Solved

IHS https redirect on Windows 2008?

Posted on 2011-02-22
3
786 Views
Last Modified: 2012-06-27
Hello.  I have implemented a suggestion I saw with regards to redirecting http to https traffic on my IHS/Windows/Websphere7 server.  

In the httpd.conf file, I added:
RewriteEngine on
RewriteCond %{SERVER_PORT} =80
RewriteRule ^(.*) https://%{SERVER_NAME}%{REQUEST_URI}

and it redirected my hosts from using the dmz ip's to use secure pages.  However, this code does not seem to work when the Coyote ip-sprayer (my understanding of the appliance in front) is in the mix.   I get timeout errors, when using the external address.

Any feedback on the syntax? do I have it correct, or should I have the network tech look further at the Coyote appliance?  Thanks in advance for your help!

sharon
0
Comment
Question by:bongios
  • 2
3 Comments
 
LVL 27

Accepted Solution

by:
BigRat earned 250 total points
ID: 34959427
The syntax is correct.

I suspect that the problem lies in the resolution of the name to an I/P address. Apache seems to put in it's redirects as "Location" the fixed I/P address rather than the acutal name, so instead of seeing "Location: www.mycorp.com" one sees "Location: 215.123.123.42". If then somebody rotates names to I/P addresses there is then a problem.

I'd take your server name and it's I/P address and do DNS lookups both internet and intranet wise, just to be certain that the anmes and addresses belong to each other.

I have no idea what a "coyote ip sprayer" is (although I can guess) so being a little more specific about it might help?
0
 

Author Comment

by:bongios
ID: 34961810
Thanks for your feedback.  After implementing a RedirectMatch directive (which worked on DMZ, but again, not with Coyote) I realized it was the network device doing something.

At this point, the network tech is taking on the task of providing urlrewrite and redirection, so I don't need to do anything further. I think.

Thanks for confirming the syntax!
sharon
0
 

Author Closing Comment

by:bongios
ID: 34961867
coyote seemed to be the issue.  BigRat confirmed my syntax was correct, which was helpful.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Verbose logging is used to diagnose garbage collector problems. By default, -verbose:gc output is written to either native_stderr.log or native_stdout.log.   It is also possible to redirect the logs to a user-specified file. This article will de…
This article is about some of the basic and important steps to be used to improve the performance in web-sphere commerce application development. 1) Always leverage the Dyna-caching facility provided by the product 2) Remove the unwanted code …
This video discusses moving either the default database or any database to a new volume.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now