This topic lists the static cache rules for a proxy server. From this topic we can create, delete, or modify a static cache rule.

To view this administrative console topic, click Servers > Proxy Servers > server_name > HTTP Proxy Server Settings > Static cache rules.

The security proxy, or the intermediary that is the entry point into the enterprise, is responsible for terminating SSL connections with the client, authenticating the request, propagating the connection characteristics for the client, and any other credentials to the application server in the enterprise.

The proxy server enables security proxies to be identified so that private headers that are set in the request are propagated as they are to the application servers. Identify the list of security proxies that are trusted by the proxy server using the trusted security proxies field. To access this administrative console field, click Servers > Proxy servers > <server_name> > HTTP proxy server settings > Proxy settings. We can find trusted security proxies in the Security section of this administrative console page.

URI Groups

The URI group name is a user-specified name.

The name field cannot contain the following characters: # \ / , : ; " * ? < > | = + & % '

The name that is defined must be unique among URI groups and cannot begin with a period or a space. A space does not generate an error, but leading and trailing spaces are automatically deleted.

Disable caching for this URI group

Specifies whether or not caching is disabled.

The default is false, which indicates that caching is enabled for the URI group.

Default expiration

The default expiration that you set for the cached response for the URI that is associated with this cache rule.

The default expiration value is in seconds.

Last modified factor

Use this field to derive the cache expiration value for a response if it does not have HTTP expiration headers and when it has a LastModifiedTime header in the response.

Name of the virtual host

A virtual host that is configured using the virtual host service. This virtual host is associated with the proxy server. This attribute is one of the elements in a request that is matched by the proxy server to determine if this rule is activated.



Related tasks
Setting up the proxy server

 



 

 

IBM is a trademark of the IBM Corporation in the United States, other countries, or both.