Home
Troubleshooting Internet Information Server
Contents
1. Files with the extension specified were filtered with the default text filter adding unnecessary data to the index Consider turning off filtering for this extension Cleaning up corrupted content index metadata on lt catalog gt Index will be automatically restored by refiltering all documents A catastrophic data corruption error was detected on the specified catalog which will be rebuilt This can be caused by a hardware failure or rarely because of an abrupt shutdown or power failure Table 7 6 continued 262 Chapter 7 Troubleshooting Internet Information Server Error Messages Content index on lt catalog gt could not be initialized Error lt number gt Description An unknown possibly catastrophic error occurred Report the error number to Microsoft Technical Support delete all files under lt catalog gt and re index Content index on lt catalog gt is cor rupted Please shut down and restart Web server Content index corruption detected in component lt component gt Stack trace is lt stack gt A catastrophic data corruption error was detected on the specified catalog which will be rebuilt This is can be caused by a hardware failure or rarely because of abrupt shutdown or power failure To recover shut down and restart the Web server The content index was corrupted Delete the catalog and start over If the error recurs remove and reinstall Index Server The content
2. If the test is unsuccessful you should first make sure the router is avail able e g that it is powered up and connected to the network Check again to make sure the local host is configured with the correct subnet mask and gateway address You might also need to verify that the router is configured properly Routers have multiple IP addresses for the multiple subnets they reside on The port that is connected to the subnet on which your local host resides must have an IP address and subnet mask that is valid for your sub net Other ports must have IP addresses and subnet masks that are valid for those subnets and or the Internet You can verify all of these ports by pinging each of their addresses PINGING A REMOTE HOST ON ANOTHER SUBNET You can verify that network communications are possible between your computer and a remote host on another subnet or the Internet by using the PING command with the IP address of that remote host Again if all is well you should see packets going out on and coming back over the network If there is a problem the packets will not be returned in the required time and you will see time out messages see Figure 7 35 If the test is unsuccessful and you have already performed the previous tests to determine that local connectivity is possible then the problem might lie with routers or hosts beyond your network This type of problem can often be tracked down using another utility TRACERT 246 Chapter
3. m Log On s System Account IV Allow Service to Interact with Desktop Figure 7 46 Starting and Stopping the Index Server Troubleshooting Index Server Queries 257 Word weighting is handled by the WAISINDX EXE utility It also deter mines which words will be indexed and where the actual data is found In general WAISINDX creates seven indices for each data file which combined equal about 110 percent of the data file s size If you add new records to the data WAISINDX must be run to create new indices that include this data Troubleshooting Query Errors Table 7 4 lists the messages that can be returned when an error occurs during the query process Table 7 4 Index Server Query Syntax Error Messages Error Message Expecting closing parenthesis Expecting closing square bracket Description Parenthesis were mismatched Opening square bracket was not followed by a closing bracket Expecting comma Expecting currency Reserved token or end of string was before the closing brace of a vector property Property type DBTYPE_CY received incorrect input The cor rect format is Expecting date Expecting end of string Property type DBTYPE_DATE received incorrect input The correct format for absolute dates is yyy mm dd yyy mm dd hh mm ss The correct format for relative dates is y m w d h n s More input was present beyond the restrictio
4. A True B False If you want to know which settings a DHCP server has leased to a client com puter you may type the IPCONFIG all command at the command prompt A True B False Which of the following are procedures useful in troubleshooting with the PING utility Choose all that apply A Ping the local host B Ping a remote host on the same subnet C Ping the default gateway router D Ping a remote host on a another subnet The way in which the Index Server indexes words for importance is referred to as word weighting A True B False The application log registers errors under the CiErrorMessages category A True B False You should make sure all existing Web Gopher and FTP services are running before you install the Windows NT 4 0 Option Pack A True B False You can locate broken Web site links and a number of other errors using Inter net Service Manager A True B False 286 Chapter 7 Troubleshooting Internet Information Server 11 12 13 14 15 Broken links can only be detected for Web pages on the local server A True B False If you wish to hide your Web site you can change its default port number to anything above 80 A True B False HTTP error code 404 refers to a failure in DNS name resolution A True B False To be able to upload and download files from an FTP directory users must have at least Read permissions A True B False Get is an FTP comma
5. Transceiver type The transceiver type is associated with the cabling used on your network It ensures that signals are properly transmit ted and received across the medium BINDINGS TAB As shown in Figure 7 13 here is where network bindings are added removed and configured Bindings act as the interfaces between net work hardware protocols and services Here you can change the associations of services and network hardware with the various protocols Use the Show Binding for pop up menu to switch between views for network adapters services and protocols The Enable but ton activates a binding The Disable button de activates it The Move Up and Move Down buttons permit you to rearrange the order in which the bind ings are applied Troubleshooting Configurations 221 all services ha SF WINS Client TCP IP NWLink IPX SPX Compatible Transport Y NWLink NetBIOS Y WINS Client TCP IP Workstation Y NWLink NetBIOS Y WINS Client TCP IP Move Up Move Down LK ca Figure 7 13 The Bindings Tab PROTOCOLS TAB As shown in Figure 7 14 here is where network protocols such as TCP IP are added removed and configured To configure TCP IP select TCP IP Protocol under the Protocols tab and press the Properties button This will open the window that is shown in Nw Link IPX SPX Compatible Transport Figure 7 14 The Protocols Tab 222 Chapter 7 Troubleshooting Internet Information Server Figure 7
6. If you fail to properly configure the previously mentioned dialog boxes a number of errors are possible IP ADDRESS PROBLEMS It is important that the IP address used by the IIS computer is properly mapped to the correct host name in your network s DNS database or LMHOSTS file If not Web browsers and other clients will only be able to access the IIS by referring to an explicit IP address For exam ple imagine a server with the host name www scionnet com and an IP address of 157 22 252 100 If you change the IP address to 157 22 252 101 the server will still be able to communicate using the number but the host name would no longer be resolved to the correct computer Because of this you must be sure to use the exact IP address given to you by whoever is responsible for the network s DNS an administrator or your ISP As previously described part of each IP address specifies the network and part specifies the host When subnetting is used part of the host address is used to specify the subnet Because of this mistyping the IP address can cause different problems based on the octet s that are incorrect For example if you mistyped 157 22 252 100 as 175 22 252 100 the server would be identified with an entirely different network If the server e g 175 22 252 100 attempts to send a message to a local client e g 157 22 252 105 it will not go through because the server thinks the client address is on a remote network
7. If the client e g 157 22 252 105 attempts to send a message to the local server at the mistyped address e g 175 22 252 100 the server will be seen as remote and the packets will be routed through the default gateway If the client e g 157 22 252 105 attempts to send a message to the local server at the correct address e g 157 22 252 100 the packets will stay on the local Troubleshooting Configurations 225 network but there will be no server at that address to receive them Either way the messages will not go through SUBNET MASK PROBLEMS If the IP address is configured correctly but the wrong subnet mask is used problems will also occur For example the server could be configured with the address 157 22 252 100 and the subnet mask 255 255 255 0 In this case 157 22 252 denotes the network and 100 denotes the host Suppose however that the network had actually been divided into two subnets using the subnet mask 255 255 255 128 All host addresses would then be distributed between two subnets 1 126 and 129 254 In this case a client with an IP address of 157 22 252 130 would be able to commu nicate with the server The subnet mask is only used in routing outgoing messages so the difference in subnet masks would not affect incoming com munications The server would not be able to communicate with the client however because the incorrect subnet mask would indicate that the client is local when it is actually remote
8. Table 7 1 provides a review of some typical small network subnet con figurations Table 7 1 Class C Subnets Subnet Mask Segments Host Ranges 255 255 255 0 1 1 254 255 255 255 128 2 1 126 129 254 255 255 255 192 4 1 62 65 126 129 190 193 254 255 255 255 224 8 1 30 33 62 65 94 97 126 129 158 161 190 193 222 225 254 255 255 255 240 16 1 14 17 30 33 46 49 62 65 78 81 94 97 110 113 126 129 142 145 158 161 174 177 190 193 206 209 222 225 238 241 254 255 255 255 248 32 1 6 etc first and last address in the range is reserved In short mistakes in the subnet mask configuration cause some packets to be routed when they should be kept local and some packets to remain local when they should be routed Such mistakes manifest themselves as intermittent connections GATEWAY ADDRESS PROBLEMS Mistyping the default gateway router address causes problems similar to those caused by a misconfigured subnet mask Because the router is only responsible for routing packets to remote networks communications between a client and the incorrectly configured server on the same subnet can still take place Likewise a remote client can 226 Chapter 7 Troubleshooting Internet Information Server also send packets to the server The server will not be able to send packets to the remote client however Typically the first or last non reserved IP address in a given range is used for the router address W
9. Troubleshooting Internet Information Server A Chapter Syllabus In this chapter we will look at material covered in ET the Troubleshooting section of Microsoft s Imple EESE Proubleshooting menting and Supporting Microsoft Internet Information Server 4 0 exam 70 087 Microsoft describes its objectives as Troubleshooting Security Troubleshooting Resource Access Resolving IIS configuration problems Resolving security problems Resolving resource access problems Resolving Index Server query problems KAH Troubleshooting Index Resolving Windows NT Server 4 0 and HS Server Queries setup problems Using WebMaps to find and repair broken Troubleshooting links instalation Resolving WWW service problems Resolving FTP service problems Repairing Broken Links LON viva Troubleshooting WWW Services Troubleshooting FTP Services 209 210 Chapter 7 Troubleshooting Internet Information Server Troubleshooting Configurations In this section you will learn to identify and correct basic IIS configuration problems Many such problems are related to the underlying Windows NT Server the installation of IIS or TCP IP Hardware Configurations The IIS will work improperly if at all if installed on incompatible hardware Windows NT Server and IIS can run on either Intel based computers or Reduced Instruction Set Chip RISC based computers such as the Digital Equipment Corp DEC Alpha so long as its minimum per
10. alel Sa Al c a 2 B 157 22 252 160 files 157 22 252 160 fimages Scion Networks LLC B Scion Networks LLC Home Page mj fi Whatis Scion Networks Scion Networks Publications amp Reso B Get AppleShare IP B Get Claris Em iler Companion B Get AppleTalk Network Services Get Designing AppleTalk Network An B Get Complete Guide to Backup Mana Get Managing AppleShare Get DHTML for Webmasters B Scion Networks at Mactivity 97 Scion Networks at ComNet 97 ii Scion Networks at MacWorld 97 B Scion Networks and Digital Photograp z TETTETETT EEEE Figure 7 52 Viewing a WebMap To view your site s link information click on the Object Links toolbar button to open the Link Info window as shown in Figure 7 53 By selecting the Links on Page radio button you can view all of the hyperlinks present on a given page Company es Compar scion a htm scion a htm scion a htm e scion a htm Onsite i Onsite M ain Number of Links 3 Figure 7 53 Viewing the Link Info Windows Links on Page 274 Chapter 7 Troubleshooting Internet Information Server F Link Info for Scion Networks LLC Home Page C Links onPage InLinks ain Route Consulting content TE Ons lt n main htm main htm Onsite Publishing OnPage Alten Training OnPage Alter main htm Onsite Altert main htm Onsite Alteri
11. permitting a DHCP server to assign it dynamically IP addresses are gener ally obtained from an ISP or some authority within your organization If these are configured incorrectly communications problems will result USING THE NETWORK CONTROL PANEL Network protocols and their associated hardware bindings are configured in the Network application found in the Control Panel program group Its interface contains five tabs whose contents should be verified when problems occur IDENTIFICATION TAB As shown in Figure 7 10 here is where the computer s NetBIOS name and the name of the workgroup or domain it is a member of is configured Network 2 x Identification Services Protocols Adapters Bindings fi Windows uses the following information to identify your computer on the network You may change the name for this computer and the workgroup or domain that it will appear in Computer Name TRD_PC Workgroup Nooo Figure 7 10 The Identification Tab Troubleshooting Configurations 219 SERVICES TAB As shown in Figure 7 11 here is where network services are added removed and configured Besides those shown in Figure 7 11 other relevant Windows NT net work services include DHCP Relay Agent DHCP Server DNS Server TCP IP Printing Remote Access Services Router Information Protocol RIP for Internet Protocol and WINS server ADAPTERS TAB As shown in Figure 7 12 here is where network adapter
12. symbols these denote a signifi cant but not problematic event Resource access problems are noted in the security log In order to use the security log you must enable auditing via the User Manager for Domains application This can be done using the Auditing option under User Manager for Domain s Policy menu to open the Audit Policy dialog box as is shown in Figure 7 4 Event Viewer System Log on SN_PDC OF x Log View Options Help Date Time Source Category Event 3 15 98 3 17 04 PM BROWSER one 8015 5 15 98 3 13 00 PM Mouclass one 11 5 15 98 3 02 51 PM Print one 10 8 15 98 3 00 43 PM Server None 2510 3 15 98 2 59 31 PM BROWSER one 8015 8 15 98 2 59 28 PM BROWSER one 8015 5 15 98 2 57 42 PM EventLog None 6005 5 15 98 2 59 27 PM BROWSER one 8015 3 15 98 1 16 04 PM Print one 9 5 15 98 1 15 10 PM Print None 15 9 15 98 1 15 10 PM Print None 15 5 15 98 1 15 10 PM Print one 15 3 15 98 1 15 10 PM Print None 15 5 15 98 1 15 10 PM Print None 15 8 15 98 1 14 56 PM Print one 2 815 98 1 14 05 PM Print None Figure 7 3 System Log in Event Viewer Troubleshooting Configurations 213 Audit Policy x Computer TRD_PC C Do Not Audit EA me Success Failure Help Logon and Logoff File and Object Access Use of User Rights User and Group Management Security Policy Changes Restart Shutdown and System Process Tracking CE G E U B Hi CE U E U E E I Figure 7 4 Audit Policy Dial
13. 15 which contains IP Address DNS WINS Address DHCP Relay and Routing tabs Because this is a server computer you will need to select the Specify an IP address radio button You must then enter the correct IP address subnet mask and gateway address The association of domain names with machine addresses is handled by Domain Name System DNS servers Enter the machine addresses for your network s DNS servers in DNS Service Search Order field in order of preference Enter the domain s for your network in the Domain Suffix Search Order field as shown in Figure 7 16 Windows NT Server can also act as a DNS server itself The Windows Internet Name Service WINS is somewhat like DNS except that it maps IP addresses to NetBIOS names instead of domain names Configure the IP addresses of the Windows NT servers that are run ning WINS for your network in the Primary WINS Server and Secondary WINS Server fields under the WINS Address tab as shown in Figure 7 17 By default the Enable LMHOSTS Lookup checkbox is selected This permits the use of a text list of IP address to NetBIOS name mappings for computers outside the local subnet If the Enable DNS for Windows Resolu tion checkbox is selected Windows NT will lookup NetBIOS names against a DNS server Microsoft TCP IP Properties x IP Address DNS WINS Address DHCP Relay Routing An IP address can be automatically assigned to this network card by a D
14. 7 42 Hosts can only communicate if they belong to the same NetBIOS scope TCP IP Properties _2 x Bindings Advanced Netplos DNS Configuration Gateway WINS Configuration IP Address Contact your network administrator to find out if you need to configure your computer for WINS Disable WINS Resolution Scope ID Figure 7 42 Configuring the Scope ID Field for NetBIOS Troubleshooting Resource Access 251 Another area to check is the local name cache Make sure that its entries are correct using the NBTSTAT utility with the C switch If there is old incorrect data reload the cache R switch and try the session again If there is no problem with the name cache verify that the correct WINS server information has been configured on the client computer This information can be viewed in the TCP IP Properties dialog box of the Net work Control Panel application or by using IPCONFIG with the all switch You can also verify the WINS database on the server using the WINS Man ager application If there appears to be no problem with either the local name cache or WINS take a look at the LMHOSTS file as shown in Figure 7 43 amp Lmhosts Notepad oy x File Edit Search Help Following any entry in the file with the characters PRE will cause the entry to be preloaded into the name cache By default entries are not preloaded but are parsed only after dynamic name resolution fails Following an entry
15. DBTYPE_VECTOR or DBTYPE_BYREF used alone Duplicate column possibly by a column alias found in the CiColumns specifi cation in the file lt file_ name gt 259 Troubleshooting Index Server Queries Description VECTOR and BYREF property modifiers were not used with a type as is required Property was named multiple times in the CiColumns line Duplicate property name Expecting closing parenthesis Property was named multiple times in the Names section Opening parenthesis were not followed by closing parenthesis in the Names section Expecting GUID Expecting integer Entry in Names section had incorrect format Entry in Names section had incorrect format Expecting property name Expecting property specifier Expecting SHALLOW or DEEP in IDQ file lt file_name gt on Line CiFlags Expecting TRUE or FALSE in IDQ file lt file_name gt on line CiForceUseCi Expecting type specifier Failed to set property name Entry in Names section had incorrect format Property specifier in Names section was invalid or missing CiFlags parameter had incorrect value CiForceUseCi parameter had incorrect value Entry in Names section had incorrect format Resource failure occurred such as running out of memory The file lt file gt is on a network share DQ IDA and HTX files cannot be placed on a network share The HTX file specified could not be found in any virtual or ph
16. MaxCharacterization Maximum number of query threads This establishes the maxi mum number of concurrently processed asynchronous queries Measured in threads Range is 1 to 1000 Default is 2 Number of characters in the automatically generated characteriza tion abstract Measured in characters Range is 20 to 500 Default is 320 MaxFilesizeFiltered MaxFilesizeMultiplier Maximum size of a single file to be filtered using the default filter If the default filter is used for a file bigger than this number only properties will be filtered Note that this limit does not apply for registered file types Measured in Kilobytes Range is 0 to infinity Default is 256 Maximum amount of data that can be generated from a single file based on its size This value is a multiplier A value of 3 means that a file can generate up to three times its size in content index data Measured in number Range is 4 to OxFFFFFFFF Default is 8 MaxFreshCount Maximum number of files whose latest indexed data is not in the master index When this limit is reached a master merge will start Measured in documents Range is 1000 to 40 000 Default is 5000 Table 7 7 continued Parameter MaxIdealIndexes Troubleshooting Index Server Queries 267 Description Maximum number of indexes considered acceptable in a well tuned system When the number of indexes climbs above this num ber and the system is idle an annealing merge will
17. Server Windows NT Server will be permitted access to the IIS This is handy for secure environments but causes problems for public sites To enable or disable anonymous access launch the Internet Service Manager Microsoft Management Console application from the Microsoft Information Server program group in the Windows NT 4 0 Option Pack program group Here open the FTP Properties and or Web Properties dialog box then select the Allow Anonymous Connections checkbox under the Security Accounts tab as shown in Figure 7 22 The IUSR account appears in the Username field by default This can be changed using the Browse button should you wish to use the permissions of another account in the Windows NT users and groups database If you do this you must then also set the chosen account s corresponding password or select the Enable Automatic Password Synchronization checkbox to copy it from the user and group database automatically If you select the Allow only anonymous connections checkbox only guest access is permitted This ensures that only those permissions assigned to the anonymous account can be used regardless of the permissions a given user s account might have To provide low security for public sites enable anonymous access and the IUSR account To provide high security for private sites disable anony mous access and disable or delete the IUSR account Users will still be able to access the resource with valid user name passwo
18. WWW Gopher FTP Telnet and IRC Three components come into play during this process When a client requests a host name to IP address mapping it is acting as a domain name resolver The service that receives the client s request is the domain name server such as the Windows NT DNS Server A local DNS server will know about the address mappings for the local network but not for the rest of the world When a client requests an address that resides on the Internet the local DNS server must pass the request on to the domain name space This refers to a distributed database of unique IP address to host name mappings that resides on DNS servers world wide Clients can be configured to use DNS servers under the DNS tab of the TCP IP Properties dialog box see Figure 7 16 Microsoft TCP IP Properties 12 x IP Address DNS WINS Address DHCP Relay Routing DHCP Relay Agent relays DHCP and BOOTP broadcast messages between a BOOTP DHCP server and a client across an IP router If you don t know your DHCP server s address ask your network administrator Seconds threshold 4 Maximum hops EEE DHCP Servers Remove OK Cancel Figure 7 20 DHCP Relay tab in the TCP IP Properties Dialog Box 230 Chapter 7 Troubleshooting Internet Information Server To determine if the local host is capable of resolving a domain name you can use the NSLOOKUP utility It can be launched from the Command Prompt with the foll
19. in My Computer or Explorer then choose the Properties command from the File menu Next switch to the Security tab and press the Permissions button to open the Permissions dialog box Here use the Add button to open the Add Users and Groups dialog box as shown in Figure 7 28 Add Users and Groups x List Names From E TRD_PC z All authenticated users Backup Operators Members can bypass file security to bacl Soom All Users Guests Users granted quest access to the comp amp INTERACTIVE Users accessing this object locally 4 NETWORK Users accessing this object remotely 3 Power Users Members can share directories and print Add Show Users Members Search Add Names Type of Access Read z Cancel Hep Figure 7 28 Add Users and Groups Dialog Box Troubleshooting Security 239 Here you are given the option of adding groups To add an individual user press the Show Users button to see users listed as well When designating permissions for files two additional options are available The Replace Permissions in Subdirectories checkbox modifies the permissions on subdirectories in a directory from the top level down but not those of files The Replace Permissions on Existing Files checkbox extends modified directory permissions to files but not to subdirectories or the files they contain Note that you may create situations in which users are granted different sets of permissions by virtue o
20. index could not filter file lt file gt The filter operation was retried lt number gt times without success Content index on drive is corrupted Please shutdown and restart the Con tent Index service cisvc The specified document failed to filter This indicates a corrupted document corrupted properties or in rare cases a case in which the document was in use for a long time Stop and restart the service in the Services Control Panel applica tion The content index filter for file lt file gt generated content data more than lt size gt times the file s size The content index filter stopped while filtering lt file gt The CI daemon was restarted Please check the validity of the filter for objects of this class Filtering the document generated more output than is allowed This can be caused by a poorly written filter a corrupted docu ment or both Document filtering started but did not finish before the timeout period expired This is usually caused by a poorly written filter a corrupted document or both A content scan has completed on lt catalog gt An error has been detected on lt catalog gt that requires a full content scan An error has been detected in content index on lt catalog gt An error has been detected on lt catalog gt that requires a partial content scan The catalog was scanned successfully The catalog lost a change notification This can be cause
21. located on the WWW at http www microsoft com ntserver Web Microsoft TechNet The Microsoft TechNet program available through Microsoft sales provides subscribers with service packs drivers updates and technical information on CD ROM as shown in Figure 7 50 Subscribers are sent updated TechNet CD ROMs monthly lt Microsoft TechNet CD File Edit View Contents Tools Help oon S e ce e asl hel E Sole E Entire Contents TechNet News Welcome to Microsoft TechNet KM a Beery MS BackOffice and Enterpris e Personal Systems MS Office and Desktop Appli Database and Development e Hardware Ej Planning Analysis and Implem Technologies Technical Information Network Ej e Service and Support E e Knowledge Base Using TechNet Figure 7 50 Viewing the TechNet CD ROM 272 Chapter 7 Troubleshooting Internet Information Server Microsoft TechNet ServiceDesk Microsoft Internet Explorer MEE File Edt View Go Favoites Help Address hitp cupport mictosoft com servicedesks TechNet z Micra ed TechNet Home TechNet CD Online Events amp Training International Technical Services Technical Support for IT Professionals Resources Advanced View Go to Basic View 4 Search our entire Knowledge Base Troubleshooting Wizards and downloadable files Technologies My search is about Internet Information Serer zl q O I want to search by Key
22. main htm Onsite Alter Eolumns main htm Onsite Pi Number of Links 25 Figure 7 54 Viewing the Link Info Window s InLinks By selecting the InLinks radio button you can view links that reference the page you are viewing as shown in Figure 7 54 These can be local to the Web site or on other sites Using Quick Search Once you have created a WebMap you can then use Content Analyzer s Quick Search command launched from the Tools menu or the menu bar to hunt for various problems BROKEN LINKS Use the Broken Links command in the Quick Search fly out menu under the Tools menu to search for links that do not connect to valid resources as shown in Figure 7 55 To correct a broken link select the page and choose the Launch Helper App command from the Tools menu to open an HTML editor application Repairing Broken Links Microsoft Site Server Express Content Analyzer 157 22 252 10 Broken Links Sear EG fi File View Mapping Tools Window Help 18 x Diela Zai 22 Ae 2 AL m AE Ons TE Onsite Onsite click here n Onsite Number of Links 4 Ready Main Alternate 0 iis nel Main 03 0 default htm Main 403 Oh min Figure 7 55 Finding Broken Links with the Quick Search Command HOME SITE OBJECTS 275 Use the Home Site Objects command in the Quick Search fly out menu under the Tools menu to search for all home site objects see Figure 7 56 Microsoft Site Server Expre
23. or RAM At least a 150 MHz processor and 48 Mbytes of RAM is required for a RISC based computer In addition to Windows NT Server 4 0 the Windows NT Option Pack 4 0 requires the latest Service Pack version 3 or later The Event Viewer application can be used to identify services that fail to launch on the Windows NT Server at startup along with other data Win dows NT Diagnostics provides detailed system configuration information The Recovery utility can be used to log debugging information Networking configuration is performed through the Network Control Panel application Here you can configure such variables as computer identi fication network services adapters and bindings and protocols In configur ing TCP IP you should pay particular attention to the IP address subnet mask gateway address and DNS settings TCP IP errors most commonly involve the misconfiguration of these settings Troubleshooting Security In troubleshooting security one is either attempting to keep people from getting access to resources that they should be restricted from or to give peo ple access to resources they should have Common problems in this area involve firewalls anonymous access user logons network access port num bers NTFS permissions and SSL connections and server certificates Troubleshooting Resource Access When users have trouble accessing a networked resource protocol miscon figuration is commonly to blame You can use the
24. provides the DHCP Relay agent which can be installed as a network service It will pass broadcast traffic directly to the DHCP servers you designate under the DHCP Relay tab of the TCP IP Properties dialog box see Figure 7 20 BOOTP or Bootstrap Protocol is an earlier UNIX technique for obtain ing dynamic IP addresses DHCP is based upon this earlier more limited protocol Because of this DHCP servers can process requests from BOOTP clients as well NAME RESOLUTION PROBLEMS Windows NT clients use two name resolution methodologies when accessing the network When native Windows NT net working is in use NetBIOS name resolution is employed This is supported by all Windows NT protocols although in the case of TCP IP the add on WINS service is needed When TCP IP based services are in use host name resolution is employed This is only necessary when using intranet or Inter net applications and is made possible by DNS servers Troubleshooting Configurations 229 WINS clients automatically contact the WINS server upon startup to provide their NetBIOS Computer Names and IP addresses This information goes into a central database maintained by the WINS server Clients can be configured to make the WINS server their primary method of NetBIOS name resolution under the WINS Address tab of the TCP IP Properties dialog box see Figure 7 17 Host name resolution is needed when clients make use of TCP IP based applications such as the
25. setting lease values you should adhere to the following rules e The lease duration should be shorter when the number of clients is near to or exceeds the number of available IP addresses The lease duration should be longer when there are plenty of IP addresses to go around Lease durations can differ from scope to scope 228 Chapter 7 Troubleshooting Internet Information Server Several other parameters can also be assigned by the DHCP Server Router Used to include the IP address of the default gateway for the subnet DNS Server Used to include the IP addresses of the DNS servers on the network Domain Name Used to include the domain name that should be used by the host NetBIOS Scope ID Used when you wish to separate clients into logi cal network segments so that they cannot communicate with each other WINS NBNS Servers Used to include the IP addresses of servers that can be used for IP address to NetBIOS name resolution WINS NBT Node Type Used to identify the methods that will be used for IP address to NetBIOS name resolution DHCP RELAY PROBLEMS In order to obtain an IP address workstations will send out network broadcast packets to any available BOOTP DHCP servers Since one function of a router is to limit broadcast traffic to its network of origin a workstation on one side of a router will often be unable to commu nicate with a DHCP server on the other side To overcome this limitation Windows NT
26. with the DOM lt domain gt tag will associate the entry with the domain specified by lt domain gt This affects how the browser and logon services behave in TCP IP environments To preload the host name associated with DOM entry it is necessary to also add a PRE to the line The lt domain gt is always preloaded although it will not be shown when the name cache is viewed Specifying INCLUDE lt filename gt will force the RFC NetBIOS NBT software to seek the specified lt filename gt and parse it as if it were local lt filename gt is generally a UNC based name allowing a centralized lmhosts file to be maintained on a server It is ALWAYS necessary to provide a mapping for the IP address of the server prior to the INCLUDE This mapping must use the PRE directive In addtion the share public in the example below must be in the LanManServer list of NullSessionShares in order for client machines to be able to read the lmhosts file successfully This key is under it it machine system currentcontrolset services lanmanserver parameters nullsessions hares in the registry Simply add public to the list found there The BEGIN_ and END_ALTERNATE keywords allow multiple INCLUDE statements to be grouped together Any single successful include will cause the group to succeed Finally non printing characters can be embedded in mappings by first surround
27. 32K Search R M EG ry File View Mapping Tools Window Help 8 x pela aal yalt ea ale 2l er eH L Modes Date Size Load Level _unks Broken Intis H Get DHTML for Webmas 11 6 98 11 42 56 P 6023 35531 12 een Number of Objects 1 Ready Figure 7 58 Finding Objects over 32 Kbytes with the Quick Search Command Repairing Broken Links 277 L Microsoft Site Server Express Content Analyzer sn Non Home Site Objects Searc File View Mapping Tools Window Help 218 x oela S aas Sa aie Sez viel L oie Tope Wodiedbae sae ras tee me text html text html text html vi html thtml Number of Objects 27 Ready Figure 7 59 Finding Non Home Site Objects with the Quick Search Command NON HOME SITE OBJECTS Use the Non Home Site Objects command in the Quick Search fly out menu under the Tools menu to search for objects not located at the home site as shown in Figure 7 59 NOT FOUND OBJECTS Use the Not Found Objects command in the Quick Search fly out menu under the Tools menu to search for objects that cannot be found and which generate the 404 error as shown in Figure 7 60 f Microsoft Site Server Express Content Analyzer sn Not Found Objects 404 Sear i l E3 Eie View Mapping Tools Window Help l lxi gelu oa Aes SA Ama 2 EEE kA AA e ee a a presentation application mac O http 157 Number of Objects 1 Ready Figure 7 60 Ident
28. 7 Troubleshooting Internet Information Server Troubleshooting With TRACERT If you can ping your default gateway but not a remote host employ the TRACERT Trace Route utility next It displays the Fully Qualified Domain Name FQDN and IP address of each gateway along the route to a remote host You can use TRACERT with either the host name or IP address of the remote computer as shown in Figure 7 36 Document the information that the TRACERT command returns when the remote host is available Later if the remote host is not available you can compare the information returned by TRACERT with the earlier results to determine which gateway is down If your organization uses a proxy server for access to the Internet you may not be able to use PING or TRACERT for hosts beyond your intra net Troubleshooting With NETSTAT The NETSTAT utility is used to list which TCP IP ports are used during communications sessions as shown in Figure 7 37 With it you can quickly determine if certain ports are not being accepted across the link perhaps because they are being blocked at a firewall MS DOS Prompt iol x Figure 7 36 Viewing Options for the TRACERT Utility Troubleshooting Resource Access 247 Command Prompt DERSTE s gt ed D gt cd winnt D WINNT gt netstat Active Connections Local Address Foreign Address State numedica localhost 1626 ESTABLISHED numedica localho ESTABLISHED numedica localho ESTABLIS
29. 99 2 37 01 AM LicenseService None 202 N A NUMEDICA 2 24 99 2 15 00 AM ESE9 Online Defragmer 180 N A UMEDICA 2 24 99 2 15 00 AM ESE9 Online Defragmer 179 N A UMEDICA 2 24 99 2 00 36 AM MSExchangeSA General 5000 N A UMEDICA 2 24 99 1 15 01 AM ESE9 Online Defragmer 180 N A UMEDICA 2 24 99 1 15 01 AM ESE9 Online Defragmer 179 N A UMEDICA 2 24 99 1 15 00 AM MSExchangelS Pub General 1207 N A NUMEDICA 2 24 99 1 15 00 AM MSExchangelS Pub General 1206 N A UMEDICA xf Troubleshooting Index Server Queries 261 Figure 7 47 Viewing the Windows NT Server Application Log Table 7 6 Ci Filter Service Error Messages Error Messages Account lt user id gt does not have inter active logon privilege on this computer You can give lt user id gt interactive logon privilege on this computer using the user manager administrative tool The CI filter daemon has prematurely stopped and will be subsequently restarted Description The user did not have interactive logon privileges for the Index Server computer Update the user s privileges with User Manager for Domains The filter daemon Cidaemon exe stopped unexpectedly This can be caused by poorly written filters CI has started on lt catalog gt Class for extension lt extension gt unknown Sample file lt file_name gt This is an informational message that is logged when the Index Server is started successfully
30. Address and Domain Name Restrictions field under the Directory Security tab of the Web Site Properties dialog box This will open the IP Address and Domain Name Restrictions dialog box as shown in Figure 7 23 If you select the Granted Access radio button all computers added to the exception pane will be denied access If you choose the Denied Access radio button all computers added to the exception pane will be granted access You can add computers to the exception list by pressing the Add but ton to open the Grant Deny Access On dialog box as shown in Figure 7 24 When connectivity problems are limited to specific hosts or networks check these configurations to ensure that access is being allowed This can be done on a directory level basis as well as for the entire site IP Address and Domain Name Restrictions x IP Address Access Restrictions By default all computers will be of Granted Access C Denied Access Except those listed below IP Address Mask Domain Name OK Cancel Help Figure 7 23 Granting or Denying Web Site Access 234 Chapter 7 Troubleshooting Internet Information Server Deny Access On x Type Single Computer Group of Computers Domain Name IP Address EE DNS Lookup Hk Cancel Help Figure 7 24 Adding Computers to the Exception List Troubleshooting Logons Problems with logons generally have simple solutions When registered users
31. CP IP Proper ties dialog box of the Network Control Panel application You can also verify the WINS database on the server using the DNS Manager application 254 Chapter 7 Troubleshooting Internet Information Server 3 annot find server Microsoft Internet Explorer joj xj File Edt View Favorites Tools Help e Q m g Back Forward Stop Refresh Home Search Favorites History Address je http www scionnet com z Go Links Ea la The page cannot be displayed The page you are looking for is currently unavailable The Web site might be experiencing technical difficulties or you may need to adjust your browser settings Please try the following Click the 2 Refresh button or try again later If you typed the page address in the Address bar make sure that it is spelled correctly To check your connection settings click the Tools menu and then click Internet Options On the Connections tab click Settings The settings should match those provided by your local area network LAN administrator or Internet service provider ISP If you are trying to reach a secure site make sure your Security settings can support it Click the Tools menu and then click Internet Options On the Advanced tab scroll to the Security section and check settings for SSL 2 0 SSL 3 0 TLS 1 0 PCT 1 0 Cannot find server or DNS Error Internet Explorer JE My Computer Figure 7 44 Unsucces
32. CiSort parameter was invalid Per mitted values are a for ascending and d for descending One or more output columns must be specified in the IDQ file lt file_name gt Operation on line number of IDA file lt file_name gt is invalid CiColumns parameter was missing At least one output column must be specified IDA file contained and unrecognized keyword The query failed because the Web server is busy processing other requests Read error in file lt file_ name gt The number of queries allowed was exceeded T O error occurred while file was being read A restriction must be specified in the IDQ file lt file_name gt A scope must be specified in the IDQ file lt file_name gt CiRestriction parameter was missing CiScope parameter was missing The template file cannot be found in the location specified by CiTemplate in file lt file_name gt A template must be specified in the IDQ file lt file_name gt CiTemplate parameter could not be used to locate a HTX file CiTemplate parameter was missing Template for IDA file lt file_name gt can not have detail section Unrecognized type An illegal section was found in the IDA file Remove everything beginning with lt BeginDetail gt and ending with lt EndDetail gt Invalid type was specified You must specify MaxRecordsPerPage in the IDQ File lt file_name gt The CiMaxRecordsPerPage parameter is missing i comp
33. Figure 7 25 Changing the WWW Service Port Number choosing the Internet Options command under the View menu and modify ing the Home page field under the General tab as shown in Figure 7 26 Internet Options a http www scionnet com 20804 Figure 7 26 Adding a Port Number to the Default Home Page URL in Internet Explorer 236 Chapter 7 Troubleshooting Internet Information Server Category El Appearance Fonts Colors m Navigator starts with Navigator C Blank page Languages G Applications Home cep l Smart Browsing Last page visited Mail amp Newsgroups m Home page E Roaming Access Clicking the Home button will take you to this page Composer Offline Location http w scionnet com 2080 Advanced Use Current Pace Browse m History History is a list of the pages you have previously visited Pages in history expire after E days Clear History m Location Bar History Clear the list of sites on the location bar Clear Location Bar ces ao Figure 7 27 Adding a Port Number to the Default Home Page URL in Netscape Communicator For Netscape Navigator this can be done by choosing the Preferences command under the Edit menu and modifying the Home page field under the Navigator tab as shown in Figure 7 27 You should use a number greater than 1024 as the new port number Numbers under 1024 are reserved Setting N
34. HCP server If your network does not have a DHCP server ask your network administrator for an address and then type it in the space below Adapter 1 3Com Megahertz 10 100 LAN CardBus PC Card Ethemet g Obtain an IP address from a DHCP server Specify an IP address IP Address 157 22 252 140 Subnet Mask 255 255 255 192 Default Gateway 157 22 252 129 Advanced Figure 7 15 Configuring TCP IP Troubleshooting Configurations 223 Microsoft TCP IP Properties Figure 7 16 Configuring DNS Settings The DHCP Relay service permits broadcast messages from BOOTP and DHCP servers to reach clients over routers This is useful on networks with routers that do not permit the transfer of such broadcasts Microsoft TCP IP Properties Figure 7 17 Configuring WINS 224 Chapter 7 Troubleshooting Internet Information Server The use of NetBIOS scopes permit the creation of logical TCP IP net works that are invisible to one another If your network is configured in this manner you will need to configure the Scope ID field to be able to communicate with other hosts in your scope It is possible for a Windows NT server to reside on more than one net work at the same time a situation referred to as multi homing Enabling the Enable IP Forwarding checkbox under the Routing tab will allow packets to move between these networks SOLVING TCP IP CONFIGURATION PROBLEMS
35. HED numedica localho ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica localhos ESTABLISHED numedica nbsession NUMEDICA ESTABLISHED numedica 1588 NUMEDICA ESTABLISHED WINNT gt Figure 7 37 Viewing Results from the NETSTAT Utility If you find this is a problem contact the administrator of the firewall to determine a solution Troubleshooting Name Resolution If you have used PING and other utilities to determine that TCP IP connec tivity is functioning but you are still unable to access a resource via a host name or computer name it is time to troubleshoot name resolution For example you might successfully ping a host using the IP address but fail when you attempt to use a host name as shown in Figure 7 38 MS DOS Prompt Figure 7 38 Unsuccessful Attempt to Ping Hostname 248 Chapter 7 Troubleshooting Internet Information Server C WINDOWS Figure 7 39 Successful Attempt to Ping by Hostname A proper resolution would match the host name with the IP address and successfully execute the PING command as shown in Figure 7 39 Resolution refers to the process by which Windows maps host names which make sense to humans with IP addresses which make sense to com puters Host name resolution for Windows based c
36. IPCONFIG or WINIPCFG utility to identify the TCP IP configuration of a host computer You can use the PING utility to test network connectivity With PING you should verify the local host with a loopback address a host on the same subnet the gate way router and a host on a remote subnet or the Internet You can use the Troubleshooting FTP Services 283 TRACERT utility to follow the path of packets through gateways between the local and remote hosts You can use the NETSTAT utility to see the TCP ses sions running on the host You can use the HOSTNAME and NBSTAT utili ties to troubleshoot name resolution problems Name resolution problems commonly involve severed network access incorrectly configured DNS or WINS servers or improperly written HOSTS and LMHOSTS files Troubleshooting Index Server Queries Common problems affecting Index Server operations are query errors and idq file errors Indexing and cataloging errors can be detected by monitoring the Windows NT application log Many of the parameters affecting these operations can be changed in the Registry Troubleshooting Installations You should remove previous versions of IIS and disable other Web FTP or Gopher services running on your server before installing IIS 4 0 In addition you must have Windows NT Server 4 0 Service Pack 3 or later and Inter net Explorer 4 01 or later installed In most cases installation and setup will be trouble free When it is not there ar
37. Results Technologies 8 Your search for setup troubleshooting found 66 matches 1 through 25 are listed below 1 IIS Troubleshooting With ODBC SQL Integration Excerpt from this page You can test Microsoft Internet Information Server IIS ODBC SQL Server connectivity with several Microsoft SQL Server utilities This article discusses the following Testing Network Named Pipes Testing ODBC Connectivity to SQL Server size 7 180 bytes updated 4 22 97 8 00 00 PM GMT How to Install MS Loopback with Unattended Installations Excerpt from this page The MS Loopback Adapter is a valuable tool for testing in a virtual network environment where access to a network is not feasible Also MS Loopback is essential if there are conflicts with a network card or a network adapter driver Network client size 6 465 bytes updated 12 14 98 8 00 00 PM GMT How to Remove and Reinstall the Windows NT 4 0 Option Pack Excerpt from this page For troubleshooting purposes or because of corruption you may find it necessary to remove and reinstall the Windows NT 4 0 Option Pack which includes Internet Information Server IIS 4 0 as well Microsoft Transaction Server MTS 2 0 Microsof size 9 866 bytes updated 11 17 98 8 00 00 PM GMT Top Articles for Windows NT 4 0 Excerpt from this page INSTRUCTIONS Microsoft FastTips is available 24 hours a day 7 days a week from a touch tone telephone To order items from this catalog first select the it
38. S Aa Label Modified Date Size Inlinks Level MIME Type iMGvaLT images ans2 gif 9 22 97 6 09 56 A 3 image gif images asip gif 12 2 97 5 00 36 P 3 image gif images asiptm gif 1 10 98 4 26 10 P 3 image gif images bum gif 9 22 97 6 27 24 A 3 image gif images cemc aif 3 3 95 9 35 16 PM 3 image gif dimages comnet gif 9 22 97 6 26 52 A 3 image gif images dan gif 9 22 97 6 27 44 A 3 image gif images db1 gif 9 22 97 6 27 52 A 3 image gif fimages delt08sl gif 11 8 96 10 01 46 3 image gif dimages deltO8sr gif 11 8 96 10 01 46 3 image gif images dhtml gif 3 3 95 9 31 04 PM 3 image gif images getacro gif 9 22 97 6 32 08 A 3 image gif dimages ie2 gif 9 22 97 6 25 16 A 3 image gif fimages kodak gif 9 22 97 6 32 24 A 3 image gif Hing avec tree mik 9199107 C 9F 40 A 2 inn nern tent Number of Objects 19 Ready Figure 7 57 Finding Images without ALT Tags Using the Quick Search Command IMAGES WITHOUT ALT Use the Images Without ALT command in the Quick Search fly out menu under the Tools menu to search for all images that are not associated with an ALT tag as shown in Figure 7 57 LOAD SIZE OVER 32K Use the Load Size Over 32K command in the Quick Search fly out menu under the Tools menu to search for objects that are larger than is optimal for fast downloading as shown in Figure 7 58 f Microsoft Site Server Express Content Analyzer sn Load Size Over
39. System Startup Startup windows NT Server Version 4 00 x Show list for J20 seconds gt Recovery When a STOP error occurs do the following IV Write an event to the system log I Send an administrative alert IV Write debugging information to eSystemR oot MEMORY DMP I Overwrite any existing file IV Automatically reboot 33 Control Panel GE 4 43PM Figure 7 8 Startup Shutdown Tab in the System Control Panel Troubleshooting Configurations 217 SERVICE PACKS Along with Windows NT Option Pack 4 0 you need to install the latest Win dows NT Service Pack This is a free Microsoft update that contains bug fixes and improvements made to Windows NT Server since it shipped originally It can be downloaded from the Microsoft Web site as shown in Figure 7 9 or ordered on CD ROM Visit the main Microsoft Web site to find the new est location for Service Packs The minimum requirement for the Windows NT Option Pack 4 0 is Service Pack 3 If you install Service Pack 4 the software will detect that at least one of the operating system components contain a known year 2000 Y2K issue For example you might be admonished to update your system to Internet Explorer 4 01 Service Pack 1 Data Access Components 2 0 Ser vice Pack 1 or Site Server Express 3 0 Such components can be upgraded individually from the Service Pack 4 compact disc or downloaded from the URL http support microsoft com support downlo
40. TFS Permissions In addition to the security controls that restrict access to the Web and FTP sites as a whole you should also be aware of NTFS permissions that can be set at the directory and file level If these permissions are not configured cor rectly access might be restricted to users who need it or granted to users who should not have it Troubleshooting Security 237 Permissions that can be assigned to directories are as follows No Access This choice permits users to see a shared directory but not its file list List This choice permits users to see a directory s file list but not access its contents Read This choice permits users to view subdirectory and file names open subdirectories and files and run applications They cannot make changes however e Add This choice permits users to see a shared directory and copy data into it but they cannot view the contents of the directory This type of directory is often referred to as a drop box Add amp Read This choice permits users to view subdirectory and file names read files and save new files They cannot make changes to existing files however e Change This choice permits users to view subdirectory and file names open subdirectories and files create subdirectories and files delete subdirectories and files modify file data and run applications They cannot alter permissions however Full Control This choice permits users to view s
41. The value 20 is Normal Priority Class 40 is Idle Priority Class 80 is High Priority Class and 100 is Realtime Priority Class Measured in Idle Priority Class Range is 20 40 80 and 100 No default value ThreadPriorityFilter ThreadPriorityMerge Priority of the filtering thread within the CiDaemon process Mea sured as above normal Default is lowest to above normal Priority of the merge thread Measured as normal Default is low est to above normal Troubleshooting Installations 269 Study Break Study Break Monitoring Event Viewer Practice what you have learned by viewing the application event log To do this launch the Event Viewer application from the Administrative Tools program group Next select Application from the File menu Double click on items relating to the Index Server to view the error messages Troubleshooting Installations In this section you will learn some of the ways you can go about trouble shooting setup and installation problems As previously described you should remove previous versions of IIS and disable other Web FTP or Gopher services running on your server before installing IIS 4 0 In addition you must have Windows NT Server 4 0 Service Pack 3 or later and Internet Explorer 4 01 or later installed In most cases installation and setup will be trouble free When it is not there are several sources to which you may turn for help Online Help To
42. ads Z Downloads Windows NT 4 0 Service Pack 3 Microsoft Internet Explorer File Edit View Go Favorites Help fi winvows ramy pRopucts searcn support shop writeus Windows NT Server ome Windows NT 4 0 Service Pack 3 Microsoft Windows NT Service Pack Solutions amp Demos 3 contains a number of new B Pownioad Now components which add functionality Version 4 0 sp3 Comparisons to Windows NT Server s built in Web Updated 13 May 97 server Microsoft Internet Information Are ME l 5 0 hs 14 4k Downloads Server including 2 5 his 28 8k Product Basics Deployment Tools a Microsoft Active Server Pages 1 0 beta Microsoft Index Server 1 1 4s SECTION Microsoft Windows NT Server Re 14 CONTENTS NetShow 1 0 Windows Products Microsoft FrontPage 97 Web site creation and management tool Server Extensions a Crystal Reports Community amp News Partner Resources It also includes a number of new security components and lea et i Internet zone Figure 7 9 Downloading Windows NT Service Pack 218 Chapter 7 Troubleshooting Internet Information Server Issues relating to the installation of the Windows NT Option Pack 4 0 and its components will be discussed in the following sections Network Configurations Another opportunity for IIS problems resides with the network configura tion You must configure your server with a static IP address rather than
43. ally or received from the DHCP server Because this test does not send packets out on the network it will not tell you if the local host has proper network connectivity PINGING A REMOTE HOST ON THE SAME SUBNET You can verify that network communications are possible between your computer and another host on your local subnet by using the PING com mand with the IP address of that other computer If all is well you should see packets going out on and coming back over the network see Figure 7 34 If the test is unsuccessful check to make sure you have the proper IP addresses subnet masks and gateway addresses configured on both hosts This test will only tell you if connectivity is possible on the local subnet It will not tell you if communications are possible with hosts on another sub net or the Internet PINGING THE DEFAULT GATEWAY You can verify that network communications are possible between your computer and the gateway by using the PING command with the IP address of the router If all is well you should see packets going out on and coming back over the network just as when you pinged the remote host If there is a problem the packets will not be returned in the required time and you will see the messages shown in Figure 7 35 MS DOS Prompt Figure 7 34 Successfully Pinging Another Local Host Troubleshooting Resource Access 245 MS DOS Promp _ o x Figure 7 35 Unsuccessfully Pinging the Gateway
44. ated with DOM entry it is necessary to also adda PRE to the line The lt domain gt is always preloaded although it will not be shown when the name cache is viewed INCLUDE lt file name gt BEGIN_ALTERNATE END_ALTERNATE Forces the RFC NetBIOS NBT software to seek the specified file and parse it as if it were local lt filename gt is generally a UNC based name allowing a cen tralized LMHOSTS file to be maintained on a server It is always necessary to provide a mapping for the IP address of the server prior to the INCLUDE This mapping must use the PRE directive These keywords allow multiple INCLUDE statements to be grouped together Any single successful INCLUDE will cause the group to succeed Oxnn Denotes non printing character support These can be embedded in map pings by first surrounding the NetBIOS name in quotations then using the Oxnn notation to specify a hex value for a non printing character Compiled from Microsoft s sample LMHOSTS file RESOLVING TCP IP HOST NAMES Host names are assigned to Windows NT Server computers that run TCP IP services such as the IIS and to other non Windows computers such as Troubleshooting Resource Access 253 The use of the LMHOSTS file is optional It is meant to provide a static way of saving name resolution information to supplement the more dynamic WINS and network broadcast methods UNIX machines When a Windows computer searches for a resour
45. cannot log on to the IIS try the following Make sure they are using the right user name Make sure they are using the right password e Make sure the Caps Lock is off Passwords are case sensitive Try logging on from the workstation using another account If suc cessful recheck the user s settings in the User Manager for Domains application It might be that the user s group memberships have changed or that a change in group rights is restricting the user You might also check System Policy Editor to see if restrictions are being applied to the user If unsuccessful try logging in from another work station If that fails you might need to repair the user accounts data base on the Windows NT Server Troubleshooting Port Numbers Web browsers and FTP clients are designed to look for these services at cer tain port numbers by default 80 and 21 respectively For added security you can effectively hide these services by simply changing the port number This can be done in the TCP Port field of the Web and FTP properties dialog boxes as shown in Figure 7 25 If you do this however be prepared to face some support issues as users are unable to find the sites without explicitly adding the new port num bers In the case of Web browsers you might want to include this informa tion for the default home page For Internet Explorer this can be done by Troubleshooting Security 235 900 100000 IUSR_SN_PDC
46. ce it resolves the host name with an IP address by performing the following steps 1 The client computer looks in its local name cache to see if the address mapping information is there 2 If the address mapping information is not in the local name cache it will look for it in the HOSTS file 3 If the client computer cannot find address mapping information in the HOSTS file and the client has been configured to use DNS it will query the DNS server 4 If the DNS server is not able to provide the address mapping informa tion and the client computer is configured to use WINS it will query the WINS server 5 If the WINS server is not able to provide the address mapping informa tion the client computer sends a broadcast query onto the local subnet broadcast packets typically do not travel across routers 6 If the client computer receives no response to its query it will look for the address mapping information in the LMHOSTS file The last three steps refer to sources that contain NetBIOS name resolu tion data They are also checked however because it is possible that they might contain host name resolution data You can verify host name resolution by establishing a socket connec tion with another host For example you could try to establish a Telnet FTP or Web connection see Figure 7 44 Verify that the correct DNS server information has been configured on the client computer This information can be viewed in the T
47. certificate is verified the Web browser requests an encryption specification called the session key from the server This is encrypted using the Web browser s private key 5 The Web server attempts to verify the Web browser s certificate with a public key if requested 240 Chapter 7 Troubleshooting Internet Information Server 6 The Web server receives the session key which it decrypts using the Web browser s public key It then modifies its encryption specification to match that requested by the Web browser 7 The Web server and Web browser begin normal communication over the encrypted connection By design if any of these steps is executed incorrectly SSL communica tions will fail It is mandatory for both the client and server to be able to sup ply the correct encryption certificates and other information The digital signature process just described uses the default key pair installed in the browser to set up the SSL connection The key exchange procedure is slightly different when client certificates are not required When using client certifi cates the session key is sent by encrypting with the recipient s public key so the information can only be deycrypted by the recipient a subtle difference VC Sem Troubleshooting Resource Access In this section you will learn to troubleshoot resource access problems that can be caused by incorrect IP configurations DHCP settings and host name resolutions Troublesh
48. d by a lack of disk space or hardware failure The complete scope of the catalog will be scanned and all documents will be refiltered at a suitable time The content index was corrupted Delete the catalog and start over Remove and reinstall Index Server if the error recurs The catalog lost a change notification This can be caused by a lack of disk space or hardware failure The complete scope of the catalog will be scanned and all documents will be refiltered at a suitable time Error lt number gt detected in content index on lt catalog gt An unknown possibly catastrophic error occurred Report the error number to Microsoft Technical Support To recover delete all files under lt catalog gt and start over Table 7 6 continued Error Messages File change notifications are turned off for scope lt scope gt because of error lt number gt This scope will be periodi cally rescanned 263 Troubleshooting Index Server Queries Description Automatic change notifications for the specified directory scope could not be re established The Index Server will perform incre mental scans to identify the document that changed the scope File change notifications for scope lt scope gt are not enabled because of error lt number gt This scope will be periodically rescanned The filter service could not run since file lt file gt could not be found on your system Automatic change notificat
49. de Parameter Description 151 DNS Hostname Lookup Failure The DNS server cannot resolve an IP address that is associated with the URL requested 152 Unable To Connect DNS could resolve the address but the Web browser could not connect to the Web server 153 Incomplete HTTP Header Response The Web page that is queried usually returns the full HTTP header in the first packet sent back This code often shows up with a specific Web server N E T 1 0 OK The Web page is accessible 401 Password Protected The Web browser does not have permission to search through protected areas of the Web site 403 Forbidden The request for object access was denied This can happen when a Web server is busy 404 File Not Found The Web server is available but the Web page is not accessible 500 Internal Server Error The Web server is probably down Study Break Study Break Search for Errors Practice what you have learned by searching for error messages such as those listed in Table 7 8 that are generated by your Web site One way to do this is to use a Web browser to check every link While this is time consuming it also gives you a chance to check the presentation effect of each Web page An easier method is to use Content Analyzer to query the Web server as previously described If any of these error mes sages are encountered troubleshoot the cause Troubleshooting FTP Services In this section you will learn to troubleshoot problems wi
50. ded Addresses Start Address 157 22 252 10 N a Address 157 22 252 152 End Address 157 22 252 254 Subnet Mask 255 255 255 0 Exclusion Range Start Address lz fidd gt End Address a y lt Remove z m Lease Duration C Unlimited Limited To 3 E Day s oo Hours foo 5 Minutes Name Comment ce w Figure 7 19 Create Scope Dialog Box The first and last IP addresses in the range are entered here along with the subnet mask If there are any addresses that fall within the range which you do not want treated dynamically you may add them to the Excluded Addresses list Finally you may set the lease duration here When setting up the DHCP Server you will need to make sure that the scope of addresses you have given it to administer are not already in use Any individual addresses already assigned to hosts should be removed from the scope using the DHCP Server s exclusion list Be especially careful not to have overlapping scopes administered from multiple DHCP servers In order to ensure that IP addresses are not assigned to hosts that no longer need them each client is subject to a lease This is the duration of time that each host is permitted to use an IP address before the DHCP Server reclaims it Clients are permitted to renew their leases when 50 percent of the duration has elapsed and when 87 5 percent of the duration has elapsed or after a restart In
51. e disk space is freed up Added virtual root lt root gt to index Removed virtual root lt root gt from index The message Mapped to lt path gt is added when a virtual root is indexed This message is added when a virtual root is deleted from the index Added scope lt path gt to index Removed scope lt path gt from index This message is added when a new physical scope is indexed This message is added when a new physical scope is deleted from the index Compiled from the IIS 4 0 help file ixerrlog htm Troubleshooting Index Server Queries 265 Modifying Index Server Registry Keys Many of the errors listed in the previous tables can be addressed by modify ing the Registry For example when you see the message The query failed because the Web server is busy processing other requests you can allow more queries to be added to the queue by increasing the value of the IsapiRe questQueueSize Registry key Table 7 7 lists Registry keys that pertain to Index Server operations Table 7 7 Index Server Parameters in the Registry Parameter Description DaemonResponseTimeout Timeout value to determine if the CiDaemon process is looping because of a corrupted file Measured in minutes Range is 1 to 120 Default is 5 EventLogFlags Controls the generation of event log messages Measured as a Bit Field Range is 0 to 7 Default is 0x00000002 FilterContents If set to 0 contents of files will no
52. e several sources that you can look to for help such as online help Microsoft s Web sites and the TechNet program Repairing Broken Links After creating a WebMap using the Site Server Express Content Analyzer application you can track down broken links and other problems with the Quick Search or Custom Search command You can launch a helper applica tion such as an HTML editor to correct these problems Troubleshooting WWW Services Web browsers expect to find Web services running at port 80 If Web brows ers are having trouble connecting make sure that you have either left the default configuration of port 80 or that you have told your users what the new port number is The Web server is configured to launch at server bootup It can be stopped or paused from the Internet Service Manager application however or disabled in the Services Control Panel application This is another thing to check when users are unable to connect Another 284 Chapter 7 Troubleshooting Internet Information Server issue can arise if users are not granted at least Read permissions to the Web site directory Troubleshooting FTP Services FTP clients expect to find FTP services running at port 21 If users are having trouble connecting make sure that you have either left the default configura tion of port 21 or that you have told your users what the new port number is The FTP server is configured to launch at server bootup It can be stopped or pa
53. ease on a Windows based computer as shown in Figure 7 30 IP Configuration ME x Ethernet Adapter Information lintel EtherExpress 16 Miniport Ji Adapter Address 00 44 00 40 47 39 IP Address 157 22 252 125 Subnet Mask 255 255 255 0 Default Gateway 157 22 252 1 Release All Renew All More Info Figure 7 30 Viewing Client Configuration with WINIPCFG 242 Chapter 7 Troubleshooting Internet Information Server Troubleshooting With PING The PING utility verifies a connection by sending Internet Control Message Protocol ICMP packets to a remote host and listening for echo reply pack ets PING waits for up to one second for each packet sent and displays the number of packets transmitted and received It sends four packets by default but you can change the default see Figure 7 31 To test a connection you can use the PING command with an IP address a host name or a computer name It is best to use the IP address ini tially to isolate the problem as related to connectivity versus host name reso lution Useful PING troubleshooting procedures include the following PINGING THE LOOPBACK ADDRESS To find out if the DOS or Windows client s TCP IP protocol stack is working properly test the configuration of the computer by typing PING localhost Localhost is a reserved host name that maps to a reserved IP address 127 0 0 1 which represents your computer If pinging your local host is successfu
54. ectory level but NTFS provides security at the directory and file level as previously described Troubleshooting Configurations 211 E Hardware Compatibility Microsoft Internet Explorer File Edt View Go Favorites Help HARDWARE SECTION CONTENTS With Microsoft Windows NT Server operating system upgrading Hardware your network doesn t mean doubling Compatibility your hardware budget Windows NT Web Se Server works with what you have MORE You benefit from its speed RESOURCES performance and efficiency right Comparisons away without having to invest in additional hardware Devices tested Downloads for compatibility with Windows NT Server include hundreds of computer s systems drive systems SCSI and H e non SCSI peripherals Compatibility List Community amp News communications devices cards video adapters printers and Partner Resources accessories With Windows NT Server you re assured of the widest Windows Products choice of options The computers andi Pe ny en OE SENET or Br TT Deployment Tools E Internet zone Figure 7 1 The Hardware Compatibility List Online Software Configurations The IIS will not function properly if the underlying Windows NT Server operating system is not configured properly It is therefore important to be sure that both Windows NT Server and the most current Service Packs have been properly installed and configured before you begin to troub
55. ems you want to receive noting the five to six digit number of the Item ID shown below f size 25 294 bytes updated 1 23 39 8 00 00 PM GMT Troubleshooting Cmdlines txt During an Unattended Setup Excerpt from this page This article covers issues dealing with Cmdlines txt and running programs within it In general any program that can be run at an MS DOS command prompt while running Windows NT 4 0 can be run in the Cmdlines txt The Cmdlines txt is run at the end size 11 536 bytes updated 2 17 99 8 00 00 PM GMT How to Add an OEM SCSI Controller During SBS Installation Excerpt from this page Because Microsoft BackOffice Small Business Server SBS performs an installation using the unattended method if you try to install it on a computer that contains an unsupported disk controller you will receive the following error message after t size a ZA intenet zone Figure 7 49 Viewing the Microsoft Troubleshooting Database Web Site Troubleshooting Installations 271 e The Microsoft Support site is located on the WWW at http www microsoft com support The Microsoft Personal Support site is located on the WWW at http support microsoft com support The Microsoft TechNet site is located on the WWW at http sup port microsoft com servicedesks TechNet The Microsoft Windows NT Server support site is located on the WWW at http www microsoft com ntserver The Microsoft IIS support site is
56. er the Quick Search or Custom Search command to locate broken links Use the Launch Helper App command to open an HTML editor application in which to correct the links Troubleshooting WWW Services In this section you will learn to troubleshoot problems with the IIS WWW Service As previously described Web browsers expect to find Web services run ning at port 80 If Web browsers are having trouble connecting make sure that you have either left the default configuration of port 80 or that you have told your users what the new port number is You can use port numbers above 1024 but if you do so users will need to add the new port to the URL in the following format http lt host_name gt lt port gt By default the Web server is configured to launch at server bootup It can be stopped or paused from the Internet Service Manager application however or disabled in the Services Control Panel application Another thing to check when users cannot connect then is that someone has not turned the server off Yet another issue can arise if users are not granted at least Read permis sions to the Web site directory Also if you are extending anonymous access check to make sure that the IUSR account has not been disabled Finally a number of other WWW Service problems are reported by HTTP error codes as listed in Table 7 8 280 Chapter 7 Troubleshooting Internet Information Server Table 7 8 Common HTTP Error Codes Co
57. f the fact that they are members of multiple groups This does not create conflicts as all permissions are cumulative The exception is the No Access permission which will override all the other per missions Using SSL and Server Certificates With the Secure Socket Layer SSL protocol secure encrypted connections can be created between the server and client using the public key encryption system This type of security should be used whenever private data such as credit card information is passed over the Internet SSL has two protocol layers The first layer the SSL Handshake Protocol is used at the beginning of the client server communications process to establish the encryption algorithm The second layer the SSL Record Proto col is used to handle the encapsulation of data communicated over TCP and other higher level protocols This capability allows SSL to operate indepen dent of applications services and data types In a typical Web server to Web browser connection SSL works as follows 1 The Web browser requests a URL to a secured resource on the server initiating the communications process 2 The server sends a certificate to the Web browser This contains the Web site s unique digital identification It might also request a certificate from the Web browser 3 The Web browser sends a certificate to the server if requested 4 The Web browser attempts to verify the server s certificate with a public key If the
58. formance requirements are met To run on an Intel based computer Windows NT Server and IIS 4 0 requires At least a 486DX processor running at 90 MHz At least 50 Mbytes of hard disk space with 120 Mbytes preferred At least 32 Mbytes of RAM with 48 Mbytes preferred At least an SVGA monitor To run on a RISC based computer Windows NT Server and IIS 4 0 requires A processor running at 150 MHz or faster At least 120 Mbytes of hard disk space with 200 Mbytes preferred At least 48 Mbytes of RAM with 64 Mbytes preferred At least an SVGA monitor Depending on the role a newly installed Windows NT Server is to play it is better to deploy a computer originally designed as a server rather than one designed to be a desktop computer Server computers often have hard ware that is specially configured for higher hard disk and network through put and which permits the addition of a larger number of peripherals and upgrades Also note that whatever equipment is purchased or redeployed should be listed on the current Windows NT Server Hardware Compatibility List A hard copy of this document comes with the Windows NT Server installation CD ROM You might also be able to find a more up to date version on Microsoft s Web site as shown in Figure 7 1 If the hard drive onto which you plan to install IIS uses the FAT format you might consider converting it to the NTFS format FAT provides security at the dir
59. h of a NetBIOS name is 15 characters If a name longer than 15 characters is specified the client computer will look to a DNS server before a WINS server or HOSTS file for address mapping information You can use the HOSTNAME utility to view the computer name of the local host This is the name as configured under the Identification tab of the Network Control Panel application You can use the NBSTAT utility to view statistics relating to NetBIOS over TCP IP parameters as shown in Figure 7 40 You can verify NetBIOS name resolution by establishing a session with another host For example you can map a drive or execute a Net Use com mand see Figure 7 41 If you are unable to establish a session check to see that the same Net BIOS scope IDs are being used by both hosts The use of NetBIOS scopes per mits the creation of logical TCP IP networks that are invisible to one another If your network is configured in this manner you will need to con figure the Scope ID field under the WINS Configuration tab in the TCP IP MS DOS Prompt NBT NetBIOS o Figure 7 40 Viewing Options for the NBTSTAT Utility 250 Chapter 7 Troubleshooting Internet Information Server MS DOS Prompt x INDOWS gt net use atus C WINDOWS gt _ Figure 7 41 Successfully Executing a NET USE Command Properties dialog box of the Network Control Panel application to be able to communicate with other hosts in your scope as shown in Figure
60. hardware is added removed and configured Windows NT Servers can have multiple network adapters for different media types or for joining different network segments when acting as a router Network 2 x Identification Services Protocols Adapters Bindings Network Services fi Computer Browser E NetBIOS Interface E RPC Configuration E Server amp workstation Add Remove Properties Update Description Distributed protocol required for running the Computer Browser service Figure 7 11 The Services Tab 220 Chapter 7 Troubleshooting Internet Information Server Network 21 x Identification Services Protocols Adapters Bindings Network Adapters 1 3Com Megahertz 10 100 LAN CardBus PC Card Ethe Add Remove Properties Update es Reel e a Item Notes 3Com Megahertz 10 100 LAN CardBus PC Card Ethernet Figure 7 12 The Adapters Tab Pressing the Properties button provides access to a network adapter s three main settings IRQ The IRQ or Interrupt Request refers to when the CPU will pro cess the data in the network adapter s buffer IRQ s can also be set through hardware switches on the network adapter or via a manufac turer s configuration software I O address The I O or Input Output address pertains to the net work adapter s unique logical location within the system It is to this address that device instructions are sent
61. have reconfig ured for this purpose is disabled or deleted then only registered users of the i User Manager SN ojx User View Policies Options Help Full Name Username Description Administrator Built in account for administering the computer c amp Cass Kovel Cassandra Kovel Chicago Office Dan Gollberg Daniel J Goldberg San Francisco Office Dorian Cougias Dorian J Cougias Chicago Office Builtin account for quest access to the compute U SN PDC Internet Guest Account Internet Server Anonymous Access IWAM_SN_PDC Web Application Manager ntemet Server Web Application Manager identi Juliana Carnes Juliana C Carnes San Francisco Office Lynn Heiberger Elizabeth Heiberger Chicago Office Mike Hytopoulos Michael Hytopoulos Seattle Office Phil Zarboulas Philip Zarboulas Paris Office Tom Dell Thomas R Dell San Francisco Office Groups Description ai Account Operators Members can administer domain user and group accounts a R Administrators Members can fully administer the computer domain Backup Operators Members can bypass file security to back up files ese Cert Requesters Members can request certificates a Cert Server Admins Certificate Authority Administrators dit Domain Admins Desiqnated administrators of the domain zi Figure 7 21 Accounts Permitting Anonymous Access in User Manager for Domains 232 Chapter 7 Troubleshooting Internet Information
62. he IP address should be placed in the first column followed by the cor responding host name The IP address and the host name should be sepa rated by at least one space Additionally comments may be inserted on individual lines or following the machine name and are denoted by a num ber symbol The use of the HOSTS file is optional It is meant to provide a static way of saving host name resolution information to supplement the more dynamic DNS Study Break Study Break Using PING Practice what you have learned by using the PING utility to test TCP IP connectivity First use PING with the localhost command to verify the configuration of the local host Next use PING with the IP address of a remote host on the same subnet to test local network connectivity Next use PING with the IP addresses of the ports on the router to test gateway connectivity Finally Use PING with the IP address of a host on the Internet to test remote network connectivity Troubleshooting Index Server Queries In this section you will learn to troubleshoot the Index Server in general and problems that might occur during the query process in particular 256 Chapter 7 Troubleshooting Internet Information Server Troubleshooting Index Server Problems In most cases the Index Server performs troubleshooting functions auto matically without requiring administrator intervention There is a recovery function that executes should the cache beco
63. here the network is divided into two subnets with the subnet mask 255 255 255 128 for example all host addresses are then distributed between two subnets 1 126 and 129 254 The gateway addresses might be x x x 1 and x x x 129 or x x x 126 and x x x 254 respec tively DHCP ADDRESS PROBLEMS By using the Dynamic Host Configuration Pro tocol DHCP administrators can avoid the effort of configuring static IP addresses on clients by letting workstations obtain their addresses dynami cally The DHCP server manages a range of available addresses that it doles out automatically when a workstation attempts to use a TCP IP service These addresses are leased for a limited time Windows NT includes the DHCP Server service which is installed as a network service via the Network Control Panel application Once installed it can be configured using the DHCP Manager application found in the Administrative Tools program group see Figure 7 18 The part of your network s IP address range that you wish to share dynamically is called its scope To assign dynamic addresses choose the Cre ate command under the Scope menu to open the Create Scope dialog box as shown in Figure 7 19 amp DHCP Manager Local ioj x Server Scope DHCP Options View Help DHCP Servers Option Configuration gt fig Local Machine Figure 7 18 DHCP Manager Troubleshooting Configurations 227 Create Scope Local x m IP Address Pool Exclu
64. ier Source component Event type Event category Description Data dump in hexadecimal format From this data you will either be able to determine what the problem is e g you have too little disk space or what to ask Microsoft technical sup port e g what does Event ID 8 mean UsING WINDOWS NT DiaGnostics e Windows NT Diagnostics provides detailed system configuration reports as shown in Figure 7 7 This can help you determine if problems are a result of IIS operations or if they originate in the operating system Troubleshooting Configurations 215 LM Windows NT Diagnostics SN_PDC D pagefile sys 40 960 15 320 19 324 Figure 7 7 Windows NT Diagnostics Dialog Box Here displayed is information from the HKEY_LOCAL_MACHINE Registry tree The dialog box contains tabs for the following e Version Lists the current version build number Service Pack update and registered owner System Contains CPU and hardware information Display Contains video adapter information e Drives Lists all drives and drive types as well as attached network drives Memory Contains current physical RAM and Virtual Memory infor mation e Services Lists services and their status Resources Lists devices information detailed by port number inter rupt DMA channel and UMB location Environment Contains environment variables for command prompt sessions such as WINNT directory location and te
65. ifying Not Found Objects with the Quick Search Command 278 Chapter 7 Troubleshooting Internet Information Server f Microsoft Site Server Express Content Analyzer sn Unavailable Objects Search R ES File View Mapping Tools Window Help la x oele a yels SA Ala 2 Sele lal Les WINE Type ModiiedDate Sze tolrks Leve He presentation application mac 1 O http 157 Number of Objects 1 Ready Figure 7 61 Identifying Unavailable Objects with the Quick Search Command UNAVAILABLE OBJECTS Use the Unavailable Objects command in the Quick Search fly out menu under the Tools menu to search for objects that cannot be accessed as shown in Figure 7 61 UNVERIFIED OBJECTS Use the Unverified Objects command in the Quick Search fly out menu under the Tools menu to search for objects that have not been checked as shown in Figure 7 62 f Microsoft Site Server Express Content Analyzer sn Unverified Objects Search Re Mi E3 File View Mapping Tools Window Help Osa a yas SA Ala e EEE a ial ita WMEType ModiedDate Sse ike Level Pes 3 i Number of Objects 27 Ready Figure 7 62 Identifying Unverified Objects with the Quick Search Command Troubleshooting WWW Services 279 Study Break Study Break Check for Broken Links Practice what you have learned by searching for broken links First create a WebMap of your site Next use eith
66. iled from the IIS 4 0 help file ixerridq htm Using the Application Log In many cases the only way to determine what problems are occurring within the Index Server is to monitor the Windows NT application event log shown in Figure 7 47 Index Server errors as listed in Table 7 6 appear in the Ci Filter Service category These include problems with index corruption insufficient resources and indexing i Event Viewer Application Log on WNUMEDICA olx Log View Options Help PM h ng al y 2 24 99 5 16 03 PM MSExchangeES General 19 N A NUMEDICA 2 24 99 5 16 03 PM MSExchangeES General 0 N A NUMEDICA 2 24 99 3 07 01 PM LicenseService None 202 N A NUMEDICA 2 24 99 8 52 01 AM LicenseService None 202 N A NUMEDICA 2 24 99 5 15 00 AM ESE9 Online Defragmer 180 N A NUMEDICA 2 24 99 5 15 00 AM ESE9 Online Defragmer 179 N A NUMEDICA 2 24 99 5 00 28 AM ESE9 Online Defragmer 180 N A NUMEDICA 2 24 99 5 00 28 AM ESE9 Online Defragmer 179 N A NUMEDICA 2 24 99 4 15 00 AM ESE9 Online Defragmer 180 N A NUMEDICA 2 24 99 4 15 00 AM ESE9 Online Defragmer 179 N A NUMEDICA 2 24 99 3 15 01 AM ESE9 Online Defragmer 180 N A NUMEDICA 2 24 99 3 15 00 AM ESE9 Online Defragmer 179 N A UMEDICA 2 24 99 3 02 39 AM MSExchangeSA General 5004 N A UMEDICA 2 24 99 3 02 35 AM MSExchangeSA General 5003 N A NUMEDICA 2 24 99 3 00 28 AM ESE9 Online Defragmer 180 N A UMEDICA 2 24 99 3 00 28 AM ESE9 Online Defragmer 179 N A UMEDICA 2 24
67. in the timeslice Measured in milli seconds of CPU time Range is 1 to 1000 Default is 50 Maximum number of in memory buffers for keeping track of pending documents The higher the number the less frequently it has to be written to disk Measured in number of chunks Range is 10 to 30 Default is 20 If query normalization creates a query restriction greater than the number of nodes set in this Registry entry the query fails with the status of QUERY_E_TOO COMPLEX This status message means the limit imposed in this Registry key has been reached This key keeps a user from overloading the server s capacity with an overly large query Measured in number of nodes Range is 1 to 4 billion Default is 250 Table 7 7 continued 268 Chapter 7 Troubleshooting Internet Information Server Parameter MaxShadowFreeForceMerge Description On the catalog drive if the free space falls below MinDiskFree ForceMerge and the disk space occupied by the shadow indexes exceeds MaxShadowFreeForceMerge a master merge is started This is measured in percentage of disk space Range is 5 to 25 Default is 15 MaxShadowIndexSize MaxWordLists If the disk space occupied by the shadow indexes exceed this per centage of the catalog drive a master merge is stated Measured in percentage of disk space Range is 5 to infinity Default is 20 Maximum number of word lists that can exist at one time Mea sured in WordLists Range is 10 t
68. ing the NetBIOS name in quotations then using the 6xnn notation to specify a hex value for a non printing character The following example illustrates all of these extensions 54 94 97 rhino PRE D0M networking net group s DC 54 94 182 appname 6x14 special app server 54 94 123 popular PRE source server 54 94 117 localsru PRE needed for the include Str rrrrrrrrriise H Figure 7 43 Viewing the LMHOSTS File 252 Chapter 7 Troubleshooting Internet Information Server Problems can occur with the LMHOSTS file if it is moved This file must be located in the following directory path on Windows NT computers WINNT System32 drivers The LMHOSTS file is located in the WINDOWS directory on Win dows 98 computers Make sure that the correct names and IP addresses are listed in the LMHOSTS file If there are multiple entries for the same computer only the first entry will be used Also ensure that the correct format is used for LMHOSTS entries and extensions as shown in Table 7 3 Table 7 3 LMHOSTS Extensions Syntax Description Generally used to denote the start of a comment PRE Causes the entry to be preloaded into the name cache By default entries are DOM lt domain gt parsed only after dynamic name resolution fails Associates the entry with the domain specified by lt domain gt This affects how the browser and logon services behave in TCP IP environments To pre load the host name associ
69. ion exceeded available memory Property of a nontextual type such as DBTYPE_I4 or received property of type string DBTYPE_GUID was selected for regu lar expression mode Query is missing a question mark Property type is not yet implemented Weight must be between 0 and 1000 Query term weight is outside of the legal range Compiled from the IIS 4 0 help file ixerrysn htm Troubleshooting IDQ Errors As previously described the idq file is used to define query parameters such as the scope of the search and restrictions on its format The idq file contains a QUERY section and optionally a NAMES section The latter which is rarely used can contain non standard column names as referred to in the query The former contains query parameters variables and conditional expressions Syntax errors within the idq file such as those listed in the fol lowing Table 7 5 are returned by the CiErrorMessage variable and can be read in htx pages Table 7 5 DQ File CiErrorMessage Errors Error Message The catalog directory cannot be found in the location specified by CiCatalog in the file lt file_name gt DBTYPE_BYREF must be used with DBTYPE_STR DBTYPE_WSTR DBTYPE_GUID or DBTYPE_UI1 types Description CiCatalog parameter did not contain a valid index catalog name DBTYPE_BYREF type was not used with an indirect type in the Names section Table 7 5 continued Error Message
70. ions for the specified directory scope could not be re established This can happen with virtual roots that point to remote shares on file servers that do not support auto matic change notifications The Index Server will perform incre mental scans to identify the documents that changed in the scope An executable or DLL required for filtering such as CiDaemon exe was not at the specified path A full content scan has started on lt catalog gt lt number gt inconsistencies were detected in PropertyStore during recovery of catalog lt catalog gt A complete rescan of the catalog was initiated Corruption was detected in the property cache perhaps due to hardware failure or an unexpected shutdown Recovery is auto matic Master merge cannot be restarted on lt catalog gt due to error lt number gt Master merge cannot be started on lt catalog gt due to error lt number gt A master merge could not be restarted because of the error noted A master merge could not be started because of the error noted Master merge has been paused on lt catalog gt It will be rescheduled later Master merge has completed on lt catalog gt A master merge was temporarily halted probably due to insuffi cient system resources A master merge was completed Master merge has restarted on lt catalog gt Master merge has started on lt catalog gt A paused master merge was restarted A master merge was
71. istered filter A path is longer than the maximum number of 260 characters Please check your system time It might be set to an invalid value lt Process Name gt failed to logon lt UserId gt because of error lt number gt The system time is invalid For example it is set to a date before January 1 1980 When the system time is invalid the date may appear as 2096 The Index Server SearchEngine or CiDaemon failed to log on the specified user The remote shares for which the Userld is used will not be filtered correctly This can happen if either the password is wrong or the validity of the password could not be verified due to network errors PropertyStore inconsistency detected in catalog lt catalog gt Recovery is starting on PropertyStore in catalog lt catalog gt Corruption was detected in the property cache perhaps because of hardware failure or abrupt shutdown Recovery is automatic Corruption was detected in the property cache Recovery is start ing Recovery was performed successfully on PropertyStore in catalog lt catalog gt Very low disk space was detected on drive lt drive gt Please free up at least lt number gt MB of space for content index to continue Corruption was detected in the property cache probably as a result of hardware failure or abrupt shutdown The error was fixed Free space has fallen below the minimum threshold No merges or filtering will take place until som
72. l you will receive four replies from IP address 127 0 0 1 as shown in Figure 7 32 If the PING command is unsuccessful you will receive a message telling you localhost is unknown If unsuccessful make sure that the TCP IP pro tocol is installed on the computer that the network adapter is properly installed and that the TCP IP protocol has been bound to the network 3 MS DOS Prompt Pe 8 mae sf Al C SWINDOWS gt ping C WINDOWS Figure 7 31 Viewing Options for the PING Utility Troubleshooting Resource Access 243 MS DOS Prompt iol x eed HES Hl eE Al C WINDOWS gt Figure 7 32 Successfully Pinging the Local Host adapter Also check the system log in Event Viewer to make sure all services have started correctly Sometimes it is necessary to reboot the client computer to solve this problem Another trick is to re install the TCP IP protocol altogether PINGING THE LOCAL HOST You can further verify the configuration of the local host by using the PING command with the actual IP address of the local computer If all is well you should get immediate replies as shown in Figure 7 33 MS DOS Prompt nt 7 ir round trip t Minimum Maximum C WINDOWS gt _ Figure 7 33 Successfully Pinging the Local Host 244 Chapter 7 Troubleshooting Internet Information Server If this test is unsuccessful check to make sure that the correct IP address was either configured manu
73. leshoot the components of the Windows NT Option Pack 4 0 WINDOWS NT SERVER 4 0 Although your Windows NT server might boot correctly it may still not work properly because of configuration problems such as device driver con flicts or SCSI errors These types of problems can be identified using Win dows NT s built in utilities Event Viewer Windows NT Diagnostics and Recovery USING EVENT VIEWER If the server boots successfully but not all services or components work properly the first step in the troubleshooting process is to consult the Event Viewer application found in the Administrative Tools pro 212 Chapter 7 Troubleshooting Internet Information Server 3 Service Control Manager x d At least one service or driver failed during system startup Use Event Viewer to examine the event log for details d Figure 7 2 Typical Windows NT Error Message gram group Indeed Windows NT will often tell you to do just that with a message such as the one shown in Figure 7 2 All critical messages are stored in the system log accessed by selecting the System command under Event Viewer s View menu see Figure 7 3 Three kinds of events are tracked in the system log Errors Indicated with red stop sign symbols these denote the failure of a Windows NT component or device e Warnings Indicated with yellow exclamation point symbols these denote an impending problem Information Indicated with blue I
74. me corrupted for example Such events are written to the application log as will be described further on Starting the Index Server does not require administrator intervention either The service starts automatically when the HS is launched unless its startup parameters have been explicitly set to manual Even when startup is set to manual the Index Server starts automatically when a query is made You can start and stop the Index Server manually using the Services application from the Control Panel program group as shown in Figure 7 46 Perhaps the most common problem that can affect Index Server opera tions is disk space When the disk drive is filled the Index Server pauses all indexing operations and writes a message to the Event log You should there fore monitor the log and drive space allocations regularly Another issue that can arise involves word weighting which refers to the way in which words are indexed for importance This can be done in several ways For example a word that appears in a title has a higher weight than one that is located in body text How many times a word appears called the term has a weight The proximity of multiple words to each other has a weight Finally the density of the word has a weight Density refers to the result of dividing the number of times a word appears by the total number of words in the data in which it appears Service Content Index m Start eh Manual C Disabled
75. mp directory locations Network Lists network components and their status 216 Chapter 7 Troubleshooting Internet Information Server USING RECOVERY The Recovery utility can be configured under the Startup Shutdown tab of the System control panel as shown in Figure 7 8 Here you can enable settings to choose the operating system that will boot by default and establish how long the server will pause so that you can make another choice You can also enable options to write event data to the system log alert an administrator of problems or automatically reboot the system if the server freezes e g stops all processes Enabling the Write debugging information to check box creates a dump file that you can analyze yourself or in conjunction with Microsoft technical support With the option configured the data that was in memory at the time a stop error occurred is written to the paging file on the boot partition When the computer is restarted the data in the paging file is then saved to a dump file In order for this to work there must be a paging file on the boot parti tion that is larger than the amount of physical RAM installed in the server In addition there must be enough hard drive space on the disk drive to which the dump file will be saved to accomodate a file the same size as the server s physical RAM System Properties 12 x General Performance Environment Hardware Profiles User Profiles gt
76. n that was parsed Expecting GUID Expecting integer Property type DBTYPE_GUID Globally Unique Identifier GUID received incorrect input The correct format is KXXXXXX XXXX XXXX XXXX XXXXXXXXXXX Property of an integer type such as DBTYPE_I4 received a nonnumeric value or vector weight Expecting phrase Expecting property name Special token was received instead of plain text No legal property name was found after an sign Expecting real number Expecting regular expression Property of a real type such as DBTYPE_R4 received a nonnu meric value Special token was received instead of text while in regular expression parsing mode The file lt file_name gt is on a remote UNC share IDQ IDA and HTX files cannot be placed on a remote UNC share Files ended in IDQ IDA and HTX are on an Universal Nam ing Convention UNC share which is not permitted Table 7 4 continued 258 Chapter 7 Troubleshooting Internet Information Server Error Message Invalid literal No such property Not yet implemented Out of memory Regular expressions require a Unexpected end of string Unsupported property type Description Query has incorrect format Property specified after a or sign does not exist The property is not a default The property is not specified in the Names section of the IDQ file Index Server feature is not yet functional Processing a CiRestrict
77. nd that can be used to download files while Put is an FTP command that can be used to upload files A True B False
78. o 30 Default is 20 MaxWordlistSize MinDiskFreeForceMerge Maximum amount of memory taken up by an individual word list When this limit is reached only the document being filtered will be added Additional documents will be re filed and placed later in another word list Measured in 128 Kbyte units Range is 10 to infinity Default is 14 On the catalog drive if the free space falls below MinDiskFree ForceMerge and the disk space occupied by the shadow indexes exceeds MaxShadowFreeForceMerge a master merge is started This is measured in percentage of disk space Range is 5 to 25 Default is 15 MinIdleQueryThreads MinMergeldleTime MinSizeMergeWordlists MinWordlistMemory Minimum number of idle threads kept alive to process incoming queries Range is 0 to 1000 Default is 1 If average system idle time for the last merge check period is greater than this value an annealing merge can be performed Measured in percentage of CPU Range is 10 to 100 Default is 90 Minimum combined size of word lists that will force a shadow merge This is measured in Kilobytes Range is 1024 to 10240 Default is 1024 Minimum free memory for word list creation Measured in Mega bytes Range is 1 to 10 Default is 5 PropertyStoreMappedCache ThreadClassFilter Maximum size of in memory buffers for Property Cache Mea sured in 64 Kbyte pages Range is 0 to infinity Default is 16 Priority class of the CiDaemon process
79. og Box Once auditing is enabled two types of events are tracked in the security log These events are Success Indicated with a key symbol this denotes successful resource access Failure Indicated with a padlock symbol this denotes unsuccessful security access The application log collects messages from native Windows NT WIN32 applications such as those of the IIS Log files can grow to 512 Kbytes in size by default Their events are overwritten after seven days For more extensive logging intervals you can change this behavior in the Event Log Settings dialog box accessed via the Log Settings command under the Log menu as shown in Figure 7 5 The system log is most useful for isolating problems such as those that generate the message shown in Figure 7 2 To examine an event double click Event Log Settings x Change Settings for Cancel Maximum Log Size fae B Kilobytes 64K Increments Default Event Log Wrapping Overwrite Events as Needed Overwrite Events Older than 7 B Days C Do Not Overwrite Events Clear Log Manually Help dadi Figure 7 5 Log Settings Dialog Box 214 Chapter 7 Troubleshooting Internet Information Server Event Detail Figure 7 6 Event Detail Dialog Box on it in the log window to open the Event Detail dialog box as is shown in Figure 7 6 The information listed here includes e Date Time User account if applicable Computer Event identif
80. omputers occurs in a couple of ways The TCP IP host name e g marine_PC scionnet com can be mapped to an IP address by a DNS server or a HOSTS file The Net BIOS computer name e g Marine s PC can be mapped to an IP address by a WINS server or LMHOSTS file RESOLVING NETBIOS COMPUTER NAMES NetBIOS names are assigned to Windows NT and Windows 98 client com puters When such a computer searches for a resource it resolves the com puter name with an IP address by performing the following steps 1 The client computer looks in its local name cache to see if the address mapping information is there 2 If the address mapping information is not in the local name cache and the client computer is configured to use WINS it will query the WINS server 3 If the WINS server is not able to provide the address mapping informa tion the client computer sends a broadcast query onto the local subnet broadcast packets typically do not travel across routers 4 If the client computer receives no response to its query it will look for the address mapping information in the LMHOSTS file Troubleshooting Resource Access 249 5 If the client computer cannot find address mapping information in the LMHOSTS file it will look for it in the HOSTS file 6 If the client computer cannot find address mapping information in the HOSTS file and the client has been configured to use DNS it will query the DNS server The maximum lengt
81. ooting With IPCONFIG The manual configuration of TCP IP leaves a lot of room for human error and is commonly responsible for clients failing to connect to the server One way around these issues is to have the Windows NT DHCP Server provide each client s TCP IP information If errors still occur at the client end you can use the IPCONFIG utility to troubleshoot them If you want to know which network settings a DHCP server has leased to a Windows or DOS based client computer you may type the following command at the command prompt IPCONFIG all Here you can verify the TCP IP information including host name DNS servers IP address subnet mask and the duration of the lease as shown in Figure 7 29 If there is a problem you may see that the client computer has an invalid address of 0 0 0 0 while the DHCP server has a broadcast address of 255 255 255 255 This often means the client computer has no connectivity Troubleshooting Resource Access 241 Figure 7 29 Viewing Client Configuration with IPCONFIG to a DHCP server in which case you should release the client s IP address and then try to lease a new IP address To do this type the next sequence of commands from the DHCP client computer at a command prompt IPCONFIG release IPCONFIG renew If there is a DHCP server present on the network the client should be granted a new lease You can also use the WINIPCFG utility to view the IP configuration and renew the l
82. open the Help dialog box as shown in Figure 7 48 select the Help com mand from the Start menu Help Topics Windows NT Help 127 x Contents Index Find 1 Type the first few letters of the word you re looking for Setup 2 Click the index entry you want and then click Display Settings command 3 computer See configuring Control Panel setup page setver command opening permissions share names special shares stopping sharing VIEWING ol shared printers shared resources closing connecting to xl Figure 7 48 Viewing Windows NT Servers Online Help Topics Dialog Box 270 Chapter 7 Troubleshooting Internet Information Server The IIS also provides online help To view it select Product Documen tation from the Programs menu Web Sites Microsoft provides Web sites that support both Windows NT Server and the IIS One of the most useful TechNet provides a troubleshooting database as shown in Figure 7 49 At these sites you can find bug fixes software updates and technical notes on known problems and software incompatibilities Useful Web sites include the following ET oft TechNet ServiceDesk Microsoft Internet Explorer _ oj x File Edt View Go Favorites Help Address hitp suppor microsoft com servicedesks TechNet TechNet Home TechNet CD Online Events amp Training International Technical Services Technical Support for IT Professionals Resources Search
83. owing command NSLOOKUP lt host_name gt If it works the appropriate IP address will be returned Study Break Study Break Checking Your TCP IP Configuration Practice what you have learned by making sure the server s TCP IP connectivity is working properly One of the easiest ways to do this is simply to launch Internet Explorer and attempt to view a remote Web site If this fails however you can employ some useful Windows NT utilities in trouble shooting IPCONFIG will tell you the TCP IP settings with which your computer is configured You can then review them for errors Use the ALL switch to see DHCP and WINS information as well PING will tell you if a remote host is receiving your messages Use the IP address of a properly con figured local host If your TCP IP configuration is working it will respond Then try the IP address of a remote host If all is well with your network and router configurations it should respond too TRACERT Trace Route will tell you how many routers are crossed as traffic moves from a local host to a remote host These are all DOS programs that can be launched from Command Prompt Troubleshooting Security In troubleshooting security one is either attempting to keep people from getting access to resources that they should be restricted from or to give peo ple access to resources that they should have In this section you will learn to troubleshoot such areas as firewalls anonymous acce
84. rd combinations Default FTP Site Properties 2 x FTP Site Security Accounts Messages Home Directory Directory Security Select the Windows NT User Account to use for anonymous access to this resource Username flusR_SN_PDC Browse Rassyyord eee I Allow only anonymous connections IV Enable Automatic Password Synchronization m FTF Site Operators Grant operator privileges to Windows NT User Accounts for this FTP site only Operators Administrators Figure 7 22 Enabling Anonymous FTP Access Troubleshooting Security 233 Troubleshooting Network Access In addition to controlling access to resources user by user the IIS also lets you control access host by host or network by network much like a fire wall In controlling network access you need to apply one of two methodol ogies In the first case you deny specific hosts or networks access and permit access to everyone else In the second case you permit access to specific hosts and networks and deny access to everyone else The method you choose will depend on the number of hosts you wish to include in your access controls If you have a public Internet Web site you might use the former method to deny access to certain problem hosts and networks If you have a secure intranet you will probably use the latter method to include only a few local hosts To grant or deny network access to a Web site select the Edit button in the IP
85. s are automatically indexed or not Measured as a Boolean Range is 0 and 1 Default is 1 Table 7 7 continued 266 Chapter 7 Troubleshooting Internet Information Server Parameter IsapiMaxEntriesInQueryCache IsapiMaxRecordsInResultSet Description Maximum number of the cached queries Range is 5 to 100 Default is 10 Maximum total number of rows to fetch for a single query Range is 1000000 Default is 5000 IsapiMaxRecordsPerGetRows IsapiQueryCachePurgelnterval Maximum number of rows to fetch when getting data to display on an HTML page Range is 10 to 1000 Default is 50 Time interval a query cache item will remain alive Measured in minutes Range is 1 to 120 Default is 5 IsapiRequestQueueSize IsapiRequestThresholdFactor Maximum number of Web query requests to queue when busy with other queries Range is 100000 Default is 16 Number of threads per processor beyond which query requests are queued Range is 1 to 100 000 Default is 3 MasterMergeCheckpointInterval MasterMergeTime Checkpointing interval for master merge Determines how much work data written to the new master index to redo in case a mas ter merge is paused and restarted Measured in Kilobytes Range is 512 to 8096 Default is 512 Time at which master merge will occur This is stored as the num ber of minutes after midnight Measured in minutes Range is 0 to 1439 Default is 0 MaxActiveQueryThreads
86. sful Attempt to Open a Web Server Connection If there appears to be no problem with the DNS server take a look at the HOSTS file as shown in Figure 7 45 E Hosts Notepad ioj x File Edit Search Help Copyright c 1998 Microsoft Corp This is a sample HOSTS file used by Microsoft TCP IP stack for Windows98 This file contains the mappings of IP addresses to host names Each entry should be kept on an individual line The IP address should be placed in the first column followed by the corresponding host name The IP address and the host name should be separated by at least one space Additionally comments such as these may be inserted on individual lines or following the machine name denoted by a symbol For example 102 54 94 97 rhino acme com source server 38 25 63 10 x acme com x client host 127 0 0 1 localhost Figure 7 45 Viewing the HOSTS File Troubleshooting Index Server Queries 255 Problems can occur with the HOSTS file if it is moved This file must be located in the following directory path on Windows NT computers WINNT System32 drivers The HOSTS file is located in the WINDOWS directory on Windows 98 computers Make sure that the correct names and IP addresses are listed in the HOSTS file Also ensure that the correct format is used for HOST entries As noted in Microsoft s sample file each entry should be kept on an individual line T
87. ss Content Analyzer sn Home Site Objects Search Re Mi EG File View Mapping Tools Window Help Dieu S isle eR Aj a e ede a Lae Te 157 22 252 160 text html 157 22 252 160 f text htrn 157 22 252 160 i text html Scion Networks LLC text html 6 29 98 6 30 22 A Scion Networks LL text html 11 6 98 8 21 34 P What is Scion Net text htm 11 7 98 5 48 04 P Scion Networks Pu text html 11 7 98 5 42 08 P GetAppleShare lP text html 11 6 98 11 44 00 P Get Claris Em iler text html 1126798 11 44 56 P Get AppleTalk Net text html 11 6 98 11 46 02 P Get Designing Appl text html 11 6 98 11 46 52 P Get Complete Guid text html 11 6 98 11 47 38 P Get Managing Appl text html 11 6 98 11 49 10 P Get DHTML for Ww text html 11 6 98 11 42 56 P Cainan Alakuarlia st tauk tlskeal 14 10 100 11 F3 NA D Number of Objects 69 Ready 0 http 1 0 http 1 O http 1 0 http 1 0 http 1 O http 1 0 http 1 0 http 1 O http 1 O http 1 0 http 1 D http 271 0 http 1 0 http 1 2 N bbe te gt Zi ahRW RE OROWMNMHAN JNNNNNNNNNNNYNN Figure 7 56 Finding Home Site Objects with the Quick Search Command 276 Chapter 7 Troubleshooting Internet Information Server 1f Microsoft Site Server Express Content Analyzer sn Images Without ALT Search R EG EN File View Mapping Tools Window Help laj xj oeu S zels SA Ane 2 Eee P
88. ss user logons network access port numbers NTFS permissions and SSL connections Troubleshooting Firewalls A firewall is software running on a server or router that can be used to filter the kinds of traffic that is allowed to pass between your network and the Troubleshooting Security 231 Internet For example you might permit HTTP traffic to move through the firewall but prohibit FTP traffic Firewalls can also be used to filter and block traffic originating from networks or hosts known to be insecure If users cannot gain access to IIS resources from the Internet assuming you want them to check to see that the firewall is configured to allow such access In some cases your network s firewall might be so restrictive that traf fic is not permitted to pass between the IIS and the outside world If such access is desired you might consider moving the IIS outside the network and beyond the firewall Troubleshooting Anonymous Access Anonymous access is a method of permitting unknown users to access your Web or FTP server directories Typically such users supply the user ID anon ymous and as a courtesy their email addresses as passwords Under IIS the IUSR_ lt server_name gt account is used to permit this type of access As shown in Figure 7 21 you can establish anonymous user permissions for this account using Windows NT Server s User Manager for Domains application If the IUSR account or whichever account you might
89. started Master merge was started on lt catalog gt because the amount of remaining disk space was less than lt number gt Master merge was started on lt catalog gt because more than lt number gt docu ments have changed since the last mas ter merge A master merge was started because the amount of free space on the catalog volume dropped below the minimum threshold You should increase the amount of disk space after the master merge completes A master merge was started because the number of documents that changed since the last master merge exceeded the maximum threshold Master merge was started on lt catalog gt because the size of the shadow indexes is more than lt number gt the disk A master merge was started because the amount of data in shadow indexes exceeded the maximum threshold Table 7 6 continued 264 Chapter 7 Troubleshooting Internet Information Server Error Messages Notifications are not enabled on lt pathname gt because this is a DFS aware share This scope will be periodi cally scanned Description A virtual root points to a Distributed File System DFS share which do not support notifications One or more embeddings in file lt file gt could not be filtered The path lt pathname gt is too long for Content Index The file was filtered correctly but several embedded objects could not be filtered This is usually caused by embedded objects without a reg
90. t be filtered Only properties are filtered When set to a nonzero value contents and properties will be filtered Measured as a Boolean Range is 0 and 1 Default is 1 FilterDirectories When set to a nonzero value directories will also be filtered for sys tem properties and displayed in query results Measured as a Bool ean Range is 0 and 1 Default is 0 FilterFilesWith UnkownExtensions Determines if files with extensions that have not been registered will be filtered or not Set the value to 0 if only registered file types should be filtered To see how to register a file type see Associating File Types with Extensions on the Filtering page Measured as a Boolean Range is 0 and 1 Default is 1 FilterRetries The maximum number of times a file will be retried for filtering if there are failures while trying to filter a file Measured in number Range is 1 to 10 Default is 4 FilterRetryInterval The number of seconds between attempts to filter the contents of a file that is being used by another process Measured in number Range is 2 to 240 Default is 30 seconds ForcedNetPathScanInterval Time interval between forced scans on directories with no notifica tions Measured in minutes Range is 10 to infinity Default is 120 GenerateCharacterization Controls automatic generation of characterization abstract Mea sured as a Boolean Range is 0 and 1 Default is 1 GrovellISRegistry Controls whether all virtual root
91. take place to bring the total count of indexes to this number Measured in indexes Range is 2 to 100 Default is 5 MaxIndexes MaxMergelnterval Maximum number of persistent indexes in the catalog If this num ber is exceeded a shadow merge will be performed to bring the total below this number Measured in indexes Range is 10 to 150 Default is 50 Sleep time between merges Index Server activates this often to determine if a merge is necessary This is usually an annealing merge but may be a shadow or master merge Measured in min utes Range is 1 to 60 Default is 10 MaxPendingDocuments MaxQueryExecutionTime The number of pending documents to be filtered before consider ing CI out of date for property queries Measured in documents Range is 1 to 50 000 Default is 32 Maximum execution time of a query If a query takes more than this amount of CPU time processing of it will be stopped and an error status will be indicated Measured in milliseconds of CPU time Range is 50 to infinity Default is 10 000 MaxQueryTimeslice MaxQueueChunks MaxRestrictionNodes Maximum amount of time to execute a single query in a timeslice If more asynchronous queries are active than allowed query threads a query is put back on the pending queue after this time interval Time slicing is done after a matching row is found so the time spent in a timeslice may overrun this and a considerable num ber of rows may be examined
92. th the IIS FTP Ser vice As previously described FTP clients expect to find FTP services run ning at port 21 If users are having trouble connecting make sure that you have either left the default configuration of port 21 or that you have told your users what the new port number is You can use port numbers above Troubleshooting FTP Services 281 1024 but if you do so users will need to add the new port to the URL in their Web browsers in the following format ftp lt host_name gt lt port gt By default the FTP server is configured to launch at server bootup It can be stopped or paused from the Internet Service Manager application however or disabled in the Services Control Panel application When users cannot connect make sure the service has not been turned off Another issue can arise if users are not granted sufficient permissions to the FTP site directory If it is a download only site then Read permissions should be enabled If it is an upload site as well be sure to enable Change permissions If you are extending anonymous access check to make sure that the IUSR account has not been disabled and that the Allow Anonymous Access checkbox has been enabled in the Properties dialog box of each site as previ ously described You can test FTP connectivity under Windows NT by launching the FTP client from the Command Prompt Its options are as follows e v Suppress display of remote server responses n Suppress a
93. ubdirectory and file names open subdirectories and files create subdirectories and files delete subdirectories and files modify file data and run applications They can also alter permissions and take ownership Permissions that can be assigned to files are e No Access This choice permits users to see a file name and its attributes but not open it Read This choice permits users to read from a data file or launch an application They cannot make changes however e Change This choice permits users to read from a data file or launch an application as well as modify or delete them Full Control This choice permits users to read from a data file or launch an application as well as modify or delete them They can also alter permissions and take ownership Windows NT also makes available two custom permissions levels Spe cial Directory Access and Special File Access These allow you to create your own combinations from the six access permissions listed in Table 7 2 238 Chapter 7 Troubleshooting Internet Information Server Table 7 2 NTFS Directory and File Permissions Security Directory File No Access N A N A List RX N A Read RX RX Add WX N A Add amp Read RXWD RX Change RXWD RXWD Full Control RXWDPO RXWDPO N A not applicable R Read W Write X Execute D Delete P Change Permissions O Take Ownership To establish permissions for a file or subdirectory first select it
94. used from the Internet Service Manager application or disabled in the Ser vices Control Panel application however Another issue can arise if users are not granted sufficient permissions to the FTP site directory If it is a down load only site then Read permissions should be enabled If it is an upload site as well be sure to enable Change permissions If you are extending anon ymous access check to make sure that the IUSR account has not been dis abled and that the Allow Anonymous Access checkbox has been enabled in the Properties dialog box of each site A CHAPTER REVIEW QUESTIONS Here are a few questions relating to the material covered in the Troubleshoot ing section of Microsoft s Implementing and Supporting Microsoft Internet Information Server 4 0 exam 70 087 1 Which of the following are required for installation of the IIS 4 0 Choose all that apply A Windows NT Option Pack 4 0 B Windows NT Service Pack 2 C Internet Explorer 2 0 D Windows NT Server 4 0 2 Which of the following are TCP IP settings that are commonly misconfigured on network clients Choose all that apply A Static IP address B Subnet mask C Computer name D Default gateway 10 Troubleshooting FTP Services 285 If the IUSR account is disabled no users will be able to gain access to Web or FTP resources A True B False Under SSL secure connections can be created between the server and client using a private key encryption scheme
95. uto logon on initial connection i Turn off interactive prompts on multiple transfers d Enable debugging g Disable file name globbing s lt file_name gt Launch file containing scripted FTP commands a Use any local interface when binding data connec tion e w lt buffersize gt Override default buffer size of 4096 host Specify server by host name or IP address Study Break Study Break Transfer Files with FTP Practice what you have learned by moving files to and from your FTP site with an FTP client such as the one included in Windows NT Use the FIP command at the Command Prompt to view options Use the Open command in command interpreter mode to specify the remote host Use the Get command to download a file from the site Use the Put command to upload a file to the site Use the Close command to close the connection If there are problems use the Debug command to help diagnose them 282 Chapter 7 Troubleshooting Internet Information Server E Summary This chapter examined some of the issues surrounding troubleshooting IIS problems including those relating to configuration and setup security resource access Index Server queries broken hyperlinks the WWW Service and the FTP Service Troubleshooting Configurations The IIS runs under Windows NT Server 4 0 on either an Intel or RISC based computer Windows NT Server and IIS 4 0 will run on as modest a machine as a 90 MHz 486DX with 32 Mbytes
96. words Specific article ID number Specific driver or downloadable file Specific troubleshooting tool asking a question using Natural Language Search C what s new within the last 7 day s My question is 3 setup troubleshooting Cgo More Options I want to search against Full text Title I want the search results to show Titles with excerpts Titles only Last Reviewed Thiirsdav Fehruaru 18 1999 E Intenet zone Si Figure 7 51 Searching for Troubleshooting Information Study Break Study Break Look Up Tech Notes Practice what you have learned by visiting the TechNet site and using the troubleshooting database Use the Web site s search engine see Figure 7 51 to look for information relating to IIS 4 0 setup issues or information about any other IS related problems that you might be having Repairing Broken Links In this section you will learn to use Content Analyzer s WebMaps to find and fix broken links as well as identify other Web site problems As previously described you can use Site Server Express Content Ana lyzer to create WebMaps graphical representations of your Web site s struc ture as shown in Figure 7 52 Once created you can analyze the WebMap to locate errors in your Web site s design Repairing Broken Links 273 F Microsoft Site Server Express Content Analyzer sn Fie View Mapping Tools Window Help oela S
97. ysical path Files ended in IDQ IDA and HTX are on a network share which is not permitted They must be moved to the virtual root on the local computer CiTemplate parameter specified a file that could not be found The IDQ file lt file_name gt contains a duplicate entry on the line lt line gt The IDQ file lt file_name gt could not be found Parameter in the Query section was given multiple times IDQ file was not found in the location specified An invalid CiScope or CiCatalog was specified in the file lt file_name gt Invalid GUID CiScope or CiCatalog conditions were incorrect Entry in Names section had incorrect format An invalid locale was specified on the CiLocale line in IDQ file lt file_name gt Invalid property found in the CiCol umns specification in file lt file_name gt CiLocale parameter was not recognized Property specified by the CiColumns parameter was not standard and was not listed in the Names section Table 7 5 continued 260 Chapter 7 Troubleshooting Internet Information Server Error Message Invalid property found in the CiSort specification in file lt file_name gt An invalid sort order was specified on the CiSort line in the file lt file_name gt Only a and d are supported Description Property specified by the CiColumns parameter was not standard and was not listed in the Names section Sort order value following the
Download Pdf Manuals
Related Search
Related Contents
FloorLine-iPlus/FloorLine-i SUPPLEMENTAL SERVICE MANUAL R-330AK R DOC TECHNIQUE ( 1585 Ko) Manual de instrucciones para la instalación de luces LED diurnas BG-ET 5529-220 BG-ET 5529-127 φ Manual de instrucciones EEP-EWR MANUALE D`ISTRUZIONI Chief SLB175 project mount MathMaster Calculator Manual Copyright © All rights reserved.
Failed to retrieve file