Apache Traffic Redirection Jed Reynolds

Slides:



Advertisements
Similar presentations
By : Uday Kumar. What is.htaccess? How to use.htaccess? Error documents Redirects & Rewrites Password protection Deny visitors by IP address DirectoryIndex.
Advertisements

1 Real World Performance Tuning Ask Bjørn Hansen OSCON 2001.
Dan Fleck.  WAMP – Windows Apache MySQL PHP -  LAMP – Linux Apache MySQL PHP ◦ There are.
Marketer to Developer Translation SMX West February 9, 2009.
© 2008 Stephan M Spencer Netconcepts Unraveling URLs and Demystifying Domains presented by Stephan Spencer,
Wordpress SEO Basics Wordcamp Las Vegas Wordpress 2.7.
© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
URI IS 373—Web Standards Todd Will. CIS Web Standards-URI 2 of 17 What’s in a name? What is a URI/URL/URN? Why are they important? What strategies.
Active Directory® and Apache® Using Kerberos and Apache to Authenticate via Microsoft Active Directory.
SquirrelMail for Webmail AfNOG 2012 Scalable Internet Services (SS-E) Presented by Michuki Mwangi Serrekunda, Gambia (Original Materials by Joelja)
SquirrelMail for Webmail AfNOG 2013 Scalable Internet Services (SS-E) Presented by Michuki Mwangi Lusaka, Zambia (Original Materials by Joelja)
© 2009 Stephan M Spencer Netconcepts 301 Redirect: How Do I Love You, Let Me Count the Ways presented by Stephan.
MVC in Trax.
Cookies Set a cookie – setcookie() Extract data from a cookie - $_COOKIE Augment user authentication script with a cookie.
PHP Hypertext PreProcessor. Documentation Available SAMS books O’Reilly Books.
SIMPLE ROUTER The slide made by Salim Malakouti. Next we will create the Router  What do I we mean by a router?  Routers work similar to a map. It receives.
CSN09101 Networked Services Week 8: Essential Apache Module Leader: Dr Gordon Russell Lecturers: G. Russell, J. Jackson.
1 John Magee 9 November 2012 CS120 Lecture 17a: Publishing Web pages.
System Administration NFS & Web Servers. NFS SERVER.
Traffic Control in Apache Jed Reynolds Blog.Bitratchet.com Where in your web site do you need traffic control?
Set 13: Web Servers (configuration and security) (Chapter 21) IT452 Advanced Web and Internet Systems.
Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG 11 Kigali, Rwanda May 2010 Dorcas Muthoni Courtesy: Hervey Allen.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
TPR5: Custom Configurations Steve Lewis, Web Manager, SUNY Brockport TPR5: Custom Configurations: Unlock the Power of Apache Steven Lewis Web Manager SUNY.
Web Authoring Rico Yu. Ch.6 Planning for a Web Site Introduction Steps in setting up Needs Planning.
Potential Members go to our micro sites via the edm mail. User will be forwarded to Paypal payment gateway with security access. Fill in credit card info,
Welcome to Acrobat Day 1 of 2 Dan McAllister Just arriving? Sign-in near the door Grab a handout Just arriving? Sign-in near the door Grab a handout Finished.
1 Know the Game 2 SEO-Friendly Architecture Example of Good Organization & Content: This Presentation ● NOT reliant on Flash or JavaScript ● Keyword-rich.
© Copyright 2008 STI INNSBRUCK RDF Best Practice Best Practice Recipes for Publishing RDF Vocabularies W3C Working.
1 Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG X Cairo, Egypt May 2009 Hervey Allen.
Log-in to the Unix Server A successful log-in allows access to the server through the Secure Shell. SSH, also known as Secure Shocket Shell, is a Unix.
Ruby on Rails on Ubuntu Bradley Taylor Rails Machine, LLC
Sessions, Cookies, &.htaccess IT 210. Procedural Issues  Quiz #3 Today!  Homework #3 Due Friday at midnight UML for Lab 4  Withdraw Deadline is Wed,
SU CAREER SERVICES How to Use eRecruiting.
Welcome to the Logging into the NCIR lesson for the North Carolina Immunization Branch.
Hardware Software InternetMiscellaneous
Apache HTTP Server from 10,000 feet An open source Apache feature overview and discussion.
Internal and External Links Web Design – Section 3-6 Part or all of this lesson was adapted from the University of Washington’s “Web Design & Development.
TCOM Information Assurance Management Software Hacking.
Internet FTP to network. Preliminary Steps a FTP program is used and executed such as WS_FTP LE Information needed –host name –user id –password.
An Introduction to E-Commerce Security By Graham Mead.
CSN09101 Networked Services Week 8: Essential Apache Module Leader: Dr Gordon Russell Lecturers: G. Russell.
CITA 310 Section 5 Virtual Hosts and Virtual Directories (Selected Topics from Textbook Chapter 6)
Source Page US:official&tbm=isch&tbnid=Mli6kxZ3HfiCRM:&imgrefurl=
MCSA Fall, ◦ NTFS  Disk Quotas  File System Encryption  Dynamic Volumes  Mounted Drives  Remote Storage  Self-healing NTFS  Security ◦ ReFS.
SquirrelMail for Webmail Quick and Dirty Michuki Mwangi for AfNOG 2010.
Secure Authentication A Brief Overview PacNOG 6 Workshop Nadi, Fiji Hervey Allen.
Building Your Own Website Using:. Install & configure LAMP. Download WordPress and run it as a local website on your Raspberry Pi. Configure WordPress.
Путешествуй со мной и узнаешь, где я сегодня побывал.
CMSC 104, Version 9/011 Operating Systems and Using Linux Topics What is an Operating System? Linux Overview Frequently Used Linux Commands Reading None.
ITE Hirakjyoti Nath Class 7
Windows 7 Ultimate
Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess
Redirection Allow requests to be moved about your file system or around the web ScriptAlias Allows you to run CGI scripts Simple to use.
CAS and Web Single Sign-on at UConn
SquirrelMail for Webmail
Enhanced Web Site Design Stanford University Continuing Studies CS 22
Unix System Administration
Consistent URIs For Compliance Checking (1)
First Time Login Process
Addresses on the Web.
Page 1. Page 2 Page 3 Page 4 Page 5 Page 6 Page 7.
301 Redirect: How Do I Love You, Let Me Count the Ways
Operating Systems and Using Linux
SEO בסביבת ג'ומלה 3 מי אני:.
COP 4343 Unix System Administration
Add HTTPS to Your Website for Free in 15 Minutes!
Environment Variables
Requests and Server Response Codes
Securing web applications Externally
Presentation transcript:

Apache Traffic Redirection Jed Reynolds

Frog and Toad Frog.com buys Toad.net Homepage Document directory Filenames Secure Login

Redirect Homepage Welcome Toad Users Frog.com/toad.htm

Redirect Homepage Mod Rewrite RewriteCond HTTP_HOST ^(.*)\.toad\.net$ RewriteRule ^/$ < uri < header

Redirect all pages Mod Rewrite or Mod Alias Notice the Slash RewriteCond HTTP_HOST ^(.*)\.toad\.net$ RewriteRule ^/(.+)$ < uri < header

Document Directory Toad.net/userman/index.htm Frog.com/userman/index.htm Frog.com/support/toad/index.htm

Document Directory mod_alias from RedirectMatch permanent ^/userman/(.*)

Filenames Frog.com uses.php Toad.com uses.pl

File Names mod_alias Alias /userman < uri /support/toad < disk AliasMatch /userman/(*)\.pl) /support/toad/$1.php

Secure Login Enforce HTTPS on the subdomain

Secure Login Mod Rewrite directory Mod Rewrite, Rewrite Condition RewriteRule ^/cgi-bin/login.*$ [R=301][L] RewriteCond %{HOST_NAME} ^dash\.frog\.com$ RewriteCond %{SERVER_PORT} 80 RewriteRule ^(.*)$