General |
On the tab, specify the following Web server settings: •—IP address or DNS name of Dr.Web Server. Parameter is specified in the following format: <Server IP address or DNS name>[:<port>] If the Server address is not specified, computer name returned by the operating system or the Server network address is used: DNS name, if available, otherwise—IP address. If the port number is not specified, the port from a request is used (e.g., for requests to the Server from the Control Center or via the ). Particularly, for the requests from the Control Center it is the port specified in the address line for connection of the Control Center to the Server. •—number of parallel requests processed by the Web server. This parameter affects server performance. It is not recommended to change this parameter without need. •—number of threads serving data transmitted in network. This parameter affects Server performance. It is not recommended to change this parameter without need. •—HTTP version 1 protocol session timeout. For persistent connections, Server releases the connection, if there are no requests received from a client during specific time slot. Timeout is relevant before the first data exchange within the session. •—minimal acceptable data send rate. If outgoing network speed is lower than this value, connection will be rejected. Specify 0 to ignore this limit. •—minimal acceptable data receive rate. If incoming network speed is lower than this value, connection will be rejected. Specify 0 to ignore this limit. •—size of buffers used when sending data. This parameter affects server performance. It is not recommended to change this parameter without need. •—size of buffers used when receiving data. This parameter affects server performance. It is not recommended to change this parameter without need. •—Maximum allowed size of HTTP request. •—set the flag to provide protective measures against flood attacks. Specify the following parameters of attack detection: ▫—time period in seconds during which the certain number of requests must be received to confirm the flood attack from the client. ▫—the minimum number of requests that must be received during certain time period to confirm the flood attack from the client. ▫—connections from the client will be prevented for the specified number of seconds. In the section, you can specify parameters of a traffic compression for data transmission over a communication channel with the Web server via HTTP/HTTPS: •—maximal size of HTTP responses which will be compressed. Specify the 0 value to disable limitation on maximal size of HTTP responses to be compressed. •—minimal size of HTTP responses which will be compressed. Specify the 0 value to disable limitation on minimal size of HTTP responses to be compressed. •: ▫—priority order of compression types is defined by a client considering the allowed compression types. ▫—priority order of compression types is defined by the server considering the allowed compression types. In this case, specify the using order of compression types in the list below. To change the order, drag and drop corresponding block over the root. You can enable or disable and also set the order of use (if the order is defined by the Server) the following compression types: ▫—set the flag to use this type of compression. In the field, specify the value in the range 0-9. The 0 value disables compression. ▫—set the flag to use this type of compression. In the field, specify the value in the range 0-9. The 0 value disables compression. ▫—set the flag to use this type of compression. In the field, specify the value in the range 0-11. The 0 value disables compression. •—set the flag to replace IP address with DNS names of computers in the Server log file. •—set the flag to support connections with the web server via HTTP protocol version 2. ▫—HTTP version 2 protocol session timeout. For persistent connections, server releases the connection, if there are no requests received from a client during specific time slot. •—set the flag to use keep-alive TLS connection. Older browsers may not work properly with regular TLS connections. Disable this parameter, if you have problems with TLS protocol. •—path to TLS certificate file. The drop-down list contains available certificates from the Server folder. •—path to TLS private key file. The drop-down list contains available private keys from the Server folder. •—the path to encryption key for TLS session tickets. Used to resume a TLS session based on session tickets which are encrypted using the specified key. •—the string defining the list of ciphers from OpenSSL package that allowed for use in client connections. Leave the field blank to use the DEFAULT value that means ALL:!EXPORT:!LOW:!aNULL:!eNULL:!SSLv2. |