Show TOC

Virtual Hosts: Application ExampleLocate this document in the navigation structure


This example's use of different virtual hosts to separate access from the Intranet and access from the Internet only refers to formal technical aspects. To secure your system adequately against unauthorized external access (from the Internet), we strongly recommend that you configure an appropriate separate firewall.


A company called ACME has a host computer. The host has two network cards and two IP addresses. and

The address connects the host to the ACME intranet, while the address connects the host to the Internet.

These IP addresses are assigned to the host names shown in the table below.


The virtual host in ICF is a name-based host, that is, the hot name is defined by the related header field of the HTTP call.

IP Address

Host Name

If more than one host name is assigned to one IP addess, one host name is the default name, and the others are aliases. In the table, the default name is in bold type.

Now, a virtual host can be set up in transaction SICF for each of the two addresses. Each virtual host has its own HTTP service tree.

For example, you can assign requests coming from the Internet (which arrive via the host name to the default host, and set up a virtual host, internet_host, which contains the services for these Internet requests.

In this example, both servers provide the service sap/bc/ping. If the same HTTP request handler, or an alias, is being used, this can be the same service for both servers. Different services, with different authorizations, access restrictions, and so on, can also exist under the same name (see Creating a Service).

Virtual hosts therefore make it possible to separate the available services at higher levels.

More Information