Sun Java System Web Proxy Server 4.0.2 2005Q4 Administration Guide

Preface

This guide describes how to configure and administer the Sun JavaTM System Web Proxy Server 4, formerly known as Sun ONETM Web Proxy Server and iPlanetTM Web Proxy Server (and hereafter referred to as Sun Java System Web Proxy Server or just Proxy Server).

Who Should Use This Book

This book is intended for information technology administrators in production environments. The guide assumes familiarity with the following areas:

How This Book Is Organized

The guide is divided into parts, each of which addresses specific areas and tasks. The following table lists the parts of the guide and their contents.

Table P–1 Guide Organization

Part  

Description  

Part 1 Server Basics

Provides an overview of the Proxy Server and its administration: 

Part 2 Using the Administration Server

Provides details about configuring Administration Server preferences, managing users and groups, securing the Proxy Server, and using clusters to share configurations among servers: 

Part 3 Configuring and Monitoring the Proxy Server

Provides details about configuring server preferences, setting access control, and monitoring server activity: 

Part 4 Managing the Proxy Server

Provides details about concepts and tasks related to how the Proxy Server handles requests: 

Part 5 Appendixes

Describes access control list (ACL) file syntax and tuning server performance: 

Related Books

The Sun documents that are related to this manual are:

The following table lists the tasks and concepts described in each guide.

Table P–2 Proxy Server Documentation

For Information About  

See  

The Proxy Server release:

  • Late-breaking information about the software and the documentation

  • New features

  • Supported platforms and environments

  • System requirements

  • Known issues and workarounds

Release Notes

Performing installation and migration tasks:

  • Installing Sun Java System Web Proxy Server

  • Migrating from version 3.6 to version 4

Installation and Migration Guide

Performing administration and management tasks: 

  • Using the administration and command-line interfaces

  • Configuring server preferences

  • Managing users and groups

  • Monitoring and logging server activity

  • Using certificates and public key cryptography to secure the server

  • Controlling server access

  • Proxying and routing URLs

  • Caching

  • Filtering content

  • Using a reverse proxy

  • Using SOCKS

Administration Guide (and the online Help included with the product)

Editing configuration files 

Configuration File Reference

Creating custom Netscape Server Application Programmer’s Interface (NSAPI) plugins

NSAPI Developer’s Guide

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.


Note –

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Feedback

Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com/app/docs and click “Send comments”. Be sure to provide the document title and part number in the online form.

Documentation, Support, and Training

Sun Function 

URL 

Description 

Documentation 

http://www.sun.com/documentation/

Download PDF and HTML documents, and order printed documents 

Support and Training 

http://www.sun.com/support/

http://www.sun.com/training/

Obtain technical support, download patches, and learn about Sun courses 

Typographic Conventions

The following table describes the typographic changes that are used in this book.

Table P–3 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories, and onscreen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with onscreen computer output 

machine_name% su

Password:

aabbcc123

Placeholder: replace with a real name or value 

The command to remove a file is rm filename.

AaBbCc123

Book titles, new terms, and terms to be emphasized 

Read Chapter 6 in the User's Guide.

Perform a patch analysis.

Do not save the file.

[Note that some emphasized items appear bold online.] 

Shell Prompts in Command Examples

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–4 Shell Prompts

Shell 

Prompt 

C shell prompt 

machine_name%

C shell superuser prompt 

machine_name#

Bourne shell and Korn shell prompt 

$

Bourne shell and Korn shell superuser prompt 

#