
APPENDIX C
305
Access Log Variables
C.1
List of Access Log Variables
You can use the following variables in the access log:
Format String
Description
%a
The remote IP address.
%A
The local IP address.
%B
Bytes sent, excluding HTTP headers. When
no bytes are sent, the value is ‘
0
’.
%b
Bytes sent in CLF format, excluding HTTP
headers. When no bytes are sent, the value
is ‘
-
’.
%{Example}C
The contents of cookie ‘
Example
’ in the
request sent to the server.
%D
The time taken to serve the request, in
microseconds.
%{EXAMPLE}e
The contents of the environment variable
‘
EXAMPLE
’.
%f
The file name.
%h
The remote host.
%H
The request protocol.
%{Example}i
The contents of ‘
Example
’: header line(s) in
the request sent to the server.
%l
The remote log name.
%m
The request method.
%{Example}n
The contents of a note ‘
Example
’ from
another module.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...