How to map .html to asp.dll (IIS7 & IIS 7.5)

There is some bug on IIS 7.5 where the setting on IIS handler mapping not able to function well when it need to edit the existing hander to  use other executable module.  It not a known bug but it do happen based on my testing.

IIS7.5

But we can try do the setting on backend.

CAUTION: Make Sure you have backup all the copy of the file that you edit.

1) go into the C:\Windows\System32\inetsrv\config directory and edit the fileapplicationHost.config (you will need to do this in administrator mode, or do it from a different computer networking over to that server, otherwise Windows will protect that file and won’t allow you to change it.)

2) Scroll all the way to the bottom and look for the section that corresponds to your web site <location path=”Your Web Site”>

3) Change/edit the code block to add in the HANDLERS and HTM map below

<location path="Your Web Site"> 
<system.webServer>
<asp appAllowClientDebug="true" scriptErrorSentToBrowser="true" /> 
<handlers> 
<add name="htm" path="*.htm" verb="*" modules="IsapiModule" scriptProcessor="%windir%\system32\inetsrv\asp.dll" resourceType="File" /> 
</handlers> 
</system.webServer> 
</location>

4) Save it and restart IIS. Bingo.

How to install the PKCS7 SSL Cert in IIS7

If you want to install the SSL cert (PKCS7 type), You may receive the following error

—–BEGIN PKCS7—–

You can ignore this error. Just click cancel. This is a known bug in IIS7.

Solution for this is to import the cert manually.

(1) Start up Cert Manager

-Start > Run: mmc.exe
-Menu: File > Add/Remove Snap-in
-Under Available snap-ins, select Certificates and press Add.
-Select Computer Account for the certificates to manage. Press Next.
-Select Local Computer and press Finish.
-Press OK to return to the management console.

(2)Import the Cert

-Go to Certificates (Local Computer) > Personal > Certificates
-Click on the More Actios on Actions tab on right corner
-All tasks > import > next > select the cert
-Select the option ““Automatically select a certificate store based on the type of certificate” > Finish
– you will see the Cert appear on the list and edit the Friendly name will do

(3)add into the site and edit binding
If you no sure with the step, you can refer to the url  (Edit Bindings section)

CDO.Message.1 error ‘80070005’

When there is error as below when your web application try to send email out

CDO.Message.1 error ‘80070005’

Access is denied.

Solution:
You might need to ensure the mail sending path have the “Everyone”, “Network Service” and “Users” permission and grant to all the subfolder on it.

Install the Intermediate Certificate (IIS6 & IIS7)

(1) Click the Start menu and click Run…. Type mmc in the Run window and click OK to start the Microsoft Management Console (MMC).

(2) In the Management Console, select File then Add/Remove Snap In.

(3) In the Add or Remove Snap-ins dialog, click the Add button and then select Certificates.

(4) Choose Computer Account then click Next.

(5) Choose Local Computer, then click Finish.

(6) Close the Add or Remove Snap-ins dialog and click OK to return to the main MMC window.
If necessary, click the + icon to expand the Certificates folder so that the Intermediate Certification Authorities folder is visible.

(7) Right-click on Intermediate Certification Authorities and choose All Tasks, then click Import.

(8) Follow the wizard prompts to complete the installation procedure.

(9) Click Browse to locate the certificate file. Change the file extension filter in the bottom right corner to be able to select the file. Click Open after selecting the appropriate file.

(10) Click Next in the Certificate Import Wizard.

(11) Choose Place all certificates in the following store; then use the Browse function to locate Intermediate Certification Authorities. Click Next. Click Finish.

Done.

File upload limit in classic ASP on IIS 7

IIS7 ASP default upload file only set to 200kb!!!! Yes, there is true. Now a days, even one image is larger then that. It not a pratical way to leave as 200kb upload for ASP, so below is the method to increase it.

(1) Lauch IIS ( Windows 2008: Go into Administrative tools > server Manager > expand Roles > expand Webserver > click on IIS)

(2) click on the ASP icon

(3) Increase the maxRequestEntityAllowed , the number unit is based on bits.

(4) Increase it and apply it. Done.

Alternative:
short cut, run the command line as below

appcmd set config /section:asp /maxRequestEntityAllowed:104857600

NOTE: The extending of this value may increase the window for DDOS attack