start rpc.mountd and rpc.nfs Optionally start rpc.statd and rpc.lockd Use rpcinfo p to check if working Files: 1. /var/lib/nfs/rmtab contains client information 2. /var/lib/nfs/etab contains detailed export information 3. /proc/fs/nfs/exports contains list of clients 4. /var/lib/nfs/xtab contains explicit machine names If /etc/export is updated use exportfs command to inform servers 40
41 DONEC QUIS NUNC NFS Client: MANUALLY MOUNTING WITH THE MOUNT COMMAND # mount -t nfs4 -o rw,nosuid arrakis.internal.myspace.ee:/shared /srv/ EXAMPLE: NFS ENTRY IN THE /ETC/FSTAB FILE arrakis.internal.myspace.ee:/shared /srv/shared nfs4 rw,nosuid
42 NFS FILE SERVER NFS Protocol USER PROCESS NFS SERVER LOCAL FILE ACCESS LOCAL FILE ACCESS CLIENT KERNEL NFS CLIENT RPC TCP/UDP IP RPC TCP/UDP IP port 2077 SERVER KERNEL local disk local disk 42
43 7. WINDOWS SHARES WITH SAMBA 43
44 WINDOWS SHARES WITH SAMBA Samba DEFINITION: Samba is a tool that helps handling Server Message Block protocol (SMB) on linux (also known as CIFS). This protocol is used by windows for network shares and shared printers. It is also used as a windows domain controller. Besides, it is an good tool for ensuring seamless integration of linux servers and the office desktop machines still running windows. DEFINITION: SMB protocol operates as an application layer for network protocol and it is used for providing shared access to files, printers, and ports. in addition, it can also integrate authentication in the inter-processes communication mechanism. 44
45 WINDOWS SHARES WITH SAMBA Samba server The Samba 4 package contains two main processes/servers: smbd nmbd To start Samba three ways: Manually As stand-alone daemons From inetd 45
46 WINDOWS SHARES WITH SAMBA Samba server Configuration with debconf Installation by default put the stick minimum configuration is done. For configuring: run dpkg-reconfigure samba-common info needed: name of the workgroup package process the identification of WINS server 46
47 WINDOWS SHARES WITH SAMBA Samba server Configuration manually The change should be affected to smb.conf [global] ## Browsing/Identification ### # Change this to the workgroup/nt-domain name your Samba server will part of workgroup = FALCOTNET # Windows Internet Name Serving Support Section: # WINS Support - Tells the NMBD component of Samba to enable its WINS Server wins support = yes x [ ] ####### Authentication ####### # Server role. Defines in which mode Samba will operate. Possible # values are standalone server, member server, classic primary # domain controller, classic backup domain controller, active # directory domain controller. # # Most people will want standalone sever or member server. # Running as active directory domain controller will require first # running samba-tool domain provision to wipe databases and create a # new domain. server role = standalone server # security = user is always a good idea. This will require a Unix account # in this server for every user accessing the server. security = user x [...] 47 INDICATES THAT SAMBA SHOULD ACT AS A NETBIOS NAME SERVER (WINS) FOR THE LOCAL NETWORK THIS IS THE DEFAULT VALUE FOR THIS PARAMETER; HOWEVER, SINCE IT IS CENTRAL TO THE SAMBA CONFIGURATION, FILLING IT EXPLICITLY IS RECOMMENDED. EACH USER MUST AUTHENTICATE BEFORE ACCESSING ANY SHARE.
48 WINDOWS SHARES WITH SAMBA Samba server Configuration manually Each Samba user needs an account on the server steps: Create unix account user need to register to Samba database 48
49 WINDOWS SHARES WITH SAMBA Samba client INFO: The Samba client has interesting features that allow linux machine to access Windows shares and shared printers. needed programs are available in cifs-utils and smbclient packages. Mounting Windows Shares INFO: The mount command allows mounting a windows share into linux file system hierarchy. it has also many options that can be added in the command. EXAMPLE: MOUNTING A WINDOWS SHARE mount -t cifs //arrakis/shared /shared \ -o credentials=/etc/smb-credentials 49
50 WINDOWS SHARES WITH SAMBA Samba client Share printers Example CUPS which allows installing Windows shared printers automatically. 50
51 WINDOWS SHARES WITH SAMBA Samba client Share printers Requires steps with CUPS: Enter the CUPS configuration interface: Click on Add Printer. Choose the printer device, pick Windows Printer via SAMBA. Enter the connection URI for the network printer. It should look like the following: Enter the name that will uniquely identify this printer. Then enter the description and location of the printer. Those are the strings that will be shown to end users to help them identify the printers. Indicate the manufacturer /model of the printer, or directly provide a working printer description file (PPD). 51
52 8. HTTP/FTP PROXY 52
53 HTTP/FTP PROXY DEFINITION: HTTP/FTP Proxy acts as an intermediary for HTTP and/or FTP connections. it has two roles: 1.Cashing: downloaded document are copied locally, this way multiple downloads are avoided. 2.Filtering server: in case of use of the proxy then this latter determines whether or not the request is to be granted. Concept: 1. User request web content ProxySG 2. Web request 3. Web content returned 4. User 5. User receives web content STORED IN PROXYSG CACHE Internet 53
54 HTTP/FTP PROXY Installation: Debian package: squid3 contains only modular caching proxy. Needs: squidguard package: gives it filtering ability squid-cgi package: gives it querying and administration interface for a Squid proxy. 54
55 HTTP/FTP PROXY Cache configuration: Enabling the caching need editing the file: /etc/squid3/ squid.conf THE /ETC/SQUID3/SQUID.CONF FILE (EXCERPTS) # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS # Example rule allowing access from your local networks. Adapt # to list your (internal) IP networks from where browsing should # be allowed acl our_networks src / /24 http_access allow our_networks http_access allow localhost # And finally deny all other access to this proxy http_access deny all 55
56 HTTP/FTP PROXY Filter configuration: squid does not handle filtering, it is delegated to squidguard. Enabling squidguard need configuration in the file: /etc/squid3/ squid.conf For more info on how to create the file: adding url: url_rewrite_program /usr/bin/squidguard -c /etc/squid3/squidguard.conf reload service squid3 All the policies should be defined by the admin can be done by creating the /etc/squid3/squidguard.conf file For more info on how to create the file: 56
57 9. LDAP DIRECTORY 57
58 LDAP DIRECTORY INFO: Lightweight Directory Access Protocol (LDAP), is an Internet protocol that and other programs use to look up information from a server. LDAP Main Role: Defines a standard method for accessing and updating information in a directory. 58
59 LDAP DIRECTORY LDAP: Advantages Disadvantages Handle well information referenced by many entities Very bad in handling information that changes often Handle well multi-location accessing the same information Very bad in handling unstructured information Handle well information that is read more than written 59
60 LDAP DIRECTORY LDAP models: Information: Structure of the information stored in the LDAP directory. Naming: How the information is organized and identified. Functional / operations: Described which can of operations can be performed on the LDAP directory. Security: Shows how the information is protected and secured. 60
61 LDAP DIRECTORY LDAP directory information tree (DIT): EXAMPLE OF DIT The data is stored in entries. These entries are ordered in tree nodes. Example of Tool in debian OpenLDAP source: 61
The course will be run on a Linux platform, but it is suitable for all UNIX based deployments.
Linux Apache Web Server Administration Course Description: The Linux Apache Web Server Administration course is aimed at technical staff who will be responsible for installing, configuring and maintaining
Installing Apache Software
Web Server Web Server Is a software application that uses the HyperText Transfer Protocol. Running on computer connected to Internet. Many Web Server software applications: Public domain software from
Samba on HP StorageWorks Enterprise File Services (EFS) Clustered File System Software
Samba on HP StorageWorks Enterprise File Services (EFS) Clustered File System Software Installation and integration guide Abstract... 2 Introduction... 2 Application overview... 2 Application configuration...
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
1Intro. Apache is an open source HTTP web server for Unix, Apache
Apache 1Intro Apache is an open source HTTP web server for Unix, Microsoft Windows, Macintosh and others, that implements the HTTP / 1.1 protocol and the notion of virtual sites. Apache has amongst other
Linux Squid Proxy Server
Linux Squid Proxy Server Descriptions and Purpose of Lab Exercise Squid is caching proxy server, which improves the bandwidth and the reponse time by caching the recently requested web pages. Now a days
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP)
Administrasi dan Manajemen Jaringan 2. File Transfer Protocol (FTP) M. Udin Harun Al Rasyid, Ph.D http://lecturer.eepis-its.edu/~udinharun [email protected] Lab Jaringan Komputer (C-307) Table of
Debian and Windows Shared Printing mini HOWTO
Debian and Windows Shared Printing mini HOWTO Ian Ward 2005 07 01 Revision History Revision 1.6 2005 07 01 Revised by: iw Clarified hpijs requirement, added lpinfo and lpoptions
Real Vision Software, Inc.
Real Vision Software, Inc. Configuring an IBM i host for SSL These steps take you through configuring an IBM i host to run Secure Sockets Layer (SSL) as a self-signed Certificate Authority (CA). The Digital
SVNManager Installation. Documentation. Department of Public Health Erasmus MC University Medical Center
SVNManager Installation Documentation M. Verkerk Department of Public Health Erasmus MC University Medical Center Page 2 July 2005 Preface Version control in the context of this document is all about keeping
Setting up a Squid-Proxy Server
LinuxFocus article number 235 http://linuxfocus.org Setting up a Squid-Proxy Server by D.S. Oberoi About the author: D.S. Oberoi lives in Jammu, India and has currently problems
"Charting the Course... Enterprise Linux Networking Services Course Summary
Course Summary Description This an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days
GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES COURSE DESCRIPTION: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Comparison table for an idea on features and differences between most famous statistics tools (AWStats, Analog, Webalizer,...).
What is AWStats AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically. This log analyzer works as a CGI or from command line
Back Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
GL275 - ENTERPRISE LINUX NETWORKING SERVICES
Length: 5 days The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely,
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
How To Analyze Logs On Aloha On A Pcode On A Linux Server On A Microsoft Powerbook (For Acedo) On A Macbook Or Ipad (For An Ubuntu) On An Ubode (For Macrocess
Application Note Analyze ALOHA s HAProxy logs with halog Document version: v1.1 Last update: 3rd September 2013 Purpose Being able to analyze logs generated by the ALOHA Load-Balancer stored in a third
Web Server Manual. Mike Burns ([email protected]) Greg Pettyjohn ([email protected]) Jay McCarthy ([email protected]) November 20, 2006
Web Server Manual Mike Burns ([email protected]) Greg Pettyjohn ([email protected]) Jay McCarthy ([email protected]) November 20, 2006 Copyright notice Copyright c 1996-2006 PLT Permission is
Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team
Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid
Secure Network Filesystem (Secure NFS) By Travis Zigler
Secure Network Filesystem (Secure NFS) By Travis Zigler Overview of Secure NFS Problems with NFS Security of Basic NFS Configurations Securing NFS with SSH Tutorial Securing NFS with SSL Overview Conclusions
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
What is included in the ATRC server support
Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
1. What is this? Why would I want it?
HOWTO - Jeanne, redirector for Squid Reverse Proxy Vincent Berk (c)2001 [email protected] GNU/GPL Marion Bates (c) 2001 [email protected] Installation Guide with Examples (ALPHA distribution)
WEB2CS INSTALLATION GUIDE
WEB2CS INSTALLATION GUIDE FOR XANDMAIL XandMail 32, rue de Cambrai 75019 PARIS - FRANCE Tel : +33 (0)1 40 388 700 - http://www.xandmail.com TABLE OF CONTENTS 1. INSTALLING WEB2CS 3 1.1. RETRIEVING THE
Introduction... 1. Connecting Via FTP... 4. Where do I upload my website?... 4. What to call your home page?... 5. Troubleshooting FTP...
This guide is designed to show you the different ways of uploading your site using ftp, including the basic principles of understanding and troubleshooting ftp issues. P a g e 0 Introduction... 1 When
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
CIA Lab Assignment: Web Servers
CIA Lab Assignment: Web Servers A. Bakker N. Sijm C. Dumitru J. van der Ham Feedback deadline: October 17, 2014 10:00 CET Abstract Web servers are an important way of putting information out on the Internet
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
MINIMUM INSTALLATION REQUIREMENTS Processor: RAM: Hard disk: Operating system: Others: Pentium 200 MHz. 64 MB. 80 MB free space. One of the following: Red Hat (version 7.0, 7.1, 7.2, 7.3, 8.0, 9 or Enterprise
Fiery EX4112/4127. Printing from Windows
Fiery EX4112/4127 Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45083884 01 April 2009 CONTENTS 3 CONTENTS
Apache and Virtual Hosts Exercises
Apache and Virtual Hosts Exercises Install Apache version 2 Apache is already installed on your machines, but if it was not you would simply do: # apt-get install apache2 As the root user. Once Apache
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03
APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically
# Windows Internet Name Serving Support Section: # WINS Support - Tells the NMBD component of Samba to enable its WINS Server ; wins support = no
Sample configuration file for the Samba suite for Debian GNU/Linux. This is the main Samba configuration file. You should read the smb.conf(5) manual page in order to understand the options listed here.
Installing AWStats on IIS 6.0 (Including IIS 5.1) - Revision 3.0
AWStats is such a great statistical tracking program to use, but there seems to be a lack of easy-tofollow documentation available for installing AWStats on IIS. This document covers the basic setup process
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
How to setup FTP and Secure FTP for XD Series
How to setup FTP and Secure FTP for XD Series Use the following steps prior to enabling support for FTP services on XD Series: 1) Create NAS volume and Share(s) 2) Create Users and Groups 3) Select an
Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced
SonicOS Enhanced Using Single Sign-on with Samba Using Single Sign-on with Samba Introduction Recommended Versions Caveats SonicWALL Single Sign-on in Windows SonicWALL Single Sign-on with Samba Checking
Apache Configuration
Apache Configuration In this exercise, we are going to get Apache configured to handle a couple of different websites. We are just going to use localhost (the default address for a server), but the same
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
FTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main
Distributed File Systems. NFS Architecture (1)
COP 6611 Advanced Operating System Distributed File Systems Chi Zhang [email protected] NFS Architecture (1) a) The remote access model. (like NFS) b) The upload/download model (like FTP) 2 1 NFS Architecture
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Common Internet File System
Common Internet File System Hari Muzumdar September, 2009 Technical Update Days, Germany, 2009 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
Redmine Installation on Debian. v1.1
Redmine Installation on Debian v1.1 Introduction 1. Objectives Have a fully functional Redmine installation on a dedicated server with good performance. The idea of this document came after an easy installation
C:\www\apache2214\conf\httpd.conf Freitag, 16. Dezember 2011 08:50
This is the main Apache HTTP server configuration file. It contains the configuration directives that give the server its instructions. See for detailed information.
Configuring Your Gateman Proxy Server
Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching
Dragonframe License Manager User Guide Version 1.2.2
Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support ([email protected])
Configure thin client settings locally
This chapter contains information to help you set up your thin client hardware, look and feel, and system settings using the Control Center. Tip While it is not recommended to use dialog boxes for configuring
Lab Tasks 1. Configuring a Slave Name Server 2. Configure rndc for Secure named Control
Khóa học bao trùm tất cả các vấn đề về dịch vụ mạng trong doanh nghiệp bao gồm: khái niệm DNS, triển khai DNS sử dụng Bind; khái niệm LDAP và sử dụng OpenLDAP; dịch vụ Web với Apache; dịch vụ FTP với vsftpd;
Security Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
Presented by Henry Ng
Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows
Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
Implementing HTTPS in CONTENTdm 6 September 5, 2012
Implementing HTTPS in CONTENTdm 6 This is an overview for CONTENTdm server administrators who want to configure their CONTENTdm Server and Website to make use of HTTPS. While the CONTENTdm Server has supported
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
SAMBA SERVER (PDC) Samba is comprised of a suite of RPMs that come on the RHEL/Fedora CDs. The files are named:
SAMBA SERVER (PDC) INTRODUCTION Samba is a suite of utilities that allows your Linux box to share files and other resources, such as printers, with Windows boxes. This lesson describes how you can make
imhosted Web Hosting Knowledge Base
imhosted Web Hosting Knowledge Base FTP & SSH Category Contents FTP & SSH 1 What is SSH and do you support it? 1 How do I setup and use SSH? 1 Will I have unlimited access to update my pages? 2 What is
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Secure configuration of NFS on Windows 2008 Server for WebDocs iseries
Technical Support WebDocs Secure configuration of NFS on Windows 2008 Server for WebDocs iseries Setting up NFS on Windows in a secure manner can be done, but it can be tricky as it requires translating
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Greenstone Documentation
Greenstone Documentation Web library and Remote Collection Building with GLI Client Web Library. This enables any computer with an existing webserver to serve pre-built Greenstone collections. As with
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
While are you still in Nagios working directory, create a new file for DNS servers monitoring
NAGIOS MONITORING ----------------- On AUTH1 server 1. Go to Nagios working directory $ cd /usr/local/etc/nagios 2. Copy Nagios sample files To do this, make sure you are in Nagios working directory from
W3Perl A free logfile analyzer
W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed
HP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
Samba File Sharing 1 of 17. File Sharing. Hal Miller & Leeland Artra. Notes:
Samba File Sharing 1 of 17 File Sharing By Hal Miller & Leeland Artra Samba File Sharing 2 of 17 Presentation Overview What is Samba What is SMB What is CIFS Samba Parts Trouble Shooting Discussion of
Installation and Deployment
Installation and Deployment Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Installation and Deployment SmarterStats
Securing the Apache Web Server
Securing the Apache Web Server Jaqui Lynch Mainline Information Systems Email [email protected] Session I12 Agenda Anatomy of a Web Transaction General Firewall and Network Web Server Parameters
