Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Applies To: Forefront Threat Management Gateway (TMG)
The Web Proxy log can include an object source field that specifies the source that was used to retrieve the current object. The following table lists the possible object source values.
Value displayed in SQL Server and SQL Express Server log format | Value displayed in log viewer | Value displayed in text file log format | Description |
---|---|---|---|
0 |
0 |
0 |
No source information is available |
1 |
Cache |
Cache |
Source is the cache. Object returned from cache. |
2 |
Verified cache |
Vcache |
Source is the cache. Object was verified to source and had not been modified. |
3 |
Not Verified Cache |
NVcache |
Source is the cache. Object could not be verified to source. |
4 |
Verify Failed Internet |
VFInet |
Source is the Internet. Cached object was verified to source and had been modified. |
5 |
Internet |
Inet |
Source is the Internet. Object added to cache. |
6 |
Member |
Member |
Returned from another array member. |
7 |
Upstream |
Upstream |
Object returned from an upstream proxy cache. |
8 |
Not Modified |
Not Modified |
Source is the cache. Client performed an IF-MODIFIED-SINCE request and object had not been modified. |