Security

On the Security tab, you can configure restrictions for network addresses from which the Web server receives HTTP and HTTPS requests.

General

Set the Redirect to a secure connection flag to automatically redirect all HTTP connections to HTTPS.

Set the Return detailed header flag to return environment details in the “Server” header by the web server.

Set the Convert URI to lowercase flag to convert all URI in requests to the web server to lowercase. Only a fragment of URI hierarchical part that contains path is converted.

Set the Enable access control for User Agents flag to forbid the access to the Control Center interface for bots and other User Agents from the list below.

Define the list of forbidden User Agents:

In the User Agent name field specify User Agent name to forbid the access to the Control Center interface. Case sensitive. If not set, the application URI is used.

In the Defining regular expression field, specify regular expression defining the application to forbid the access to the Control Center interface.

Access Restiction

To setup access limitations for any of connection type

1.To allow the access by HTTP or by HTTPS from definite addresses, add them to the HTTP: Allowed or HTTPS: Allowed lists correspondingly.

2.To deny the access by HTTP or by HTTPS from definite addresses, add them to the HTTP: Denied or HTTPS: Denied lists correspondingly.

3.The addresses not included into any of the lists are allowed or denied depending on whether the HTTP denial priority and HTTPS denial priority flags are set: if the flag is set, the addresses not included into any of the lists (or included into both of them) are denied. Otherwise, such addresses are allowed.

To edit the address list

1.Specify the network address in the corresponding field and click Save.

2.The network address is specified as: <IP-address>/[<prefix>].

info

Lists for TCPv6 addresses will be available, if the IPv6 interface is installed on the computer.

3.To add a new field, click icon-item-add in the corresponding section.

4.To delete a field, click icon-item-remove.

Examples of prefix usage:

1.Prefix 24 stands for a network with a network mask: 255.255.255.0

Containing 254 addresses.

Host addresses look like: 195.136.12.*

2.Prefix 8 stands for a network with a network mask: 255.0.0.0

Containing up to 16777214 addresses (256*256*256-2).

Host addresses look like: 125.*.*.*