APPENDIX C
305
Access Log Variables
C.1
List of Access Log Variables
You can use the following variables in the access log:
Format String
Description
%a
The remote IP address.
%A
The local IP address.
%B
Bytes sent, excluding HTTP headers. When
no bytes are sent, the value is ‘
0
’.
%b
Bytes sent in CLF format, excluding HTTP
headers. When no bytes are sent, the value
is ‘
-
’.
%{Example}C
The contents of cookie ‘
Example
’ in the
request sent to the server.
%D
The time taken to serve the request, in
microseconds.
%{EXAMPLE}e
The contents of the environment variable
‘
EXAMPLE
’.
%f
The file name.
%h
The remote host.
%H
The request protocol.
%{Example}i
The contents of ‘
Example
’: header line(s) in
the request sent to the server.
%l
The remote log name.
%m
The request method.
%{Example}n
The contents of a note ‘
Example
’ from
another module.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...