HTTP Administration 8-5
8VLQJWKH+7739LUWXDO)LUHZDOO
$ERXWWKH+7739LUWXDO)LUHZDOO
The HTTP virtual firewall feature enables you to maintain security on your filer.
You can restrict HTTP requests by marking the subnetwork interface over which they
arrive as untrusted. An untrusted interface provides only HTTP access to your filer
on a read-only basis.
Mark an interface untrusted if it meets all the following conditions:
You know you are going to service HTTP requests over that interface.
You dont want to allow requests through protocols other than HTTP.
You want to restrict access to the filer through that interface to read-only access.
By default, a subnetwork interface is trusted.
6\QWD[
Mark an interface as untrusted or trusted by setting an option to the ifconfig com-
mand. Following are examples of the command:
To mark the e0 interface as untrusted, enter the following command:
ifconfig e0 untrusted
To mark the e0 interface as trusted, enter the following command:
ifconfig e0 trusted
8VLQJ9LUWXDO+RVWLQJ
$ERXW9LUWXDO+RVWLQJ
Virtual hosting enables a filer to respond to requests directed to more than one IP
address through a single physical interface. This means that a filer with only one phys-
ical interface can host several IP addresses.
Virtual hosting enables, for example, an Internet provider to host several Web sites
but have only one physical interface. An HTTP server can use the destination IP
address of an incoming HTTP request to find the directory that contains the HTTP
pages belonging to the virtual host.
7R6HW8SDQG(QDEOH9LUWXDO+RVWLQJ
To enable virtual hosting, you
direct HTTP requests by putting subdirectory and host or address entries in the
/etc/httpd.hostprefixes file