Q. In the event log, I am getting Accept raw header overflow.
A. This means that the http header (which is the part of an http request that comes before the content of the request) is more than 4k in length. Conventionally, URL's are less than 2k in length.
So long as the username/password credentials are in the first 4k (which is always the case) then the AuthentiX filter will be able to validate and accept the user.
This overflow can usually only happen if you are using a "GET" to post a form, in which case all the form fields are put into the URL after the "?" as the query part of the URL.
It is better to use the "POST" method for submitting forms, in which case the form fields come after the header part, and won't overflow the header.
Version 5.2c and above outputs the offending request in the Event Log, to better help you track down the problem.
Potentially, this message indicates a cracking attack on your server. You may find that the server crashes shortly after such an attack. Check your service packs. :-(
Some upload programs can cause this error. Turning off "HTTP Keep-Alives" can resolve this issue in this case.