This topic lists the static cache rules for a proxy server. From this topic you can create, delete, or modify a static cache rule.
To view this administrative console topic, click Servers > Proxy Servers > server_name > HTTP Proxy Server Settings > Static cache rules.
The security proxy, or the intermediary that is the entry point into the enterprise, is responsible for terminating SSL connections with the client, authenticating the request, propagating the connection characteristics for the client, and any other credentials to the application server in the enterprise.
The proxy server enables security proxies to be identified so that private headers that are set in the request are propagated as they are to the application servers. Identify the list of security proxies that are trusted by the proxy server using the trusted security proxies field. To access this administrative console field, click Servers > Proxy servers > <server_name> > HTTP proxy server settings > Proxy settings. You can find trusted security proxies in the Security section of this administrative console page.