52
CustomLog:
This entry is used to log requests to the server. The first
parameter is either a file (file to which the requests should be logged) or a
pipe ('|') followed by the path to a program to receive the log information
on its standard input. This feature is used for spawning the
rotatelogs
(see the
rotatelogs
entry in this section) utility so that the log file is
actually rotated and not written to an ever growing file.
The second parameter specifies what will be written to the log file, and is
defined under a previous
LogFormat
directive.
Below is an example of an entry in the
access.log
file:
10.128.131.224 - - [18/Apr/2002:14:06:36 +0300]
/fsmsa/
fsmsa.dll?FSMSCommand=ReadPackage&Type=27&SessionID=248 HTTP/
1.1"
200 5299 0 - 0 - "FSA/5.10.2211 1.3.1_02 Windows2000/5.0 x86"
mod_gzip: DECHUNK:DECLINED:TOO_SMALL CR:0pct.
10.128.131.224 - - [18/Apr/2002:14:06:36 +0300]
tells you when the
request to the server was made and by which host (described by its IP
address).
The
fxnext
component informs you which module the command sent to
/
fsmsa/fsmsa.dll
.
This module
(fsmsa.dll)
is the Admin Module.
fsmsh.dll
would be the Host Module.
Then come the command and parameters
FSMSCommand=ReadPackage&Type=27&SessionID=248
. In this case the
host requested an object of Type 27 (there is only one).
The HTTP version used is also noted
HTTP/1.1
Immediately after the http version comes six different numbers, as
follows:
1. HTTP response code: In this example
200
is used, meaning OK in
HTTP specification. There are other codes, all of them covered under
the HTTP specification that can be obtained from
http://www.w3.org.
2. Bytes transferred from the server: The example entry informs of 5299
bytes transferred.
3. How long the server took to serve the request (in seconds).
4. Connection status when response is completed.
Summary of Contents for POLICY MANAGER 8.0
Page 1: ...F Secure Policy Manager 8 0 Administrator s Guide...
Page 8: ...viii Contact Information 213 Glossary 214 About F Secure Corporation...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 17 Features 18 Policy Based Management 19...
Page 23: ...23 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 24 F Secure Policy Manager Console 25...
Page 41: ...CHAPTER3 41 Installing F Secure Policy Manager Server Click Next to continue...
Page 60: ...60 Step 4 Select F Secure Policy Manager Console Click Next to continue...
Page 64: ...64 Step 8 Click Finish to close the installer...
Page 182: ...182 10 F SECURE POLICY MANAGER PROXY Overview 183...
Page 198: ...198 B Ilaunchr Error Codes Overview 199 Error Codes 200...
Page 207: ...207 D NSC Notation for Netmasks Overview 208...
Page 214: ...214 GLOSSARY...
Page 221: ......