Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Helicon ISAPI Rewrite 3 - Pass through

Posted on 2010-09-04
1
Medium Priority
?
603 Views
Last Modified: 2012-05-10
There are certain directories (/images) in the website that can be accessed without processing all of the rules in the httpd.conf file.

What would I place at the top of the file to basically say this request doesn't need to be processed any further pass it on through just as you received it.
0
Comment
Question by:collages
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 30

Accepted Solution

by:
Brad Howe earned 2000 total points
ID: 33617273
Hi,
you can use the (L) last|L option.

Stops rewrite process here and doesn’t apply any more rules from the current configuration file. NOTE: Any Descendant .htaccess files in sub directories will still be applied.
place this at the top before all other rules.
 # stuff to let through (ignore)
  RewriteCond %{REQUEST_URI} "/images/"
  RewriteRule (.*) $1 [L]

Cheers,Hades666
 
0

Featured Post

Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here are the symptoms: You start receiving calls from users that one of your legacy web apps isn't coming up, so you log into your IIS 5 server to check it out.  When you pull up the services, you notice that the WWW Publishing service isn't runn…
First of all, clustering IIS is something you should rarely consider doing. In almost all cases, Microsoft Network Load Balancing (NLB) (http://technet.microsoft.com/en-us/library/cc758834(WS.10).aspx) is a much better solution when you need to p…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

660 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question