Documentation

IBM Internet Connection Server for Windows NT Version 4

Up and Running!


Table of Contents

Part 1. The IBM Software Servers

  • Chapter 1. Introducing IBM's Software Servers

  • Chapter 2. More about the IBM Internet Connection Server
  • Installing and Configuring the Server
  • Using Other Programs with the Server
  • Restricting Access
  • Mapping Resources
  • Logging Requests and Errors
  • Running the Server as a Caching Proxy

  • Part 2. Planning for and Installing the Internet Connection Server

  • Chapter 3. Planning for Installation
  • Check READ.ME
  • Hardware Requirements
  • Software Requirements
  • Compatibility
  • Chapter 4. Installing the Server
  • Preparing to Install
  • Step-by-Step Installation Procedures
  • Uninstalling
  • What Next?

  • Part 3. Using the Internet Connection Server

  • Chapter 5. Starting to Use Your Server
  • Starting and Stopping the Server
  • Starting from the Internet Connection Server Icon
  • Starting from the Command Prompt
  • Restarting from the Internet Connection Server Window
  • Restarting from the Configuration and Administration Forms
  • Stopping the Server
  • Viewing the Internet Connection Server Front Page
  • Changing the Default Home Page
  • Understanding the Document Root Directory
  • Understanding the Default List of Welcome Pages
  • Creating Your Own Home Page
  • Backing Up Files
  • Chapter 6. Changing the Default Configuration
  • Configuring the Server
  • Using the Configuration and Administration Forms
  • Editing the Configuration File
  • Controlling Access to the Configuration and Administration Forms
  • Changing Your Document Root Directory
  • Running Your Server as a Caching Proxy
  • Overview of Caching Proxy Servers
  • Configuring a Caching Proxy Server
  • Controlling Who Can Use the Proxy
  • Running a Proxy and Standard Server on the Same Host
  • Chapter 7. Protecting Your Server
  • Defending the Internet Connection Server
  • Step 1. Activating Protection
  • Step 2. Passing Requests
  • Step 3. Deciding What Type of Protection to Use
  • User Name and Password Protection
  • Address Template Protection
  • How the Server Processes Requests
  • Step 4. Creating Protection Setups
  • Identifying the Protection Setup to Requesters
  • Specifying the Type of Authentication
  • Pointing to the Password File
  • Pointing to a Server Group File
  • Specifying Valid User Names, Groups, and Addresses
  • Step 5. Limiting Access to Individual Files
  • Using Server Group Files
  • Using Access Control List (ACL) Files
  • Protection Example
  • Chapter 8. Using the Configuration File
  • Basic
  • DNS-Lookup - Specify whether you want to look up host names of clients
  • HostName - Specify the fully qualified host name for the server
  • Port - Specify the port on which you want the server to listen for requests
  • ServerRoot - Specify the directory where the server program is installed
  • Directories and Welcome Page
  • AddBlankIcon - Specify the icon URL used to align the heading of directory listings
  • AddDirIcon - Specify the icon URL for directories on directory listings
  • AddIcon - Bind an icon to a MIME content-type or encoding-type
  • AddParentIcon - Specify the icon URL for a parent directory on directory listings
  • AddUnknownIcon - Specify the icon URL for unknown file types on directory listings
  • AlwaysWelcome - Specify if a welcome file is returned for all directory requests
  • DirAccess - Control directory listings
  • DirReadme - Control directory README files
  • DirShowBrackets - Use brackets around alternative text on directory listings
  • DirShowBytes - Show byte count for small files on directory listings
  • DirShowCase - Use case when sorting files on directory listings
  • DirShowDate - Show date last modified on directory listings
  • DirShowDescription - Show descriptions for files on directory listings
  • DirShowHidden - Show hidden files on directory listings
  • DirShowIcons - Show icons in directory listings
  • DirShowMaxDescrLength - Set the maximum description length on directory listings
  • DirShowMaxLength - Set the maximum length for file names on directory listings
  • DirShowMinLength - Set the minimum length for file names on directory listings
  • DirShowSize - Show file size on directory listings
  • IconPath - Specify the path for the directory listing internal icons
  • Welcome - Specify names of welcome files
  • Logs
  • AccessLog - Name the path for the access log file
  • CacheAccessLog - Specify the path for the cache access log files
  • ErrorLog - Name the file where you want to log internal server errors
  • LogFormat - Specify common or old log file format
  • LogTime - Specify GMT or local time stamps in log files
  • NoLog - Suppress log entries for specific hosts or domains matching a template
  • Timeouts
  • InputTimeout - Specify input timeout setting
  • OutputTimeout - Specify output timeout setting
  • ScriptTimeout - Specify script timeout setting
  • Methods
  • Disable - Disable HTTP methods
  • Enable - Enable HTTP methods
  • Accessory Scripts
  • DELETE-Script - Specify the location and name of accessory script for DELETE requests
  • POST-Script - Specify the location and name of accessory script for POST requests
  • PUT-Script - Specify the location and name of accessory script for PUT requests
  • Search - Specify location of search script
  • Meta-Information
  • MetaDir - Specify name of subdirectory for meta-information files
  • MetaSuffix - Specify the extension for meta-information files
  • Resource Mapping
  • AddEncoding - Specify the MIME content encoding of files with particular extensions
  • AddLanguage - Specify the language of files with particular extensions
  • AddType - Specify the data type of files with particular extensions
  • Exec - Run a CGI program for matching requests
  • Fail - Reject matching requests
  • Map - Change matching requests to a new result string
  • Pass - Accept matching requests
  • Redirect - Send matching requests to another server
  • SuffixCaseSense - Specify whether extension definitions are case sensitive
  • Proxy Server Settings
  • CacheClean - Specify how long to keep cached files with URLs that match a template
  • CacheDefaultExpiry - Specify default expiration time for files that do not have an expiration date
  • CacheExpiryCheck - Turn cache expirations off
  • CacheLastModifiedFactor - Specify fraction of Last-Modified time to be used for determining expiration date
  • CacheLimit_1 - Specify lower limit for cached file size
  • CacheLimit_2 - Specify upper limit for cached file size
  • CacheLockTimeOut - Specify how long a file being cached can remain locked
  • CacheNoConnect - Specify stand alone cache mode
  • CacheOnly - Cache only files with URLs that match a template
  • CacheRoot - Specify cache root directory
  • CacheSize - Specify cache size
  • CacheTimeMargin - Do not cache files due to expire within specified time
  • CacheUnused - Specify how long to keep unused cached files that match a template
  • Caching - Turn proxy caching on/off
  • ftp_proxy - Specify a proxy server for this proxy to connect to for FTP requests
  • Gc - Turn garbage collection on or off
  • GcDailyGc - Specify a daily time for garbage collection
  • GcMemUsage - Specify how much memory to use for garbage collection
  • gopher_proxy - Specify a proxy server for this proxy to connect to for Gopher requests
  • http_proxy - Specify a proxy server for this proxy to connect to for HTTP requests
  • MaxContentLengthBuffer - Set the size of the buffer for files retrieved from another server
  • no_proxy - Connect directly to domains matching templates
  • NoCaching - Do not cache files with URLs that match a template
  • wais_proxy - Specify a proxy server for this proxy to connect to for WAIS requests
  • Performance Settings
  • CacheLocalFile - Specify files you want to load in memory at start up
  • IdleThreadTimeout - Specify length of time to keep idle threads available
  • MaxActiveThreads - Specify the maximum number of threads to have active
  • MinActiveThreads - Specify the minimum number of threads to keep available or active
  • ServerPriority - Specify the priority you want your server to have on your system
  • Access Control
  • DefProt - Specify default protection setup for requests that match a template
  • Protect - Activate protection setup for requests that match a template
  • Protection - Define a named protection setup within the configuration file
  • Protection Subdirectives
  • User Directories
  • HomeDir - Specify the directory that contains user subdirectories
  • UserDir - Specify the name of the accessible subdirectory off of user subdirectories
  • Chapter 9. Using Commands
  • cgiparse Command
  • cgiutils Command
  • htadm Command
  • htimage Command
  • whttpg Command
  • Chapter 10. Obtaining Additional Information
  • Viewing Online Information
  • Viewing Online Help
  • Viewing HTML Books
  • Printing and Ordering Books
  • Printing PostScript Manuals
  • Ordering More Books
  • Chapter 11. Writing Common Gateway Interface Programs
  • Overview of CGI
  • CGI and Dynamic Documents
  • Uses for CGI
  • The CGI Process
  • Overview
  • Sending Information to the Server
  • Returning Output
  • How CGI Programs Work
  • Protecting Your Programs
  • Environment Variables
  • Requests from Standard Search (ISINDEX) Documents

  • Part 4. Appendixes

  • Appendix A. Notices
  • Trademarks
  • Appendix B. Glossary


  • [ Top of Page | Next Page ]