
    This directive controls whether requests that contain trailing
    pathname information that follows an actual filename (or
    non-existent file in an existing directory) will be accepted or
    rejected.  The trailing pathname information can be made
    available to scripts in the PATH_INFO environment
    variable.
    For example, assume the location /test/ points to
    a directory that contains only the single file
    here.html.  Then requests for
    /test/here.html/more and
    /test/nothere.html/more both collect
    /more as PATH_INFO.
    The three possible arguments for the
    AcceptPathInfo directive are:
    
    - Off
- A request will only be accepted if it
    maps to a literal path that exists.  Therefore a request with
    trailing pathname information after the true filename such as
    /test/here.html/morein the above example will return
    a 404 NOT FOUND error.
- On
- A request will be accepted if a
    leading path component maps to a file that exists.  The above
    example /test/here.html/morewill be accepted if/test/here.htmlmaps to a valid file.
- Default
- The treatment of requests with
    trailing pathname information is determined by the handler responsible for the request.
    The core handler for normal files defaults to rejecting
    PATH_INFOrequests. Handlers that serve scripts, such as cgi-script and isapi-isa, generally acceptPATH_INFOby default.
The primary purpose of the AcceptPathInfo
    directive is to allow you to override the handler's choice of
    accepting or rejecting PATH_INFO. This override is required,
    for example, when you use a filter, such
    as INCLUDES, to generate content
    based on PATH_INFO.  The core handler would usually reject
    the request, so you can use the following configuration to enable
    such a script:
    
      <Files "mypaths.shtml">
      
        Options +Includes
        SetOutputFilter INCLUDES
        AcceptPathInfo On
      
      </Files>
    
 

    While processing a request the server looks for
    the first existing configuration file from this list of names in
    every directory of the path to the document, if distributed
    configuration files are enabled for that
    directory. For example:
    
    before returning the document
    /usr/local/web/index.html, the server will read
    /.acl, /usr/.acl,
    /usr/local/.acl and /usr/local/web/.acl
    for directives, unless they have been disabled with
    
      <Directory />
      
        AllowOverride None
      
      </Directory>
    
See also
 

    This directive specifies the name of the character set that
    will be added to any response that does not have any parameter on
    the content type in the HTTP headers. This will override any
    character set specified in the body of the document via a
    META tag. A setting of AddDefaultCharset
    Off disables this
    functionality. AddDefaultCharset On enables
    Apache's internal default charset of iso-8859-1 as
    required by the directive. You can also specify an alternate
    charset to be used. For example:
    
 

    This directive activates a particular output filter for a request depending on the
    response MIME-type.
    The following example uses the DEFLATE filter, which
    is provided by mod_deflate. It will compress all
    output (either static or dynamic) which is labeled as
    text/html or text/plain before it is sent
    to the client.
    
      AddOutputFilterByType DEFLATE text/html text/plain
    
If you want the content to be processed by more than one filter, their
    names have to be separated by semicolons. It's also possible to use one
    AddOutputFilterByType directive for each of
    these filters.
    The configuration below causes all script output labeled as
    text/html to be processed at first by the
    INCLUDES filter and then by the DEFLATE
    filter.
    
    <Location /cgi-bin/>
    
      Options Includes
      AddOutputFilterByType INCLUDES;DEFLATE text/html
    
    </Location>
    
Note
      Enabling filters with AddOutputFilterByType
      may fail partially or completely in some cases. For expample, no
      filters are applied if the MIME-type could not be determined  and falls
      back to the DefaultType setting,
      even if the DefaultType is the
      same.
      However, if you want to make sure, that the filters will be
      applied, assign the content type to a resource explicitely, for
      example with AddType or
      ForceType. Setting the
      content type within a (non-nph) CGI script is also safe.
      The by-type output filters are never applied on proxy requests.
    See also
 

    The AllowEncodedSlashes directive allows URLs
    which contain encoded path separators (%2F for /
    and additionally %5C for \ on according systems)
    to be used. Normally such URLs are refused with a 404 (Not found) error.
    Turning AllowEncodedSlashes On is
    mostly useful when used in conjunction with PATH_INFO.
    Note
      Allowing encoded slashes does not imply decoding.
      Occurences of %2F or %5C (only on
      according systems) will be left as such in the otherwise decoded URL
      string.
    See also
 

    When the server finds an .htaccess file (as
    specified by AccessFileName)
    it needs to know which directives declared in that file can override
    earlier configuration directives.
    
    When this directive is set to None, then
    .htaccess files are completely ignored.
    In this case, the server will not even attempt to read
    .htaccess files in the filesystem.
    When this directive is set to All, then any
    directive which has the .htaccess Context is allowed in
    .htaccess files.
    The directive-type can be one of the following
    groupings of directives.
    
      - AuthConfig
- 
      Allow use of the authorization directives (AuthDBMGroupFile,AuthDBMUserFile,AuthGroupFile,AuthName,AuthType,AuthUserFile,Require, etc.).
- FileInfo
- 
      Allow use of the directives controlling document types (DefaultType,ErrorDocument,ForceType,LanguagePriority,SetHandler,SetInputFilter,SetOutputFilter, andmod_mimeAdd* and Remove*
      directives, etc.).
- Indexes
- 
      Allow use of the directives controlling directory indexing
      (AddDescription,AddIcon,AddIconByEncoding,AddIconByType,DefaultIcon,DirectoryIndex,FancyIndexing,HeaderName,IndexIgnore,IndexOptions,ReadmeName,
      etc.).
- Limit
- 
      Allow use of the directives controlling host access (Allow,DenyandOrder).
- Options
- 
      Allow use of the directives controlling specific directory
      features (OptionsandXBitHack).
Example:
    
      AllowOverride AuthConfig Indexes
    
See also
 

    This directive sets the name of the authorization realm for a
    directory. This realm is given to the client so that the user
    knows which username and password to send.
    AuthName takes a single argument; if the
    realm name contains spaces, it must be enclosed in quotation
    marks.  It must be accompanied by AuthType and Require directives, and directives such
    as AuthUserFile and
    AuthGroupFile to
    work.
   For example:
   
    The string provided for the AuthName is what will
    appear in the password dialog provided by most browsers.
See also
 

    This directive selects the type of user authentication for a
    directory. Only Basic and Digest are
    currently implemented.
     It must be accompanied by AuthName and Require directives, and directives such
     as AuthUserFile and
     AuthGroupFile to
     work.
See also
 
    This directive is used to control how Apache finds the
    interpreter used to run CGI scripts. For example, setting
    CGIMapExtension sys:\foo.nlm .foo will
    cause all CGI script files with a .foo extension to
    be passed to the FOO interpreter.
 

    This directive enables the generation of
    Content-MD5 headers as defined in RFC1864
    respectively RFC2068.
    MD5 is an algorithm for computing a "message digest"
    (sometimes called "fingerprint") of arbitrary-length data, with
    a high degree of confidence that any alterations in the data
    will be reflected in alterations in the message digest.
    The Content-MD5 header provides an end-to-end
    message integrity check (MIC) of the entity-body. A proxy or
    client may check this header for detecting accidental
    modification of the entity-body in transit. Example header:
    
      Content-MD5: AuLb7Dp1rqtRtxz2m9kRpA==
    
Note that this can cause performance problems on your server
    since the message digest is computed on every request (the
    values are not cached).
    Content-MD5 is only sent for documents served
    by the core, and not by any module. For example,
    SSI documents, output from CGI scripts, and byte range responses
    do not have this header.
 

    There will be times when the server is asked to provide a
    document whose type cannot be determined by its MIME types
    mappings.
    The server must inform the client of the content-type of the
    document, so in the event of an unknown type it uses the
    DefaultType. For example:
    
    would be appropriate for a directory which contained many GIF
    images with filenames missing the .gif extension.
    Note that unlike ForceType, this directive only
    provides the default mime-type. All other mime-type definitions,
    including filename extensions, that might identify the media type
    will override this default.
 

| Description: | Enclose a group of directives that apply only to the
named file-system directory and sub-directories | 
|---|
| Syntax: | <Directory directory-path>
... </Directory> | 
|---|
| Context: | server config, virtual host | 
|---|
| Status: | Core | 
|---|
| Module: | core | 
|---|
    <Directory> and
    </Directory> are used to enclose a group of
    directives that will apply only to the named directory and
    sub-directories of that directory. Any directive that is allowed
    in a directory context may be used. Directory-path is
    either the full path to a directory, or a wild-card string using
    Unix shell-style matching. In a wild-card string, ? matches
    any single character, and * matches any sequences of
    characters. You may also use [] character ranges. None
    of the wildcards match a `/' character, so <Directory
    /*/public_html> will not match
    /home/user/public_html, but <Directory
    /home/*/public_html> will match. Example:
    
      <Directory /usr/local/httpd/htdocs>
      
        Options Indexes FollowSymLinks
      
      </Directory>
    
      Be careful with the directory-path arguments:
      They have to literally match the filesystem path which Apache uses
      to access the files. Directives applied to a particular
      <Directory> will not apply to files accessed from
      that same directory via a different path, such as via different symbolic
      links.
     
    Extended regular
    expressions can also be used, with the addition of the
    ~ character. For example:
    
      <Directory ~ "^/www/.*/[0-9]{3}">
    
would match directories in /www/ that consisted of
    three numbers.
    If multiple (non-regular expression) <Directory> sections
    match the directory (or one of its parents) containing a document,
    then the directives are applied in the order of shortest match
    first, interspersed with the directives from the .htaccess files. For example,
    with
    
      <Directory />
      
        AllowOverride None
      
      </Directory>
      
      <Directory /home/>
      
        AllowOverride FileInfo
      
      </Directory>
    
for access to the document /home/web/dir/doc.html
    the steps are:
    
      - Apply directive AllowOverride None(disabling.htaccessfiles).
- Apply directive AllowOverride FileInfo(for
      directory/home).
- Apply any FileInfodirectives in/home/.htaccess,/home/web/.htaccessand/home/web/dir/.htaccessin that order.
Regular expressions are not considered until after all of the
    normal sections have been applied. Then all of the regular
    expressions are tested in the order they appeared in the
    configuration file. For example, with
    
      <Directory ~ abc$>
      
        # ... directives here ...
      
      </Directory>
    
the regular expression section won't be considered until after
    all normal <Directory>s and
    .htaccess files have been applied. Then the regular
    expression will match on /home/abc/public_html/abc and
    the corresponding <Directory> will
    be applied.
   Note that the default Apache access for
    <Directory /> is Allow from All.
    This means that Apache will serve any file mapped from an URL. It is
    recommended that you change this with a block such
    as
    
      <Directory />
      
        Order Deny,Allow
        Deny from All
      
      </Directory>
    
and then override this for directories you
    want accessible. See the Security Tips page for more
    details.
    The directory sections occur in the httpd.conf file.
    <Directory> directives
    cannot nest, and cannot appear in a <Limit> or <LimitExcept> section.
See also
 

| Description: | Enclose directives that apply to
file-system directories matching a regular expression and their
subdirectories | 
|---|
| Syntax: | <DirectoryMatch regex>
... </DirectoryMatch> | 
|---|
| Context: | server config, virtual host | 
|---|
| Status: | Core | 
|---|
| Module: | core | 
|---|
    <DirectoryMatch> and
    </DirectoryMatch> are used to enclose a group
    of directives which will apply only to the named directory and
    sub-directories of that directory, the same as <Directory>. However, it
    takes as an argument a regular expression. For example:
    
      <DirectoryMatch "^/www/.*/[0-9]{3}">
    
would match directories in /www/ that consisted of three
    numbers.
See also
 

    This directive sets the directory from which httpd
    will serve files. Unless matched by a directive like Alias, the server appends the
    path from the requested URL to the document root to make the
    path to the document. Example:
    
    then an access to
    http://www.my.host.com/index.html refers to
    /usr/web/index.html.
    The DocumentRoot should be specified without
    a trailing slash.
See also
 

    This directive controls whether the httpd may use
    memory-mapping if it needs to read the contents of a file during
    delivery.  By default, when the handling of a request requires
    access to the data within a file -- for example, when delivering a
    server-parsed file using mod_include -- Apache
    memory-maps the file if the OS supports it.
    This memory-mapping sometimes yields a performance improvement.
    But in some environments, it is better to disable the memory-mapping
    to prevent operational problems:
    
    - On some multiprocessor systems, memory-mapping can reduce the
    performance of the httpd.
- With an NFS-mounted DocumentRoot,
    thehttpdmay crash due to a segmentation fault if a file
    is deleted or truncated while thehttpdhas it
    memory-mapped.
For server configurations that are vulnerable to these problems,
    you should disable memory-mapping of delivered files by specifying:
    
    For NFS mounted files, this feature may be disabled explicitly for
    the offending files by specifying:
    
      <Directory "/path-to-nfs-files">
      
        EnableMMAP Off
      
      </Directory>
    
 

    This directive controls whether httpd may use the sendfile
    support from the kernel to transmit file contents to the client.
    By default, when the handling of a request requires no access
    to the data within a file -- for example, when delivering a
    static file -- Apache uses sendfile to deliver the file contents
    without ever reading the file if the OS supports it.
    This sendfile mechanism avoids seperate read and send operations,
    and buffer allocations. But on some platforms or within some
    filesystems, it is better to disable this feature to avoid
    operational problems:
    
    - Some platforms may have broken sendfile support that the build
    system did not detect, especially if the binaries were built on
    another box and moved to such a machine with broken sendfile
    support.
- On Linux the use of sendfile triggers TCP-checksum
    offloading bugs on certain networking cards when using IPv6.
- With a network-mounted DocumentRoot(e.g., NFS or SMB),
    the kernel may be unable to serve the network file through
    its own cache.
For server configurations that are vulnerable to these problems,
    you should disable this feature by specifying:
    
    For NFS or SMB mounted files, this feature may be disabled explicitly
    for the offending files by specifying:
    
      <Directory "/path-to-nfs-files">
      
        EnableSendfile Off
      
      </Directory>
    
 

    In the event of a problem or error, Apache can be configured
    to do one of four things,
    
      - output a simple hardcoded error message
- output a customized message
- redirect to a local URL-path to handle the
      problem/error
- redirect to an external URL to handle the
      problem/error
The first option is the default, while options 2-4 are
    configured using the ErrorDocument
    directive, which is followed by the HTTP response code and a URL
    or a message. Apache will sometimes offer additional information
    regarding the problem/error.
    URLs can begin with a slash (/) for local URLs, or be a full
    URL which the client can resolve. Alternatively, a message can
    be provided to be displayed by the browser. Examples:
    
      ErrorDocument 500 http://foo.example.com/cgi-bin/tester
      ErrorDocument 404 /cgi-bin/bad_urls.pl
      ErrorDocument 401 /subscription_info.html
      ErrorDocument 403 "Sorry can't allow you access today"
    
Note that when you specify an ErrorDocument
    that points to a remote URL (ie. anything with a method such as
    http in front of it), Apache will send a redirect to the
    client to tell it where to find the document, even if the
    document ends up being on the same server. This has several
    implications, the most important being that the client will not
    receive the original error status code, but instead will
    receive a redirect status code. This in turn can confuse web
    robots and other clients which try to determine if a URL is
    valid using the status code. In addition, if you use a remote
    URL in an ErrorDocument 401, the client will not
    know to prompt the user for a password since it will not
    receive the 401 status code. Therefore, if you use an
    ErrorDocument 401 directive then it must refer to a local
    document.
    Microsoft Internet Explorer (MSIE) will by default ignore
    server-generated error messages when they are "too small" and substitute
    its own "friendly" error messages. The size threshold varies depending on
    the type of error, but in general, if you make your error document
    greater than 512 bytes, then MSIE will show the server-generated
    error rather than masking it.  More information is available in
    Microsoft Knowledgebase article Q294807.
    Prior to version 2.0, messages were indicated by prefixing
    them with a single unmatched double quote character.
See also
 

    The ErrorLog directive sets the name of
    the file to which the server will log any errors it encounters. If
    the file-path is not absolute (in general: does not begin
    with a slash (/)) then it is assumed to be relative to the ServerRoot.
    Example
    ErrorLog /var/log/httpd/error_log
    
If the file-path
    begins with a pipe (|) then it is assumed to be a command to spawn
    to handle the error log.
    Example
    ErrorLog "|/usr/local/bin/httpd_errors"
    
Using syslog instead of a filename enables logging
    via syslogd(8) if the system supports it. The default is to use
    syslog facility local7, but you can override this by
    using the syslog:facility syntax where
    facility can be one of the names usually documented in
    syslog(1).
    Example
    ErrorLog syslog:user
    
SECURITY: See the security tips
    document for details on why your security could be compromised
    if the directory where logfiles are stored is writable by
    anyone other than the user that starts the server.
    Note
      When entering a file path on non-Unix platforms, care should be taken
      to make sure that only forward slashed are used even though the platform
      may allow the use of back slashes. In general it is a good idea to always 
      use forward slashes throughout the configuration files.
    See also
 

    
    The FileETag directive configures the file
    attributes that are used to create the ETag (entity
    tag) response header field when the document is based on a file.
    (The ETag value is used in cache management to save
    network bandwidth.) In Apache 1.3.22 and earlier, the
    ETag value was always formed
    from the file's inode, size, and last-modified time (mtime). The
    FileETag directive allows you to choose
    which of these -- if any -- should be used. The recognized keywords are:
    
    
     - INode
- The file's i-node number will be included in the calculation
- MTime
- The date and time the file was last modified will be included
- Size
- The number of bytes in the file will be included
- All
- All available fields will be used. This is equivalent to:
         FileETag INode MTime Size
 
- None
- If a document is file-based, no ETagfield will be
       included in the response
The INode, MTime, and Size
    keywords may be prefixed with either + or -,
    which allow changes to be made to the default setting inherited
    from a broader scope. Any keyword appearing without such a prefix
    immediately and completely cancels the inherited setting.
    If a directory's configuration includes
    FileETag INode MTime Size, and a
    subdirectory's includes FileETag -INode,
    the setting for that subdirectory (which will be inherited by
    any sub-subdirectories that don't override it) will be equivalent to
    FileETag MTime Size.
 

    The <Files> directive
    limits the scope of the enclosed directives by filename. It is comparable
    to the <Directory>
    and <Location>
    directives. It should be matched with a </Files>
    directive. The directives given within this section will be applied to
    any object with a basename (last component of filename) matching the
    specified filename. <Files>
    sections are processed in the order they appear in the
    configuration file, after the <Directory> sections and
    .htaccess files are read, but before <Location> sections. Note
    that <Files> can be nested
    inside <Directory> sections to restrict the
    portion of the filesystem they apply to.
    The filename argument should include a filename, or
    a wild-card string, where ? matches any single character,
    and * matches any sequences of characters. Extended regular
    expressions can also be used, with the addition of the
    ~ character. For example:
    
      <Files ~ "\.(gif|jpe?g|png)$">
    
would match most common Internet graphics formats. <FilesMatch> is preferred,
    however.
    Note that unlike <Directory> and <Location> sections, <Files> sections can be used inside
    .htaccess files. This allows users to control access to
    their own files, at a file-by-file level.
See also
 

    The <FilesMatch> directive
    limits the scope of the enclosed directives by filename, just as the
    <Files> directive
    does. However, it accepts a regular expression. For example:
    
      <FilesMatch "\.(gif|jpe?g|png)$">
    
would match most common Internet graphics formats.
See also
 

    When placed into an .htaccess file or a
    <Directory>, or
    <Location> or
    <Files>
    section, this directive forces all matching files to be served
    with the content type identification given by
    MIME-type. For example, if you had a directory full of
    GIF files, but did not want to label them all with .gif,
    you might want to use:
    
    Note that unlike DefaultType,
    this directive overrides all mime-type associations, including
    filename extensions, that might identify the media type.
    You can override any ForceType setting
    by using the value of None:
    
      # force all files to be image/gif:
      <Location /images>
        
          ForceType image/gif
        
      </Location>
      
      # but normal mime-type associations here:
      <Location /images/mixed>
      
        ForceType None
      
      </Location>
    
 

    This directive enables DNS lookups so that host names can be
    logged (and passed to CGIs/SSIs in REMOTE_HOST).
    The value Double refers to doing double-reverse
    DNS lookup. That is, after a reverse lookup is performed, a forward
    lookup is then performed on that result. At least one of the ip
    addresses in the forward lookup must match the original
    address. (In "tcpwrappers" terminology this is called
    PARANOID.)
    Regardless of the setting, when mod_access is
    used for controlling access by hostname, a double reverse lookup
    will be performed.  This is necessary for security. Note that the
    result of this double-reverse isn't generally available unless you
    set HostnameLookups Double. For example, if only
    HostnameLookups On and a request is made to an object
    that is protected by hostname restrictions, regardless of whether
    the double-reverse fails or not, CGIs will still be passed the
    single-reverse result in REMOTE_HOST.
    The default is Off in order to save the network
    traffic for those sites that don't truly need the reverse
    lookups done. It is also better for the end users because they
    don't have to suffer the extra latency that a lookup entails.
    Heavily loaded sites should leave this directive
    Off, since DNS lookups can take considerable
    amounts of time. The utility logresolve, compiled by default
    to the bin subdirectory of your installation directory, can
    be used to look up host names from logged IP addresses offline.
 

    This directive enables RFC1413-compliant logging of the
    remote user name for each connection, where the client machine
    runs identd or something similar. This information is logged in
    the access log.
    The information should not be trusted in any way except for
    rudimentary usage tracking.
    Note that this can cause serious latency problems accessing
    your server since every request requires one of these lookups
    to be performed. When firewalls are involved each lookup might
    possibly fail and add 30 seconds of latency to each hit. So in
    general this is not very useful on public servers accessible
    from the Internet.
 

    The <IfDefine test>...</IfDefine>
     section is used to mark directives that are conditional. The
    directives within an <IfDefine>
    section are only processed if the test is true. If 
    test is false, everything between the start and end markers is
    ignored.
    The test in the <IfDefine> section directive can be one of two forms:
    
      - parameter-name
- !parameter-name
In the former case, the directives between the start and end
    markers are only processed if the parameter named
    parameter-name is defined. The second format reverses
    the test, and only processes the directives if
    parameter-name is not defined.
    The parameter-name argument is a define as given on
    the httpd command line via -Dparameter-
    , at the time the server was started.
    <IfDefine> sections are
    nest-able, which can be used to implement simple
    multiple-parameter tests. Example:
    
      httpd -DReverseProxy ...
      
      # httpd.conf
      <IfDefine ReverseProxy>
      
        LoadModule rewrite_module modules/mod_rewrite.so
        LoadModule proxy_module   modules/libproxy.so
      
      </IfDefine>
    
 

| Description: | Encloses directives that are processed conditional on the
presence or absence of a specific module | 
|---|
| Syntax: | <IfModule [!]module-name> ...
    </IfModule> | 
|---|
| Context: | server config, virtual host, directory, .htaccess | 
|---|
| Override: | All | 
|---|
| Status: | Core | 
|---|
| Module: | core | 
|---|
    The <IfModule test>...</IfModule>
    section is used to mark directives that are conditional on the presence of
    a specific module. The directives within an <IfModule> section are only processed if the test
    is true. If test is false, everything between the start and
    end markers is ignored.
    The test in the <IfModule> section directive can be one of two forms:
    
    In the former case, the directives between the start and end
    markers are only processed if the module named module
    name is included in Apache -- either compiled in or
    dynamically loaded using LoadModule. The second format reverses the test,
    and only processes the directives if module name is
    not included.
    The module name argument is the file name of the
    module, at the time it was compiled.  For example,
    mod_rewrite.c.  If a module consists of several
    source files, use the name of the file containing the string
    STANDARD20_MODULE_STUFF.
    <IfModule> sections are
    nest-able, which can be used to implement simple multiple-module
    tests.
    This section should only be used if you need to have one
    configuration file that works whether or not a specific module
    is available. In normal operation, directives need not be
    placed in <IfModule>
    sections.
 

    This directive allows inclusion of other configuration files
    from within the server configuration files.
    Shell-style (fnmatch()) wildcard characters can be used to
    include several files at once, in alphabetical order. In
    addition, if Include points to a directory,
    rather than a file, Apache will read all files in that directory
    and any subdirectory.  But including entire directories is not
    recommended, because it is easy to accidentally leave temporary
    files in a directory that can cause httpd to
    fail.
    The file path specified may be an absolute path (i.e.
    starting with a slash), or may be relative to the
    ServerRoot directory.
    Examples:
    
      Include /usr/local/apache2/conf/ssl.conf
      Include /usr/local/apache2/conf/vhosts/*.conf
    
Or, providing paths relative to your ServerRoot directory:
    
      Include conf/ssl.conf
      Include conf/vhosts/*.conf
    
Running apachectl configtest will give you a list
    of the files that are being processed during the configuration
    check:
    
      root@host# apachectl configtest
      Processing config file: /usr/local/apache2/conf/ssl.conf
      Processing config file: /usr/local/apache2/conf/vhosts/vhost1.conf
      Processing config file: /usr/local/apache2/conf/vhosts/vhost2.conf
      Syntax OK
    
See also
 

    The Keep-Alive extension to HTTP/1.0 and the persistent
    connection feature of HTTP/1.1 provide long-lived HTTP sessions
    which allow multiple requests to be sent over the same TCP
    connection. In some cases this has been shown to result in an
    almost 50% speedup in latency times for HTML documents with
    many images. To enable Keep-Alive connections, set
    KeepAlive On.
    For HTTP/1.0 clients, Keep-Alive connections will only be
    used if they are specifically requested by a client. In
    addition, a Keep-Alive connection with an HTTP/1.0 client can
    only be used when the length of the content is known in
    advance. This implies that dynamic content such as CGI output,
    SSI pages, and server-generated directory listings will
    generally not use Keep-Alive connections to HTTP/1.0 clients.
    For HTTP/1.1 clients, persistent connections are the default
    unless otherwise specified. If the client requests it, chunked
    encoding will be used in order to send content of unknown
    length over persistent connections.
See also
 

    The number of seconds Apache will wait for a subsequent
    request before closing the connection. Once a request has been
    received, the timeout value specified by the
    Timeout directive applies.
    Setting KeepAliveTimeout to a high value
    may cause performance problems in heavily loaded servers. The
    higher the timeout, the more server processes will be kept
    occupied waiting on connections with idle clients.
 

    Access controls are normally effective for
    all access methods, and this is the usual
    desired behavior. In the general case, access control
    directives should not be placed within a
    <Limit> section.
    The purpose of the <Limit>
    directive is to restrict the effect of the access controls to the
    nominated HTTP methods. For all other methods, the access
    restrictions that are enclosed in the <Limit> bracket will have no
    effect. The following example applies the access control
    only to the methods POST, PUT, and
    DELETE, leaving all other methods unprotected:
    
      <Limit POST PUT DELETE>
      
        Require valid-user
      
      </Limit>
    
The method names listed can be one or more of: GET,
    POST, PUT, DELETE,
    CONNECT, OPTIONS,
    PATCH, PROPFIND, PROPPATCH,
    MKCOL, COPY, MOVE,
    LOCK, and UNLOCK. The method name is
    case-sensitive. If GET is used it will also
    restrict HEAD requests. The TRACE method
    cannot be limited.
    A 
<LimitExcept> section should always be
    used in preference to a 
<Limit> section when restricting access,
    since a 
<LimitExcept> section provides protection
    against arbitrary methods.
 

    <LimitExcept> and
    </LimitExcept> are used to enclose
    a group of access control directives which will then apply to any
    HTTP access method not listed in the arguments;
    i.e., it is the opposite of a <Limit> section and can be used to control
    both standard and nonstandard/unrecognized methods. See the
    documentation for <Limit> for more details.
    For example:
    
      <LimitExcept POST GET>
      
        Require valid-user
      
      </LimitExcept>
    
 

    An internal redirect happens, for example, when using the Action directive, which internally
    redirects the original request to a CGI script. A subrequest is Apache's
    mechanism to find out what would happen for some URI if it were requested.
    For example, mod_dir uses subrequests to look for the
    files listed in the DirectoryIndex
    directive.
    LimitInternalRecursion prevents the server
    from crashing when entering an infinite loop of internal redirects or
    subrequests. Such loops are usually caused by misconfigurations.
    The directive stores two different limits, which are evaluated on
    per-request basis. The first number is the maximum number of
    internal redirects, that may follow each other. The second number
    determines, how deep subrequests may be nested. If you specify only one
    number, it will be assigned to both limits.
    Example
      LimitInternalRecursion 5
    
 

    This directive specifies the number of bytes from 0
    (meaning unlimited) to 2147483647 (2GB) that are allowed in a
    request body.
    The LimitRequestBody directive allows
    the user to set a limit on the allowed size of an HTTP request
    message body within the context in which the directive is given
    (server, per-directory, per-file or per-location). If the client
    request exceeds that limit, the server will return an error
    response instead of servicing the request. The size of a normal
    request message body will vary greatly depending on the nature of
    the resource and the methods allowed on that resource. CGI scripts
    typically use the message body for retrieving form information.
    Implementations of the PUT method will require
    a value at least as large as any representation that the server
    wishes to accept for that resource.
    This directive gives the server administrator greater
    control over abnormal client request behavior, which may be
    useful for avoiding some forms of denial-of-service
    attacks.
    If, for example, you are permitting file upload to a particular
    location, and wish to limit the size of the uploaded file to 100K,
    you might use the following directive:
    
 

    Number is an integer from 0 (meaning unlimited) to
    32767. The default value is defined by the compile-time
    constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as
    distributed).
    The LimitRequestFields directive allows
    the server administrator to modify the limit on the number of
    request header fields allowed in an HTTP request. A server needs
    this value to be larger than the number of fields that a normal
    client request might include. The number of request header fields
    used by a client rarely exceeds 20, but this may vary among
    different client implementations, often depending upon the extent
    to which a user has configured their browser to support detailed
    content negotiation. Optional HTTP extensions are often expressed
    using request header fields.
    This directive gives the server administrator greater
    control over abnormal client request behavior, which may be
    useful for avoiding some forms of denial-of-service attacks.
    The value should be increased if normal clients see an error
    response from the server that indicates too many fields were
    sent in the request.
    For example:
    
 

    This directive specifies the number of bytes from 0
    to the value of the compile-time constant
    DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as
    distributed) that will be allowed in an HTTP request
    header.
    The LimitRequestFieldSize directive
    allows the server administrator to reduce the limit on the allowed
    size of an HTTP request header field below the normal input buffer
    size compiled with the server. A server needs this value to be
    large enough to hold any one header field from a normal client
    request. The size of a normal request header field will vary
    greatly among different client implementations, often depending
    upon the extent to which a user has configured their browser to
    support detailed content negotiation.
    This directive gives the server administrator greater
    control over abnormal client request behavior, which may be
    useful for avoiding some forms of denial-of-service attacks.
    For example:
    
      LimitRequestFieldSize 4094
    
Under normal conditions, the value should not be changed from
    the default.
 

    This directive sets the number of bytes from 0 to
    the value of the compile-time constant
    DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed)
    that will be allowed on the HTTP request-line.
    The LimitRequestLine directive allows
    the server administrator to reduce the limit on the allowed size
    of a client's HTTP request-line below the normal input buffer size
    compiled with the server. Since the request-line consists of the
    HTTP method, URI, and protocol version, the
    LimitRequestLine directive places a
    restriction on the length of a request-URI allowed for a request
    on the server. A server needs this value to be large enough to
    hold any of its resource names, including any information that
    might be passed in the query part of a GET request.
    This directive gives the server administrator greater
    control over abnormal client request behavior, which may be
    useful for avoiding some forms of denial-of-service attacks.
    For example:
    
    Under normal conditions, the value should not be changed from
    the default.
 

    Limit (in bytes) on maximum size of an XML-based request
    body. A value of 0 will disable any checking.
    Example:
    
 

    The <Location> directive
    limits the scope of the enclosed directives by URL. It is similar to the
    <Directory>
    directive, and starts a subsection which is terminated with a
    </Location> directive. <Location> sections are processed in the
    order they appear in the configuration file, after the <Directory> sections and
    .htaccess files are read, and after the <Files> sections.
    <Location> sections operate
    completely outside the filesystem.  This has several consequences.
    Most importantly, <Location>
    directives should not be used to control access to filesystem
    locations.  Since several different URLs may map to the same
    filesystem location, such access controls may by circumvented.
    When to use <Location>
    Use <Location> to apply
    directives to content that lives outside the filesystem.  For
    content that lives in the filesystem, use <Directory> and <Files>.  An exception is
    <Location />, which is an easy way to 
    apply a configuration to the entire server.
    For all origin (non-proxy) requests, the URL to be matched is a
    URL-path of the form /path/.  No scheme, hostname,
    port, or query string may be included.  For proxy requests, the
    URL to be matched is of the form
    scheme://servername/path, and you must include the
    prefix.
    The URL may use wildcards. In a wild-card string, ? matches
    any single character, and * matches any sequences of
    characters.
    Extended regular
    expressions can also be used, with the addition of the
    ~ character. For example:
    
      <Location ~ "/(extra|special)/data">
    
would match URLs that contained the substring /extra/data
    or /special/data. The directive <LocationMatch> behaves
    identical to the regex version of <Location>.
    The <Location>
    functionality is especially useful when combined with the
    SetHandler
    directive. For example, to enable status requests, but allow them
    only from browsers at foo.com, you might use:
    
      <Location /status>
      
        SetHandler server-status
        Order Deny,Allow
        Deny from all
        Allow from .foo.com
      
      </Location>
    
Note about / (slash)
      The slash character has special meaning depending on where in a
      URL it appears. People may be used to its behavior in the filesystem
      where multiple adjacent slashes are frequently collapsed to a single
      slash (i.e., /home///foo is the same as
      /home/foo). In URL-space this is not necessarily true.
      The <LocationMatch>
      directive and the regex version of <Location> require you to explicitly specify multiple
      slashes if that is your intention.
      For example, <LocationMatch ^/abc> would match
      the request URL /abc but not the request URL 
      //abc. The (non-regex) <Location> directive behaves similarly when used for
      proxy requests. But when (non-regex) <Location> is used for non-proxy requests it will
      implicitly match multiple slashes with a single slash. For example,
      if you specify <Location /abc/def> and the
      request is to /abc//def then it will match.
    See also
 

    The <LocationMatch> directive
    limits the scope of the enclosed directives by URL, in an identical manner
    to <Location>. However,
    it takes a regular expression as an argument instead of a simple
    string. For example:
    
      <LocationMatch "/(extra|special)/data">
    
would match URLs that contained the substring /extra/data
    or /special/data.
See also
 

    LogLevel adjusts the verbosity of the
    messages recorded in the error logs (see ErrorLog directive). The following
    levels are available, in order of decreasing
    significance:
    
      
        | Level | Description | Example | 
      
        | emerg | Emergencies - system is unusable. | "Child cannot open lock file. Exiting" | 
      
        | alert | Action must be taken immediately. | "getpwuid: couldn't determine user name from uid" | 
      
        | crit | Critical Conditions. | "socket: Failed to get a socket, exiting child" | 
      
        | error | Error conditions. | "Premature end of script headers" | 
      
        | warn | Warning conditions. | "child process 1234 did not exit, sending another
        SIGHUP" | 
      
        | notice | Normal but significant condition. | "httpd: caught SIGBUS, attempting to dump core in
        ..." | 
      
        | info | Informational. | "Server seems busy, (you may need to increase
        StartServers, or Min/MaxSpareServers)..." | 
      
        | debug | Debug-level messages | "Opening config file ..." | 
    
    When a particular level is specified, messages from all
    other levels of higher significance will be reported as well.
    E.g., when LogLevel info is specified,
    then messages with log levels of notice and
    warn will also be posted.
    Using a level of at least crit is
    recommended.
    For example:
    
    Note
      When logging to a regular file messages of the level
      notice cannot be suppressed and thus are always
      logged. However, this doesn't apply when logging is done
      using syslog.
     

    The MaxKeepAliveRequests directive
    limits the number of requests allowed per connection when
    KeepAlive is on. If it is
    set to 0, unlimited requests will be allowed. We
    recommend that this setting be kept to a high value for maximum
    server performance.
    For example:
    
 

    The NameVirtualHost directive is a
    required directive if you want to configure name-based virtual hosts.
    Although addr can be hostname it is recommended
    that you always use an IP address, e.g.
    
      NameVirtualHost 111.22.33.44
    
With the NameVirtualHost directive you
    specify the IP address on which the server will receive requests
    for the name-based virtual hosts. This will usually be the address
    to which your name-based virtual host names resolve. In cases
    where a firewall or other proxy receives the requests and forwards
    them on a different IP address to the server, you must specify the
    IP address of the physical interface on the machine which will be
    servicing the requests. If you have multiple name-based hosts on
    multiple addresses, repeat the directive for each address.
    Note
      Note, that the "main server" and any _default_ servers
      will never be served for a request to a
      NameVirtualHost IP Address (unless for some
      reason you specify NameVirtualHost but then
      don't define any VirtualHosts for that
      address).
    Optionally you can specify a port number on which the
    name-based virtual hosts should be used, e.g.
    
      NameVirtualHost 111.22.33.44:8080
    
IPv6 addresses must be enclosed in square brackets, as shown
    in the following example:
    
      NameVirtualHost [fe80::a00:20ff:fea7:ccea]:8080
    
To receive requests on all interfaces, you can use an argument of
    *
    
    Argument to <VirtualHost>
      directive
      Note that the argument to the <VirtualHost> directive must
      exactly match the argument to the NameVirtualHost directive.
      
        NameVirtualHost 1.2.3.4
        <VirtualHost 1.2.3.4>
        # ...
        </VirtualHost>
      
See also
 

    The Options directive controls which
    server features are available in a particular directory.
    option can be set to None, in which
    case none of the extra features are enabled, or one or more of
    the following:
    
      - All
- All options except for MultiViews. This is the default
      setting.
- ExecCGI
- 
      Execution of CGI scripts using mod_cgiis permitted.
- FollowSymLinks
- 
      The server will follow symbolic links in this directory.
      
      Even though the server follows the symlink it does not
      change the pathname used to match against <Directory>sections.
 Note also, that this option gets ignored if set
      inside a <Location>section.
 
 
- Includes
- 
      Server-side includes provided by mod_includeare permitted.
- IncludesNOEXEC
- 
      Server-side includes are permitted, but the #exec
      cmdand#exec cgiare disabled. It is still
      possible to#include virtualCGI scripts fromScriptAliased
      directories.
- Indexes
- 
      If a URL which maps to a directory is requested, and there
      is no DirectoryIndex(e.g.,index.html) in that directory, thenmod_autoindexwill return a formatted listing
      of the directory.
- MultiViews
- 
      Content negotiated
      "MultiViews" are allowed using
      mod_negotiation.
- SymLinksIfOwnerMatch
- The server will only follow symbolic links for which the
      target file or directory is owned by the same user id as the
      link.
      Note This option gets ignored if
      set inside a  <Location> section. 
Normally, if multiple Options could
    apply to a directory, then the most specific one is used and
    others are ignored; the options are not merged. (See how sections are merged.)
    However if all the options on the
    Options directive are preceded by a
    + or - symbol, the options are
    merged. Any options preceded by a + are added to the
    options currently in force, and any options preceded by a
    - are removed from the options currently in
    force. 
    For example, without any + and - symbols:
    
      <Directory /web/docs>
      
        Options Indexes FollowSymLinks
      
      </Directory>
      
      <Directory /web/docs/spec>
      
        Options Includes
      
      </Directory>
    
then only Includes will be set for the
    /web/docs/spec directory. However if the second
    Options directive uses the + and
    - symbols:
    
      <Directory /web/docs>
      
        Options Indexes FollowSymLinks
      
      </Directory>
      
      <Directory /web/docs/spec>
      
        Options +Includes -Indexes
      
      </Directory>
    
then the options FollowSymLinks and
    Includes are set for the /web/docs/spec
    directory.
    Note
      Using -IncludesNOEXEC or
      -Includes disables server-side includes completely
      regardless of the previous setting.
    The default in the absence of any other settings is
    All.
 

    This directive selects which authenticated users can access
    a directory. The allowed syntaxes are:
    
      - Require user userid [userid]
      ...
- Only the named users can access the resource.
- Require group group-name [group-name]
      ...
- Only users in the named groups can access the resource.
- Require valid-user
- All valid users can access the resource.
Require must be accompanied by
    AuthName and AuthType directives, and directives such
    as AuthUserFile
    and AuthGroupFile (to
    define users and groups) in order to work correctly. Example:
    
       AuthType Basic
       AuthName "Restricted Directory"
       AuthUserFile /web/users
       AuthGroupFile /web/groups
       Require group admin
    
Access controls which are applied in this way are effective for
    all methods. This is what is normally
    desired. If you wish to apply access controls only to
    specific methods, while leaving other methods unprotected, then
    place the Require statement into a
    <Limit>
    section.
See also
 

    Takes 1 or 2 parameters. The first parameter sets the soft
    resource limit for all processes and the second parameter sets
    the maximum resource limit. Either parameter can be a number,
    or max to indicate to the server that the limit should
    be set to the maximum allowed by the operating system
    configuration. Raising the maximum resource limit requires that
    the server is running as root, or in the initial startup
    phase.
    This applies to processes forked off from Apache children
    servicing requests, not the Apache children themselves. This
    includes CGI scripts and SSI exec commands, but not any
    processes forked off from the Apache parent such as piped
    logs.
    CPU resource limits are expressed in seconds per
    process.
See also
 

    Takes 1 or 2 parameters. The first parameter sets the soft
    resource limit for all processes and the second parameter sets
    the maximum resource limit. Either parameter can be a number,
    or max to indicate to the server that the limit should
    be set to the maximum allowed by the operating system
    configuration. Raising the maximum resource limit requires that
    the server is running as root, or in the initial startup
    phase.
    This applies to processes forked off from Apache children
    servicing requests, not the Apache children themselves. This
    includes CGI scripts and SSI exec commands, but not any
    processes forked off from the Apache parent such as piped
    logs.
    Memory resource limits are expressed in bytes per
    process.
See also
 

    Takes 1 or 2 parameters. The first parameter sets the soft
    resource limit for all processes and the second parameter sets
    the maximum resource limit. Either parameter can be a number,
    or max to indicate to the server that the limit
    should be set to the maximum allowed by the operating system
    configuration. Raising the maximum resource limit requires that
    the server is running as root, or in the initial startup
    phase.
    This applies to processes forked off from Apache children
    servicing requests, not the Apache children themselves. This
    includes CGI scripts and SSI exec commands, but not any
    processes forked off from the Apache parent such as piped
    logs.
    Process limits control the number of processes per user.
    Note
      If CGI processes are not running
      under userids other than the web server userid, this directive
      will limit the number of processes that the server itself can
      create. Evidence of this situation will be indicated by
      cannot fork messages in the
      error_log.
    See also
 

    Access policy if both Allow and Require used. The parameter can be
    either All or Any. This directive is only
    useful if access to a particular area is being restricted by both
    username/password and client host address. In this case
    the default behavior (All) is to require that the client
    passes the address access restriction and enters a valid
    username and password. With the Any option the client will be
    granted access if they either pass the host restriction or enter a
    valid username and password. This can be used to password restrict
    an area, but to let clients from particular addresses in without
    prompting for a password.
    For example, if you wanted to let people on your network have
    unrestricted access to a portion of your website, but require that
    people outside of your network provide a password, you could use a
    configuration similar to the following:
    
      Require valid-user
      Allow from 192.168.1
      Satisfy Any
    
See also
 

    This directive is used to control how Apache finds the
    interpreter used to run CGI scripts. The default setting is
    Script. This causes Apache to use the interpreter pointed to
    by the shebang line (first line, starting with #!) in the
    script. On Win32 systems this line usually looks like:
    
    or, if perl is in the PATH, simply:
    
    Setting ScriptInterpreterSource Registry will
    cause the Windows Registry tree HKEY_CLASSES_ROOT to be
    searched using the script file extension (e.g., .pl) as a
    search key. The command defined by the registry subkey
    Shell\ExecCGI\Command or, if it does not exist, by the subkey
    Shell\Open\Command is used to open the script file. If the
    registry keys cannot be found, Apache falls back to the behavior of the
    Script option.
    Security
    Be careful when using ScriptInterpreterSource
    Registry with ScriptAlias'ed directories, because
    Apache will try to execute every file within this
    directory. The Registry setting may cause undesired
    program calls on files which are typically not executed. For
    example, the default open command on .htm files on
    most Windows systems will execute Microsoft Internet Explorer, so
    any HTTP request for an .htm file existing within the
    script directory would start the browser in the background on the
    server. This is a good way to crash your system within a minute or
    so.
    The option Registry-Strict which is new in Apache
    2.0 does the same thing as Registry but uses only the
    subkey Shell\ExecCGI\Command. The
    ExecCGI key is not a common one. It must be
    configured manually in the windows registry and hence prevents
    accidental program calls on your system.
 

    The ServerAdmin sets the e-mail address
    that the server includes in any error messages it returns to the
    client.
    It may be worth setting up a dedicated address for this, e.g.
    
      ServerAdmin www-admin@foo.example.com
    
as users do not always mention that they are talking about the
    server!
 
    The ServerAlias directive sets the
    alternate names for a host, for use with name-based virtual hosts.
    
      <VirtualHost *>
      ServerName server.domain.com
      ServerAlias server server2.domain.com server2
      # ...
      </VirtualHost>
    
See also
 

| Description: | Hostname and port that the server uses to identify
itself | 
|---|
| Syntax: | ServerName fully-qualified-domain-name[:port] | 
|---|
| Context: | server config, virtual host | 
|---|
| Status: | Core | 
|---|
| Module: | core | 
|---|
| Compatibility: | In version 2.0, this
     directive supersedes the functionality of the Portdirective from version 1.3. | 
|---|
    The ServerName directive sets the hostname and
    port that the server uses to identify itself.  This is used when
    creating redirection URLs. For example, if the name of the
    machine hosting the webserver is simple.example.com,
    but the machine also has the DNS alias www.example.com
    and you wish the webserver to be so identified, the following
    directive should be used:
    
      ServerName www.example.com:80
    
If no ServerName is specified, then the
    server attempts to deduce the hostname by performing a reverse
    lookup on the IP address. If no port is specified in the
    servername, then the server will use the port from the incoming
    request. For optimal reliability and predictability, you should
    specify an explicit hostname and port using the
    ServerName directive.
    If you are using name-based virtual hosts,
    the ServerName inside a
    <VirtualHost>
    section specifies what hostname must appear in the request's
    Host: header to match this virtual host.
    See the description of the
    UseCanonicalName directive for
    settings which determine whether self-referential URL's (e.g., by the
    mod_dir module) will refer to the
    specified port, or to the port number given in the client's request.
    
See also
 

    The ServerRoot directive sets the
    directory in which the server lives. Typically it will contain the
    subdirectories conf/ and logs/. Relative
    paths for other configuration files are taken as relative to this
    directory.
    Example
      ServerRoot /home/httpd
    
See also
 

    The ServerSignature directive allows the
    configuration of a trailing footer line under server-generated
    documents (error messages, mod_proxy ftp directory
    listings, mod_info output, ...). The reason why you
    would want to enable such a footer line is that in a chain of proxies,
    the user often has no possibility to tell which of the chained servers
    actually produced a returned error message.
    The Off
    setting, which is the default, suppresses the footer line (and is
    therefore compatible with the behavior of Apache-1.2 and
    below). The On setting simply adds a line with the
    server version number and ServerName of the serving virtual host,
    and the EMail setting additionally creates a
    "mailto:" reference to the ServerAdmin of the referenced
    document.
    After version 2.0.44, the details of the server version number
    presented are controlled by the ServerTokens directive.
See also
 

    This directive controls whether Server response
    header field which is sent back to clients includes a
    description of the generic OS-type of the server as well as
    information about compiled-in modules.
    
      - ServerTokens Prod[uctOnly]
- Server sends (e.g.): Server:
      Apache
- ServerTokens Major
- Server sends (e.g.): Server:
      Apache/2
- ServerTokens Minor
- Server sends (e.g.): Server:
      Apache/2.0
- ServerTokens Min[imal]
- Server sends (e.g.): Server:
      Apache/2.0.41
- ServerTokens OS
- Server sends (e.g.): Server: Apache/2.0.41
      (Unix)
- ServerTokens Full(or not specified)
- Server sends (e.g.): Server: Apache/2.0.41
      (Unix) PHP/4.2.2 MyMod/1.2
This setting applies to the entire server, and cannot be
    enabled or disabled on a virtualhost-by-virtualhost basis.
    After version 2.0.44, this directive also controls the
    information presented by the ServerSignature directive.
See also
 

    When placed into an .htaccess file or a
    <Directory> or
    <Location>
    section, this directive forces all matching files to be parsed
    through the handler given by
    handler-name. For example, if you had a directory you
    wanted to be parsed entirely as imagemap rule files, regardless
    of extension, you might put the following into an
    .htaccess file in that directory:
    
    Another example: if you wanted to have the server display a
    status report whenever a URL of
    http://servername/status was called, you might put
    the following into httpd.conf:
    
      <Location /status>
      
        SetHandler server-status
      
      </Location>
    
You can override an earlier defined SetHandler
    directive by using the value None.
See also
 

    The SetInputFilter directive sets the
    filter or filters which will process client requests and POST
    input when they are received by the server. This is in addition to
    any filters defined elsewhere, including the
    AddInputFilter
    directive.
    If more than one filter is specified, they must be separated
    by semicolons in the order in which they should process the
    content.
See also
 

    The SetOutputFilter directive sets the filters
    which will process responses from the server before they are
    sent to the client. This is in addition to any filters defined
    elsewhere, including the
    AddOutputFilter
    directive.
    For example, the following configuration will process all files
    in the /www/data/ directory for server-side
    includes.
    
      <Directory /www/data/>
      
        SetOutputFilter INCLUDES
      
      </Directory>
    
If more than one filter is specified, they must be separated
    by semicolons in the order in which they should process the
    content.
See also
 

    The TimeOut directive currently defines
    the amount of time Apache will wait for three things:
    
      - The total amount of time it takes to receive a GET
      request.
- The amount of time between receipt of TCP packets on a
      POST or PUT request.
- The amount of time between ACKs on transmissions of TCP
      packets in responses.
We plan on making these separately configurable at some point
    down the road. The timer used to default to 1200 before 1.2,
    but has been lowered to 300 which is still far more than
    necessary in most situations. It is not set any lower by
    default because there may still be odd places in the code where
    the timer is not reset when a packet is sent. 
 

    In many situations Apache must construct a self-referential
    URL -- that is, a URL that refers back to the same server. With
    UseCanonicalName On Apache will use the hostname and port
    specified in the ServerName
    directive to construct the canonical name for the server. This name
    is used in all self-referential URLs, and for the values of
    SERVER_NAME and SERVER_PORT in CGIs.
    With UseCanonicalName Off Apache will form
    self-referential URLs using the hostname and port supplied by
    the client if any are supplied (otherwise it will use the
    canonical name, as defined above). These values are the same
    that are used to implement name based virtual hosts,
    and are available with the same clients. The CGI variables
    SERVER_NAME and SERVER_PORT will be
    constructed from the client supplied values as well.
    An example where this may be useful is on an intranet server
    where you have users connecting to the machine using short
    names such as www. You'll notice that if the users
    type a shortname, and a URL which is a directory, such as
    http://www/splat, without the trailing
    slash then Apache will redirect them to
    http://www.domain.com/splat/. If you have
    authentication enabled, this will cause the user to have to
    authenticate twice (once for www and once again
    for www.domain.com -- see the
    FAQ on this subject for more information). But if
    UseCanonicalName is set Off, then
    Apache will redirect to http://www/splat/.
    There is a third option, UseCanonicalName DNS,
    which is intended for use with mass IP-based virtual hosting to
    support ancient clients that do not provide a
    Host: header. With this option Apache does a
    reverse DNS lookup on the server IP address that the client
    connected to in order to work out self-referential URLs.
    Warning
    If CGIs make assumptions about the values of SERVER_NAME
    they may be broken by this option. The client is essentially free
    to give whatever value they want as a hostname. But if the CGI is
    only using SERVER_NAME to construct self-referential URLs
    then it should be just fine.
    See also
 

    <VirtualHost> and
    </VirtualHost> are used to enclose a group of
    directives that will apply only to a particular virtual host. Any
    directive that is allowed in a virtual host context may be
    used. When the server receives a request for a document on a
    particular virtual host, it uses the configuration directives
    enclosed in the <VirtualHost>
    section. Addr can be:
    
      - The IP address of the virtual host;
- A fully qualified domain name for the IP address of the
      virtual host;
- The character *, which is used only in combination withNameVirtualHost *to match all IP addresses; or
- The string _default_, which is used only
      with IP virtual hosting to catch unmatched IP addresses.
Example
      <VirtualHost 10.1.2.3>
      
        ServerAdmin webmaster@host.foo.com
        DocumentRoot /www/docs/host.foo.com
        ServerName host.foo.com
        ErrorLog logs/host.foo.com-error_log
        TransferLog logs/host.foo.com-access_log
      
      </VirtualHost>
    
IPv6 addresses must be specified in square brackets because
    the optional port number could not be determined otherwise.  An
    IPv6 example is shown below:
    
      <VirtualHost [fe80::a00:20ff:fea7:ccea]>
      
        ServerAdmin webmaster@host.example.com
        DocumentRoot /www/docs/host.example.com
        ServerName host.example.com
        ErrorLog logs/host.example.com-error_log
        TransferLog logs/host.example.com-access_log
      
      </VirtualHost>
    
Each Virtual Host must correspond to a different IP address,
    different port number or a different host name for the server,
    in the former case the server machine must be configured to
    accept IP packets for multiple addresses. (If the machine does
    not have multiple network interfaces, then this can be
    accomplished with the ifconfig alias command -- if
    your OS supports it).
    Note
    The use of <VirtualHost> does
    not affect what addresses Apache listens on. You
    may need to ensure that Apache is listening on the correct addresses
    using Listen.
    When using IP-based virtual hosting, the special name
    _default_ can be specified in
    which case this virtual host will match any IP address that is
    not explicitly listed in another virtual host. In the absence
    of any _default_ virtual host the "main" server config,
    consisting of all those definitions outside any VirtualHost
    section, is used when no IP-match occurs.  (But note that any IP
    address that matches a NameVirtualHost directive will use neither
    the "main" server config nor the _default_ virtual host.
    See the name-based virtual hosting
    documentation for further details.)
    You can specify a :port to change the port that is
    matched. If unspecified then it defaults to the same port as the
    most recent Listen
    statement of the main server. You may also specify :*
    to match all ports on that address. (This is recommended when used
    with _default_.)
    Security
    See the security tips
    document for details on why your security could be compromised if the
    directory where logfiles are stored is writable by anyone other
    than the user that starts the server.
    See also