When you provide access for visitors to your web site, you do not want to expose your viewers to information about how the site is set up and the coding that is used to generate the page.
You want their visit to your page to be easy, fast, and seamless, with all the work being done behind the scenes. As an administrator, you want to ensure that your security practices do not negatively affect your Web site. When using your iSeries™ as a web server, consider these points:
You define protection directives for each server URL. Not all URLs require a protection directive. But, if you want to control how a URL resource is accessed or by whom, then a protection directive for that URL is required.
In addition to using CGI programs in your web pages, you may want to use Java™. You should understand Java security before you add Java to your web pages.
The HTTP server provides an access log that you can use to monitor both accesses and attempted accesses through the server.
The proxy server receives HTTP requests from web browsers and resends them to web servers. Web servers that receive these requests are only aware of the proxy server IP address. They cannot determine the names or addresses of the PCs that originated the requests. The proxy server can handle URL requests for HTTP, File Transfer Protocol (FTP), Gopher, and WAIS.
You can also use the HTTP proxy support of the IBM® HTTP Server for iSeries to consolidate web access. The proxy server can also log all URL requests that are for tracking purposes. You can then review the logs to monitor use and misuse of network resources.