Cisco Cisco Web Security Appliance S170 Guía Del Usuario
20-28
AsyncOS 8.6 for Cisco Web Security Appliances User Guide
Chapter 20 Monitor System Activity Through Logs
Traffic Monitor Log Files
client_IP %a body_bytes %b error_type %E
where
client_IP
is the description token for log format specifier
%a
, and so on.
Note
You can create a custom field for any header in a client request or a server response.
Step 4
Submit and commit your changes.
Related Topics
•
.
•
•
Customizing W3C Access Logs
Step 1
Choose System Administration > Log Subscriptions
Step 2
Click the W3C log file name to edit the W3C log subscription.
Step 3
Type a field in the Custom Field box, and click Add.
The order the fields appear in the Selected Log Fields list determines the order of fields in the W3C
access log file. You can change the order of fields using the Move Up and Move Down buttons. You can
remove a field by selecting it in the Selected Log Fields list and clicking Remove.
access log file. You can change the order of fields using the Move Up and Move Down buttons. You can
remove a field by selecting it in the Selected Log Fields list and clicking Remove.
You can enter multiple user defined fields in the Custom Fields box and add them simultaneously as long
as each entry is separated by a new line (click Enter) before clicking Add.
as each entry is separated by a new line (click Enter) before clicking Add.
When you change the log fields included in a W3C log subscription, the log subscription automatically
rolls over. This allows the latest version of the log file to include the correct new field headers.
rolls over. This allows the latest version of the log file to include the correct new field headers.
Note
You can create a custom field for any header in a client request or a server response.
Step 4
Submit and commit your changes.
Related Topics
•
•
•
Traffic Monitor Log Files
Layer-4 Traffic Monitor log files provides a detailed record of Layer-4 monitoring activity. You can view
Layer-4 Traffic Monitor log file entries to track updates to firewall block lists and firewall allow lists.
Layer-4 Traffic Monitor log file entries to track updates to firewall block lists and firewall allow lists.