Common Connection Properties
Specify a firewall name or IP address to authenticate requested connections, if necessary.
If this property is set to a domain name, a DNS request is initiated and the name is translated to the corresponding IP address.
A password, if authentication is required to connect through a firewall.
If FirewallServer is specified, the FirewallUser and FirewallPassword properties are used to connect and authenticate to the given firewall.
The TCP port for the firewall FirewallServer -- see the description of the FirewallServer option for details.
Note that the provider sets the FirewallPort to the default port associated with the specified FirewallType. See the description of the FirewallType option for details.
The type of firewall to connect through.
The applicable values are:
Firewall Type Default Firewall Port:
The user name to authenticate with the firewall.
If the FirewallServer is specified, the FirewallUser and FirewallPassword properties are used to connect and authenticate against the firewall.
Proxy Auth Scheme
The proxy server authorization scheme (default: BASIC).
This value may be BASIC, DIGEST, NONE, NTLM, NEGOTIATE or PROPRIETARY.
Proxy Auto Detect
This indicates whether to use the default system proxy settings or not. Set ProxyAutoDetect to FALSE to use custom proxy settings. This takes precedence over other proxy settings.
A password, if authenticating with a proxy server.
If the ProxyServer is specified, the ProxyUser and ProxyPassword properties are used to connect and authenticate against the firewall.
The TCP port for the proxy ProxyServer (default: 80).
If a proxy server is given, then the HTTP request is sent to the proxy instead of the specified server.
If this property is set to a domain name, a DNS request is initiated and the name is translated to the corresponding address.
Proxy SSL Type
The SSL type to use when connecting to the proxy server (default: AUTO).
This value may be AUTO, ALWAYS, NEVER, or TUNNEL.
A user name, if authentication is to be used for the proxy.
If a ProxyServer is specified, the ProxyUser and ProxyPassword options are used to connect and authenticate against the firewall.
A path to the log file.
Max log File Size
A string specifying the maximum size in bytes for a log file (for example, 10 MB). When the limit is hit, a new log is created in the same folder with the date and time appended to the end.
The verbosity level that determines the amount of detail included in the log file.
The verbosity level determines the amount of detail that the provider reports to the Logfile. Verbosity levels from 1 to 5 are supported. These are described below:
1 - Setting Verbosity to 1 will log the query, the number of rows returned by it, the start of execution and the time taken, and any errors.
2 - Setting Verbosity to 2 will log everything included in Verbosity 1, cache queries, and HTTP headers.
3 - Setting Verbosity to 3 will additionally log the body of the HTTP requests.
4 - Setting Verbosity to 4 will additionally log transport-level communication with the data source. This includes SSL negotiation.
5 - Setting Verbosity to 5 will additionally log communication with the data source and additional details that may be helpful in troubleshooting problems. This includes interface commands.
The Verbosity should not be set to greater than 1 for normal operation. Substantial amounts of data can be logged at higher verbosities, which can delay execution times.