Red Hat DIRECTORY SERVER 2.0 - GATEWAY Uživatelský manuál Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 96
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
Table of Contents
1. Installing the software.....................................................................................................1
The web server group of packages ............................................................................1
Installing the packages ................................................................................................2
Changes made to the system ......................................................................................4
Quick and Dirty Web Server.......................................................................................7
2. The site’s design..............................................................................................................11
The server we want....................................................................................................11
What is a virtual host?...............................................................................................11
Structures of HTTP queries and responses.............................................................12
3. Getting started.................................................................................................................15
4. Supporting MIME types................................................................................................23
MIME types on a Red Hat Linux system................................................................23
Loading and using the MIME module....................................................................24
5. Symbolic links.................................................................................................................27
6. Handling directories ......................................................................................................31
Using default documents..........................................................................................32
Automatic indexing of directories ...........................................................................33
Manipulating columns.....................................................................................36
Manipulating rows ...........................................................................................39
Adding icons to the listing ..............................................................................42
Adding text to the listing.................................................................................44
Using an HTML table.......................................................................................46
Summary of the auto-indexing module ........................................................47
Using both modules...................................................................................................49
7. Logging .............................................................................................................................51
The error log................................................................................................................51
Access logs ..................................................................................................................53
Log rotation.................................................................................................................57
Log file analysis ..........................................................................................................59
8. Users’ own web pages....................................................................................................63
9. Delegated control............................................................................................................65
10. Access control ................................................................................................................71
Access control by client IP address..........................................................................71
Access control by client identity ..............................................................................73
Variations on a theme of user identification...........................................................77
Mix and match: Location and Authentication .......................................................78
Blocking access based on a file’s name ...................................................................79
11. Conclusion .....................................................................................................................81
A. Apache modules.............................................................................................................85
B. Reference information for logging .............................................................................89
iii
Zobrazit stránku 2
1 2 3 4 5 6 7 8 ... 95 96

Komentáře k této Příručce

Žádné komentáře