Enable HTTP/FTP methods

Client requests to the server include a method field that indicates the action that the server is to perform on the specified object.

Following is a list of methods that the proxy server supports and a description of how it responds to a client request containing the method if the method is enabled.

Note:
Some methods are the same for HTTP and for FTP requests. Enabling these methods for HTTP also enables them for FTP.

CONNECT
The CONNECT method allows you to tunnel requests and responses through the proxy server. This applies to forward proxy configurations only.

For information on the format and available options for the Enable CONNECT method, see Configuring SSL tunneling.

DELETE
The proxy server deletes the object identified by the URL. DELETE allows clients to erase files from your Caching Proxy. Use server protection setups to define who can use DELETE and on which files. For details, see Server protection setups.
GET
The proxy server returns whatever data is identified by the URL. If the URL refers to an executable program, the proxy returns the output of the program. This method can be handled over persistent connections.
HEAD
The proxy server returns only the HTTP document header identified by the URL without the document body.
OPTIONS
The proxy server returns information about the communications options on the request-response chain identified by the URL. This method allows a client to determine the options and requirements associated with an object, or the capabilities of a server, without having to act on or retrieve the object.
POST
The request contains data and a URL. The proxy server accepts the data enclosed in the request as a new subordinate of the resource identified in the URL, which processes the data. The resource can be a data-accepting program, a gateway to some other protocol, or a separate program that accepts annotations.

The POST method is designed to handle the annotation of existing resources. Examples include posting a message to a bulletin board, newsgroup, mailing list, or similar group of resources; providing a block of data, for example, from a form to a data-handling program; or extending a database through an append operation. For Caching Proxy, the POST method is used to process the Configuration and Administration forms.

This method can be handled over persistent connections.

PUT
The request contains data and a URL. The proxy server stores the data in the resource identified in the URL. If the resource already exists, PUT replaces it with the data contained in the request. If the resource does not exist, PUT creates it and populates it with the data contained in the request. This method can be handled over persistent connections.

Enabling the PUT method allows files to be written to Caching Proxy by using HTTP and FTP. Because PUT allows clients to write to Caching Proxy, you need to use server-protection setups to define who can use PUT and the files on which PUT can be used. (See Server protection setups.)

TRACE
The proxy server echoes the request message sent by the client. This method allows the client to see what is being received at the other end of the request chain and use that data for testing or diagnostics. The content type of the proxy response is message/http.

Associated directives

The following directives enable HTTP/FTP methods:

For more information, refer to Manually editing the ibmproxy.conf file.

Configuration and Administration forms

The following Configuration and Administration forms edit the values of the associated directives:

Note:
If you disable the POST method, you cannot use the Configuration and Administration forms to configure the Caching Proxy.

For more information, refer to Using the Configuration and Administration forms.