کد:
http://www.helpline4it.com/lab_practices-d28.html
Purpose:
The purpose of this article is to make you familiar with website properties.

Procedure:
In this article we will study the different properties of the website created in the previous article.

Launch the website properties window by right clicking and accessing its properties option from the following node in Internet Services Manager console as shown below.




Website properties window will look like this and the complete detail about its options is provided below.




Web Site tab can be used to configure the following basic settings for the website.


  • Description In Identification section is used to define a descriptive name for your website to distinguish it from the other sites.
  • IP Address in Identification section is used to bind a particular IP address against this website.
  • TCPPortin Identification section is used to define the TCP port number for the website.


  • SSLPortoption (disabled at this time) is used to define the SSL port number for this website if a trusted certificate is installed for secure communication.
  • Advanced button in the identification section of website is used to define the different IP address, TCPPort, and host header name combination for this website. This button can also be used to define the SSL port number for this website if a digital certificate is installed for this website.


Click the Add button, if you want to define the multiple identities for this website.





  • Unlimited option in connections section allows an unlimited number of simultaneous connections to the website.
  • Limited To option in connections section sets the maximum number of simultaneous connections allowed to the website.
  • Connection Timeout option in connections section sets the length of time before the server disconnects an inactive user. This ensures that all connections are closed if the HTTP protocol fails to close a connection.


  • HTTP Keep-Alives Enabled allows a client to maintain on open connection with your server, rather than re-opening the client connection with each new request. Disabling Keep-Alives may degrade server performance. Keep-Alives is enabled by default.
  • Enable Logging option enables website logging, which can record details about user activity and create logs in various formats. After enabling logging, select a format in the Active log format list.


Note: To configure the options for log file creation (for example, weekly, or by file size), or to configure properties for W3C Extended logging or ODBC logging, click Properties button.

The log formats are as follows:



    • Microsoft IIS Log Format: A fixed ASCII format. Its properties windows has the following features.






New Log Time Period settings are

Hourly Log files are created hourly.
Daily Log files are created daily starting with the first entry that occurs after midnight.
Weekly Log files are created weekly starting with the first entry that occurs after midnight Saturday.
Monthly Log files are created monthly starting with the first entry that occurs after midnight of the last day of the month.
Note "Midnight" is midnight local time for all log file formats except W3C Extended format. For W3C format, "midnight" is midnight Greenwich Mean Time by default, but can be specified as midnight local time.
Unlimited file size Data is always appended to the same log file. You can only access this log file after stopping the server.
When file size reaches A new log file is created when the current log file reaches a given size; specify the size you want.

Log file directory
Type the directory in which log files should be saved, or click Browse and locate the directory.

A file name is displayed beneath the Log file directory box; this name is determined by the log file format and the criterion used for starting new log files.



    • NCSA Common Log File Format is a fixed (non-customizable) ASCII format, available for Web sites but not for FTP sites. It records basic information about user requests, such as remote host name, user name, date, time, request type, HTTP status code, and the number of bytes received by the server. Items are separated by spaces; time is recorded as local time.



Its properties window has the same option as described above.






    • ODBC Logging: A fixed format logged to a database.


Its properties window has the following options.




Supply IIS with the Data Source Name and Table name by using this dialog box.
If a user name and password are required for accessing the database, supply them as well.

oW3C Extended Log File Format: A customizable ASCII format, selected by default. It has the following characteristics.




General Properties tabhas the following options.

New Log Time Period settings are

Hourly Log files are created hourly.
Daily Log files are created daily starting with the first entry that occurs after midnight.
Weekly Log files are created weekly starting with the first entry that occurs after midnight Saturday.
Monthly Log files are created monthly starting with the first entry that occurs after midnight of the last day of the month.
Note "Midnight" is midnight local time for all log file formats except W3C Extended format. For W3C format, "midnight" is midnight Greenwich Mean Time by default, but can be specified as midnight local time.

Unlimited file size Data is always appended to the same log file. You can only access this log file after stopping the server.
When file size reaches A new log file is created when the current log file reaches a given size; specify the size you want.

Use local time for file naming and rollover Select this option to set creation time and naming format for W3C Extended Log files to midnight local time rather than Greenwich Mean Time.

Log file directory Type the directory in which log files should be saved, or click Browse and locate the directory.
Note: You cannot use relative path, UNC path or mapped drive for this directory. It should always be a local path.

A file name is displayed beneath the Log file directory box; this name is determined by the log file format and the criterion used for starting new log files.

Extended Properties tab can be used to define the logging values for your website that should be logged.




Operator tab is used to specify which Windows user accounts have operator privileges to this site. By default only administrator has this privileges rights.

In order to add the additional users, click the Add button.




Performance tab is used to set properties that affect memory and bandwidth use and control the web site performance. In Performance tab



·Performance tuning adjusts the setting to the number of daily connections you anticipate for your site. If the number is set slightly higher than the actual number of connections, the connections are made faster and server performance is improved. If the number is much greater than the actual connection attempts, server memory is wasted, reducing overall server performance.



  • Enable bandwidth throttling option is used to limit the bandwidth used by this Web site.


Note: The value for bandwidth typed here overrides the value set at the computer level, even if this value is greater than the value set at the computer level.


  • Enable process throttling option is used to define the limit of CPU percentage processing time this Web site can use for out of process applications.


Note: If this box is selected, but Enforce limits is not selected, then the only consequence is that an event is written to Event Log when the assigned limit is exceeded.

Isapi Filters tab is used to define the configuration and settings for Isapi filters. An ISAPI filter is a program that responds to events during the processing of an HTTP request.




  • To add an ISAPI filter, click the Add button.
  • To remove an ISAPI filter, select it and click the Remove button.
  • To change the properties of an ISAPI filter, select it and click the Edit button.
  • To enable an ISAPI filter, select it and click the Enable button.
  • To disable an ISAPI filter, select it and click the Disable button.
  • To change the order in which an ISAPI filter is executed, select it and click the up or down arrow. You can only change the load order of filters with the same priority.


Home Directory tab is used to define the home directory path, permissions, and application settings for your web sites.



Under home directory tab


  • A directory located on this server option is used to define the absolute path for your website contents. You can type the absolute path or can click the Browse button to define the directory.
  • A directory located on another computer option is used when the contents of this web site are located on another. You should provide the UNC path for the network share here and if it required some authentication, click the Connect As button to provide the proper username who has the permissions to access this shared folder.





Whether you select local directory or network share for your home directory, following directory access permissions can be defined for your web directory.

·Script source access permission is used to allow users to access source code. This option is only available if either Read or Write permissions are set. Source code includes scripts in ASP applications.


·Read permission is used to allow users to read or download files or directories and their associated properties.

·Write permission is used to allow users to upload files and their associated properties to the enabled directory on your server, or to change content in a Write-enabled file.

·Directory browsing permission is used to allow the user to see a hypertext listing of the files and subdirectories in this virtual directory, Virtual directories will not appear in directory listings; unless users know a virtual directory’s alias.
·Note: If this option is enabled, your web server will show a list of web files and directories when no default page is specified.

·Log visits option is used to record visits to this directory in a log file,
·Note: Visits are recorded only if logging is enabled for this Web site.

·Index this resource is used to allow Microsoft Indexing Service to include this directory in a full-text index of your Web site.


  • A redirection to a URL option is used to redirect this website request to another website. For example if you want to redirect all the web requests for www.abc.com website to www.xyz.com webiste, provide the URL for the second website here.





In the redirection URL option you can configure the following settings.

The Client Will Be Sent To


·The exact URL entered above redirects a virtual directory to the destination URL without adding any other portions of the original URL. You can use this option to redirect an entire virtual directory or website to one file. For example, for website maintenance purpose, you can redirect all the website requests to a maintenance web page.


·A directory below this one redirects a parent directory to a child directory. For example, to redirect your home directory (designated by /) to a subdirectory named /newdir, type /newdir in the redirect to text box and select this option.

·Without this option, the Web server will continually map the parent to itself.


·A permanent redirection for this resource sends the following message to the client: “301 Permanent Redirect.” Redirects are considered temporary, and the client browser receives the following message: “302 Temporary Redirect.” Some browsers can use the “301 Permanent Redirect” message as the signal to permanently change a URL, such as a bookmark.


·Application Settings is used to define the directory structure for your web based application.

Each application can have a friendly name; this name appears in the Internet Information Services snap-in and gives you a way to distinguish between applications. The application name is not used anywhere else.

In the Application name text box, type a name for your application.
Note: If there is a Remove button instead of a Create button, an application has already been created.

·Execute Permissions determines what level of program execution is allowed for this site or virtual directory resources.

·None Only static files, such as HTML or image files, can be accessed.
·Scripts only Only scripts, such as ASP scripts, can be run.
·Scripts and Executables All file types can be accessed or executed.

·Application Protection is used to select whether applications should run

·In the same process as Web services (low)
·In an isolated pooled process in which other applications are also run (medium)
·In an isolated process separate from other processes (high)

The association of a file name extension with an ISAPI or CGI program is called application mapping. IIS uses the file name extension of a requested resource on your Web site to determine which ISAPI or CGI program to run to process a request. For example, a request for a file ending with an .asp extension causes the Web server to call the ASP program (Asp.dll) to process the request.

Configuration Tab can be used to define such application mappings.



You can view the available application mapping in the Application configuration window under App Mappings tab.




To define the other application mappings or to edit the existing app mappings, click the Add button and provide the required information.



Note: This article is just a part of www.Helpline4IT.com online study guide for IIS5. To review the complete features of these Helpline4IT online study guides, click



1303 reads |
Fast Navigation1 - Page 2

1 Page 2·Executable is used to type the name of the executable file (.exe or .dll) or use the Browse button to search for the file. The executable file must be located on your Web server’s local hard disk.


·Extension is used to type the file name extension associated with this application.


In Verb section

·All Verbs passes all requests to an application.

·Limit to option allows you to list the HTTP verbs that should be passed to an application. For example, by default the file Asp.dll will process requests using the HTTP verbs GET, HEAD, POST, and TRACE.

Note: Separate method names with a comma (,).


·Script engine is used when you want the application to run in a directory without Execute permissions. This setting is intended primarily for script-based applications such as ASP and IDC that are mapped to an interpreter. For a script-mapped application to run, either the Script or Execute access check box must be selected for the directory in which the application is located. To allow only script-mapped applications to run, use the Script access. To allow both script-mapped applications and executable files (.exe and .dll) to run, use the Execute access.

·Check that File Exists option is used to instruct the Web server to verify the existence of the requested script file and to ensure that the requesting user has access permission for that script file.

If the script does not exist or the user does not have permission, the appropriate warning message is returned to the browser and the script engine is not invoked. This option can be useful for scripts mapped to non-CGI executables like the Perl interpreter that do not send a CGI response if the script is not accessible. Because the script will be opened twice, once by the server and once by the script engine, there is some performance cost to enabling this option.

App options tab under Application Configuration window has the following options.



Application Configuration has the following settings.

Enable Session State check box is used to enable or disable session state.

This option is used for Active Server Pages that create a session for each user who accesses an ASP application so that you can identify the user across pages in the application.

To change the timeout period, type a new number in the Session Timeout text box.

Enable Buffering option is used to define the buffer output to the browser.

When this option is selected, all output generated by an ASP page is collected before it is sent to the browser. When this check box is cleared, output is returned to the browser as the page is processed.

Enable Parent Paths option is selected when you want to allow ASP pages to use relative paths to the parent directory of the current directory.

Note: If you enable this option, do not give the parent directories Execute access; otherwise, a script could attempt to run an unauthorized program in a parent directory.

Default ASP Language options specifies the primary script language for Active Server Pages, the language used to process commands within ASP delimiters (<% and %>).

To choose a different primary script language for all pages in the selected application, type the name of the language in the text box.

ASP Script Time out option specifies the length of time ASP will allow a script to run.

If the script does not finish running by the end of the timeout period, ASP stops the script and writes an event to the Windows event log. You can set the timeout period to a value between 1 and 2147483647.

APP Debugging tab under Application Configuration window has the following options.


In Debugging Flags

Enable ASP Server-Side Script Debugging is used to enable the Web server to enter the Microsoft Script Debugger while processing ASP pages. You can then use the debugger to examine your scripts.

Enabling ASP server-side debugging causes ASP to run in single-threaded mode.
Note: For performance reasons, ASP debugging is not recommended in a production environment.

Enable ASP Client-Side Script Debugging is reserved for future use and has no effect on the current version of ASP.

In Script Error Messages

Send Detailed ASP Error Messages to Client is used tosend specific debugging information (including the file name, error message, and line number) to the browser.

Send Text Error Message to Client when selected is used to send a default error message to the browser when any error prevents the Web server from processing the ASP page.

A specific error message is written to the error log. You can change the default error message by typing a new message in the text box.

Document tab is used to define your site’s default Web page and to append a footer to the site’s documents.



Default page means which page is displayed first as a root page when a user accesses the website root directory. By default, default.asp and default.htm are defined. You can define additional pages and can also changer their order.

Note: There is a direct link between these default pages and directory browsing home directory permission. If the specified page(Default.htm or default.asp) is not present in your home directory, then the files and directory listing will be shown to the user if directory browsing permission is enabled. Otherwise page not found error will be displayed to the client side.

To define the additional page click the Add button and provide the name of the default page.



Similarly, to remove the default document name, highlight it in the list and then click the Remove button.

Enable Document Footer is used to automatically append an HTML-formatted footer to every document sent by your Web server select this option.
The footer file should not be a complete HTML document. It should only include HTML tags necessary for formatting the appearance and function of your footer content.
To specify the full path and file name for your footer file, click Browse button and then provide the footer html file path.
Note: Document footers can reduce Web server performance, especially if a Web page is frequently accessed.

Directory Security tab is used to define the security and access permissions for your website based on Windows authentication, NTFS permissions or IP address etc. Here is the complete detail for Directory Security.



Anonymous access and authentication control section in directory security tab is use to configure your Web server’s authentication and anonymous access features.

Use these features to configure your Web server to confirm the identity of users before granting access to restricted content.

Note: Before your server can authenticate users, however, you must first create valid Windows user accounts and then configure Windows File System (NTFS) directory and file permissions for those accounts.

Clicking the Edit button will show you the following Authentication Methods window.



Anonymous access allows users to establish an anonymous connection. Your server logs on the user with an anonymous or guest account.

To change the Anonymous user account setting, click the Edit button.



Authenticated access has the following settings for your website.
Basic authentication method is a widely used, industry-standard method for collecting user name and password information.
The advantage of Basic authentication is that it is part of the HTTP specification, and is supported by most browsers. The disadvantage is that Web browsers using Basic authentication transmit passwords in an unencrypted form.
Enabling Basic authentication will provide you the following alert message.


Note: You should click the Edit button to define the Basic Authentication Domain for this authentication type.

Digest Authentication is a new feature of IIS 5.0. Digest authentication offers the same features as Basic authentication but involves a different way of transmitting the authentication credentials. The authentication credentials pass through a one-way process, often referred to as hashing. The result of this process is called a hash, or message digest, and it is not feasible to decrypt it.


Integrated Windows authentication (formerly called NTLM or Windows NT Challenge/Response authentication) is a secure form of authentication because the user name and password are not sent across the network. When you enable integrated Windows authentication, the user's browser proves its knowledge of the password through a cryptographic exchange with your Web server, involving hashing.

Integrated Windows authentication can use both the Kerberos v5 authentication protocol and its own challenge/response authentication protocol. If Directory Services is installed on the server, and the browser is compatible with the Kerberos v5 authentication protocol, both the Kerberos v5 protocol and the challenge/response protocol are used; otherwise only the challenge/response protocol is used.
The Kerberos v5 authentication protocol is a feature of the Windows 2000 Distributed Services architecture. In order for Kerberos v5 authentication to be successful, both the client and server must have a trusted connection to a Key Distribution Center (KDC) and be Directory Services compatible.

IP Address and Domain Name Restrictions is used to allow or prevent specific users, computers, groups of computers, or domains from accessing this Web site. Click the Edit button to provide the specific information.


Click the Add button to provide the single computer name, group of computers or a particular domain name, that should be allowed or denied access based on the above selected option.



Secure communications is used to implement the digital certificate for secure communication between Client and this website through SSL. To create a server certificate request using the new Certificate Wizard, click Server Certificate button. Note: You cannot use your Web server’s secure communications features until you have installed a valid server certificate.
Complete information about implementing secure certificate and its configuration will be discussed in the next coming topics.
HTTP Header tab is used to set the values that are returned to the browser in the header of the HTML page.


Enable Content Expiration check box is used to include expiration information in the html header. This can be used to include a date in time-sensitive material, such as special offers or event announcements. The browser compares the current date to the expiration date to determine whether to display a cached page, or request an updated page from the server.
Custom Headers is used to send a custom HTTP header from the Web server to the client browser. Custom headers can be used to send instructions that are not yet supported in the current HTML specification, such as newer HTML tags that IIS may not support at the time of the product’s release. For example, you could use a custom HTTP header to allow the client browser to cache the page but prevent proxy servers from caching the page.
To have your Web server send a custom header, click Add, and then type the name and value of the header in the Add Custom HTTP Header dialog box as shown below.


To edit an existing custom header, select the custom header and click Edit button.
To stop sending a custom header, select the custom header and click Remove button.
Content Rating is used to embed descriptive labels in the HTTP headers of your Web pages. Browsers, such as Microsoft Internet Explorer, version 3.0 or later, can detect content ratings to help users identify potentially objectionable Web content.
To set content ratings for a Web site, directory, or file, click Edit Ratings button.
Rating Service tab is used to get some useful information about content ratings.


Rating Tab is used to configure the Platform for Internet Content Selection (PICS) system for rating content according to levels of violence, nudity, sex, and offensive language.
Define your rating level, the e-mail address of the person who is defining the rating level and the expiry date for this rating level in the following window.


File Type button is used to define the MIME setting for your website that should be added in the HTTP Header.
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: like audio, video, images, and application programs.
Web Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate application for the type of data the header indicates.
Note: The registered file types that are installed by default on Windows are listed in the File Types dialog box. File type extensions and MIME mappings are listed for selected file types in the File type details box.
To configure additional MIME mappings, click the New Type button in the File Types dialog box.


In the File Type dialog box type the extension that is associated with the file in the Associated Extension box.
In the Content Type (MIME) box enter the MIME type followed by the file name extension in the form mime type /file name extension.

To remove MIME mappings, select the file type in the Registered file types box and click the Remove button.
To edit existing MIME mappings, select the file type in the Registered file types box, click the Edit button and modify the contents of the Associated Extension and Content Type (MIME) boxes as needed.

Custom Error tab is used to customize HTTP errors that are sent to clients when Web server errors occur. Administrators can use generic HTTP 1.1 errors, detailed custom error files that IIS provides, or create their own custom error files.


To change the properties of custom error messages, click the Edit Properties button. If the output type is a URL, this URL must exist on a local server.


To configure a custom error to use the default HTTP 1.1 error return, select the error and click the Set to Default button.
Server Extensions tab is used to define the Front Page Server Extensions properties for this website. Complete detail has been provided for these options in the WWW master properties topic.





موضوعات مشابه: