|
|
1 | (18) |
|
|
1 | (2) |
|
Service Level Agreements (SLAs) |
|
|
3 | (1) |
|
Use of HP-UX for Web Solutions |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (2) |
|
|
8 | (5) |
|
HTTP Request/Response Model |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (2) |
|
Universal Resource Locator (URL) |
|
|
13 | (1) |
|
Hypertext Markup Language (HTML) |
|
|
14 | (2) |
|
|
14 | (1) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
16 | (3) |
|
Installing the Netscape Server Software |
|
|
19 | (6) |
|
Installation Prerequisites |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (2) |
|
Verifying Software Installation |
|
|
23 | (1) |
|
|
24 | (1) |
|
The Netscape Admin Server |
|
|
25 | (12) |
|
|
25 | (1) |
|
Starting and Stopping the Admin Server |
|
|
26 | (1) |
|
Connecting to the Admin Server |
|
|
27 | (1) |
|
Configuring the Admin Server |
|
|
28 | (3) |
|
Laying Out the Admin Server File |
|
|
31 | (1) |
|
Understanding Important Admin Server Files |
|
|
32 | (2) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Controlling Access via SSL |
|
|
34 | (1) |
|
|
35 | (2) |
|
|
37 | (24) |
|
|
37 | (1) |
|
The Primary Document Directory |
|
|
37 | (2) |
|
Creating Additional Document Directories |
|
|
39 | (3) |
|
Setting Up User Document Directories |
|
|
42 | (2) |
|
Setting Up Publish Capabilities |
|
|
44 | (1) |
|
Understanding Important Web Server Files |
|
|
44 | (5) |
|
|
44 | (1) |
|
|
45 | (2) |
|
|
47 | (2) |
|
Enabling Startup/Shutdown of the Server |
|
|
49 | (5) |
|
|
49 | (2) |
|
Automatic Startup from the /etc/rc.config.d Directory |
|
|
51 | (1) |
|
Automatic Startup Using the /etc/inittab Method |
|
|
52 | (1) |
|
Starting the Web Server Manually |
|
|
52 | (1) |
|
Stopping the Web Server Manually |
|
|
52 | (1) |
|
Starting a SSL Web Server Manually |
|
|
53 | (1) |
|
Starting a SSL Web Server Automatically |
|
|
53 | (1) |
|
Setting Up Software Virtual Servers |
|
|
54 | (4) |
|
|
58 | (3) |
|
Enabling Server-Side Applications |
|
|
61 | (16) |
|
|
61 | (7) |
|
Suggested CGI Configuration |
|
|
65 | (2) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (3) |
|
|
68 | (1) |
|
|
69 | (2) |
|
|
71 | (4) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (2) |
|
Wide Area Interface Management |
|
|
75 | (1) |
|
|
75 | (2) |
|
|
77 | (20) |
|
Creation of Groups and Users |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (3) |
|
|
83 | (3) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (7) |
|
|
88 | (5) |
|
Commerce with Restricted Access Services |
|
|
93 | (2) |
|
|
95 | (2) |
|
Enabling Secure Sockets Layer (SSL) |
|
|
97 | (18) |
|
|
97 | (1) |
|
|
98 | (5) |
|
|
98 | (1) |
|
|
99 | (1) |
|
Public Key Digital Signature |
|
|
99 | (2) |
|
Secure Communication Handshake or Server Authentication |
|
|
101 | (2) |
|
|
103 | (5) |
|
|
103 | (2) |
|
Installing a CA Certificate |
|
|
105 | (2) |
|
|
107 | (1) |
|
|
108 | (3) |
|
Setting Up Encryption for the Admin Server |
|
|
108 | (1) |
|
Setting Up Client-Side Certificates |
|
|
109 | (2) |
|
|
111 | (2) |
|
|
113 | (2) |
|
|
115 | (6) |
|
|
115 | (2) |
|
|
117 | (2) |
|
|
119 | (2) |
|
|
121 | (32) |
|
|
121 | (1) |
|
|
121 | (5) |
|
|
122 | (3) |
|
|
125 | (1) |
|
|
126 | (3) |
|
Changing the Primary Document Directory |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Using a Commercial Package |
|
|
128 | (1) |
|
|
129 | (6) |
|
|
129 | (3) |
|
|
132 | (3) |
|
System Resources Management |
|
|
135 | (16) |
|
Managing Disk Space Usage |
|
|
136 | (1) |
|
|
137 | (5) |
|
Rolling the Web Server Log Files |
|
|
142 | (1) |
|
Restarting the Web Server |
|
|
142 | (1) |
|
|
143 | (4) |
|
|
147 | (1) |
|
|
148 | (1) |
|
Keeping Current with Patches |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
|
Debugging Server Problems |
|
|
153 | (30) |
|
Solving Web Server Problems |
|
|
153 | (14) |
|
Check That the Web Server Process Is Running |
|
|
154 | (1) |
|
Restart the Web Server Process |
|
|
155 | (1) |
|
Check the Web Server Startup Log |
|
|
156 | (2) |
|
Run telnet to Establish Manual Connection |
|
|
158 | (1) |
|
Run ping from the Server to Client |
|
|
159 | (1) |
|
Run traceroute to See Packet Travel Itinerary |
|
|
160 | (1) |
|
Check Client Browser Proxy Configuration |
|
|
161 | (1) |
|
|
162 | (1) |
|
Run lanscan to Check Network Card Connection |
|
|
162 | (1) |
|
Run ifconfig to Check Network Interfaces |
|
|
163 | (1) |
|
Check DNS Information for the Server |
|
|
164 | (1) |
|
Run netstat to Check Routes |
|
|
164 | (1) |
|
Check the Web Configuration Files |
|
|
165 | (2) |
|
|
167 | (9) |
|
|
167 | (3) |
|
|
170 | (2) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
174 | (2) |
|
Dealing with ``Catastrophe'' Messages |
|
|
176 | (1) |
|
Dealing with Proxy Servers |
|
|
177 | (1) |
|
Using Network Tracing Tools |
|
|
177 | (4) |
|
|
181 | (2) |
|
|
183 | (36) |
|
Understanding Why Security Is Important |
|
|
183 | (1) |
|
Physical Placement of the Server |
|
|
184 | (1) |
|
Understanding Hacker Issues |
|
|
184 | (2) |
|
|
185 | (1) |
|
|
185 | (1) |
|
Damage that Hackers Can Cause |
|
|
186 | (1) |
|
Resolving Password Issues |
|
|
186 | (2) |
|
Choose Hard-to-Crack Passwords |
|
|
186 | (1) |
|
|
187 | (1) |
|
Do Not Reuse or Serialize Passwords |
|
|
188 | (1) |
|
Managing Risk in the System Software |
|
|
188 | (3) |
|
Set the Run Control (RC) Services to Bare Bones |
|
|
188 | (2) |
|
Remove Old Versions of System Software |
|
|
190 | (1) |
|
Install the Latest Security Patches |
|
|
190 | (1) |
|
Managing Risk in Application Software |
|
|
191 | (6) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Set the Permissions of the Document Root |
|
|
193 | (1) |
|
Set the Permissions of CGI Directories and Programs |
|
|
194 | (1) |
|
Disable Directory Listing in the Web Server |
|
|
195 | (1) |
|
Keep Current with Interpreter Versions |
|
|
196 | (1) |
|
Remove the Default Additional Document Directories |
|
|
197 | (1) |
|
Configuring the Network and System |
|
|
197 | (10) |
|
|
197 | (1) |
|
|
197 | (2) |
|
|
199 | (2) |
|
|
201 | (1) |
|
The Standard HP-UX FTP Server |
|
|
201 | (4) |
|
The Washington FTP Server |
|
|
205 | (1) |
|
|
206 | (1) |
|
Running Security Monitoring Software |
|
|
207 | (2) |
|
|
207 | (1) |
|
Tools for Intrusion Detection and Recovery |
|
|
208 | (1) |
|
What to Do in Case of a Compromise |
|
|
209 | (3) |
|
|
212 | (2) |
|
What Happens During Trusted HP-UX Conversion |
|
|
213 | (1) |
|
Conversion Steps to Trusted HP-UX |
|
|
213 | (1) |
|
Converting Back to Regular HP-UX |
|
|
213 | (1) |
|
Using Virtual Vault Secure HP-UX |
|
|
214 | (3) |
|
|
217 | (2) |
|
Performance Tuning the Server |
|
|
219 | (22) |
|
|
219 | (2) |
|
|
221 | (5) |
|
|
221 | (4) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
226 | (5) |
|
|
227 | (2) |
|
HTTP Persistent Connection |
|
|
229 | (1) |
|
Web Server Cache Settings |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (1) |
|
Disk Load Balancing with LVM |
|
|
231 | (1) |
|
|
231 | (2) |
|
|
233 | (6) |
|
|
234 | (2) |
|
Redirecting Rejected Sessions |
|
|
236 | (1) |
|
Deferring Rejected Sessions |
|
|
237 | (2) |
|
Installing AdmissionControl |
|
|
239 | (1) |
|
|
239 | (2) |
Index |
|
241 | |