Cisco Cisco Web Security Appliance S160 Guía Del Usuario
21-29
AsyncOS 9.0 for Cisco Web Security Appliances User Guide
Chapter 21 Monitor System Activity Through Logs
Log File Fields and Tags
Access Log Format Specifiers and W3C Log File Fields
Log files use variables to represent the individual items of information that make up each log file entry.
These variables are called format specifiers in Access logs and log fields in W3C logs and each format
specifier has a corresponding log field.
These variables are called format specifiers in Access logs and log fields in W3C logs and each format
specifier has a corresponding log field.
The following table describes these variables:
Format Specifier in
Access Logs
Access Logs
Log Field in W3C Logs
Description
%:<1
x-p2s-first-byte-time
The time it takes from the moment the Web Proxy
starts connecting to the server to the time it is first
able to write to the server. If the Web Proxy has to
connect to several servers to complete the
transaction, it is the sum of those times.
starts connecting to the server to the time it is first
able to write to the server. If the Web Proxy has to
connect to several servers to complete the
transaction, it is the sum of those times.
%:<a
x-p2p-auth-wait-time
Wait-time to receive the response from the Web
Proxy authentication process, after the Web Proxy
sent the request.
Proxy authentication process, after the Web Proxy
sent the request.
%:<b
x-p2s-body-time
Wait-time to write request body to server after header.
%:<d
x-p2p-dns-wait-time
Time taken by the Web Proxy to send the DNS
request to the Web Proxy DNS process.
request to the Web Proxy DNS process.
%:<h
x-p2s-header-time
Wait-time to write request header to server after
first byte.
first byte.
%:<r
x-p2p-reputation-wait-time Wait-time to receive the response from the Web
Reputation Filters, after the Web Proxy sent
the request.
the request.
%:<s
x-p2p-asw-req-wait-time
Wait-time to receive the verdict from the Web
Proxy anti-spyware process, after the Web Proxy
sent the request.
Proxy anti-spyware process, after the Web Proxy
sent the request.
%:>1
x-s2p-first-byte-time
Wait-time for first response byte from server
%:>a
x-p2p-auth-svc-time
Wait-time to receive the response from the Web
Proxy authentication process, including the time
required for the Web Proxy to send the request.
Proxy authentication process, including the time
required for the Web Proxy to send the request.
%:>b
x-s2p-body-time
Wait-time for complete response body after
header received
header received
%:>c
x-p2p-fetch-time
Time required for the Web Proxy to read a response
from the disk cache.
from the disk cache.
%:>d
x-p2p-dns-svc-time
Time taken by the Web Proxy DNS process to send
back a DNS result to the Web Proxy.
back a DNS result to the Web Proxy.
%:>h
x-s2p-header-time
Wait-time for server header after first response byte
%:>r
x-p2p-reputation-svc-time Wait-time to receive the verdict from the Web
Reputation Filters, including the time required for
the Web Proxy to send the request.
the Web Proxy to send the request.
%:>s
x-p2p-asw-req-svc-time
Wait-time to receive the verdict from the Web Proxy
anti-spyware process, including the time required
for the Web Proxy to send the request.
anti-spyware process, including the time required
for the Web Proxy to send the request.