Tags: IIS

Web Farm Framework Architecture

I am very excited about the Web Farm Framework (WFF). Having administered many web farms in my past, this technology resolves a lot of the activities which where a burden. This blog will show a standard architectural configuration of a WFF environment. Figure 1 shows the controller server, the primary server and the multiple secondary […]

Read More →

Enable and Activate Failed Request Tracing Rules

IIS Benjamin Perkins

There is a new troubleshooting capability available in IIS 7, it is called Failed Request Tracing Rules. It provides a lot of very useful information which can help pinpoint the cause of performance problem or error. At the moment it is not installed by default and you may see the setting as shown in Figure […]

Read More →

Modifying IIS 6 log data in Windows 2003

IIS Benjamin Perkins

All IIS logging properties are not selected by default. Some of them, which are not selected by default can add some valuable information when troubleshooting performance or availability issues. To modify the properties which IIS 6 logs, first select the web site which you want to log and select properties as show in Figure 1. […]

Read More →

Modify the Request Queue Limit, requestQueueLimit or Queue Length in IIS

IIS Benjamin Perkins

When optimizing and tuning an ASP.NET application you may want to increase the value of the requestQueueLimit. The requestQueueLimit is the maximum number of requests that can be queued by an ASP.NET process before errors get returned to the client. Modify Request Queue Limit within the Aspnet.config Below, the requestQueueLimit is configured in the Aspnet.config […]

Read More →

Kerberos authPersistNonNTLM authentication, request based vs. session based authentication

IIS Benjamin Perkins

Kerberos is a request based authentication protocol. That means with each request, there is a resulting authentication step. See the following figure 1 where you notice a Ticket request for each GET Http Command. Figure 1, Network Monitor log for request based authentication This article covers the implementation of the authPersistNonNTLM attribute, that when set […]

Read More →

Integrated Windows Authentication with NTLM

IIS Benjamin Perkins

IIS provides a number of different authentication techniques. One of which is Integrated Windows Authentication. Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication flow between Internet Explorer and IIS version 6+. The initial request […]

Read More →

Integrated Windows Authentication with Negotiate

IIS Benjamin Perkins

IIS provides a number of different authentication techniques. One of which is Integrated Windows Authentication. Integrated Windows Authentication utilizes Negotiate/Kerberos or NTLM to authenticate users based on an encrypted ticket/message passed between a browser and a server. The preceding image shows a standard communication flow between Internet Explorer and IIS version 6+. The initial request […]

Read More →

Create an IIS configuration backup

IIS Benjamin Perkins

The first step to take when making changes to a system is to backup what you currently have so that if there are problems with the system after the changes have applied, you have time constraints and can’t get the system to work, then you have at least a backup of the systems state to […]

Read More →