iTP Secure WebServer System Administrators Guide (Version 7.5+)

Restarting the iTP Secure WebServer Using the restarth Script.......................................................83
For TCP/IPv6 and IP CIP Support.........................................................................................83
For Classical TCP/IP Support...............................................................................................84
Restarting the iTP Secure WebServer Using the restart Script.........................................................84
Updating the serverclasses Using the updatesc Script..................................................................84
Using the httpd Command.......................................................................................................85
Syntax..............................................................................................................................85
Description........................................................................................................................87
PATHMON Environment's Autorestart for the iTP Secure WebServer and Related Processes...............88
Collecting httpd Statistics Using statscom...................................................................................88
statscom Command............................................................................................................88
Collecting Webserver Statistics Using timestat script................................................................92
6 Configuring the iTP Secure WebServer........................................................94
Configuring Your Server..........................................................................................................94
The httpd Configuration File.................................................................................................94
Configuring Your Server for Use With TCP/IPv6 or IP CIP........................................................97
The Secure Transport Configuration File (httpd.stl.config).........................................................97
Configuring Global Session Key Caching..............................................................................97
Other Configuration Files....................................................................................................99
Managing Server Contents......................................................................................................99
Understanding How URLs Work...........................................................................................99
Mapping Requests to Contents.............................................................................................99
Establishing User Directories..............................................................................................104
Using Guardian Files........................................................................................................104
Controlling File Caching........................................................................................................105
FileStatsCheckTime...........................................................................................................106
CacheTime......................................................................................................................106
MaxFileCacheEntries........................................................................................................107
MaxFileCacheContentSize.................................................................................................107
NoCache Region Command.............................................................................................108
Managing Log Files..............................................................................................................108
Choosing a Log Format.....................................................................................................108
Planning Space for Logs...................................................................................................109
Rotating Log Files.............................................................................................................110
Setting Up Server Aliases.......................................................................................................111
How Aliases Work...........................................................................................................111
Why Aliases Are Useful....................................................................................................111
Setting Up an Alias..........................................................................................................112
Controlling Access to the Server.............................................................................................112
Using Region Directives....................................................................................................112
Granting Access by Host Name/IP Address........................................................................113
Denying Access by Host Name/IP Address.........................................................................114
Requiring Client Authentication..........................................................................................114
Administering Passwords...................................................................................................115
Redirecting Access...........................................................................................................116
Enabling Automatic Directory Indexing...............................................................................117
Disabling Logging............................................................................................................118
Using Multiple Region Commands.....................................................................................118
Using Pattern Variables (Lists).............................................................................................119
Using Conditional Commands...........................................................................................120
Using Tcl Variables...........................................................................................................120
Allowing Byte Ranges.......................................................................................................122
Implementing Multiple-Host Support...................................................................................123
Customizing Server Error Messages........................................................................................126
Contents 5