F-Secure Internet Gatekeeper for Linux/Administrator’s Guide
9
Simple Installation
•
Runs in almost all Linux environments
•
Combines all functions in a single computer
•
Can be installed as an rpm or deb package. The rpm package complies with Linux Standard Base,
which is used in Red Hat Linux and some other distributions.
•
Can be installed as a .tar.gz package (for any Linux distribution)
Simple Configuration
•
No configuration changes are required on your mail server
•
No changes are required to your network configuration
•
Minimal configuration changes for individual users
•
All settings can be configured in the web console
•
The language of the web console can be changed while using it
Authentication Functions
•
Supports POP-before-SMTP authentication
•
Supports proxy authentication for various protocols
(HTTP proxy authentication, SMTP authentication, POP/FTP user restrictions)
→
Proxy authentication operates via PAMs (Pluggable Authentication Modules) and can integrate
with other authentication methods such as UNIX accounts, LDAP, NIS, and Radius.
•
Access restrictions can be set for all protocols based on the IP address, host name, or domain
name
•
The SMTP receive domain can be restricted to prevent relaying through a third party
•
Existing SMTP authentication function on a mail server can be used
•
Existing APOP function on a mail server can be used
Virus Detection Notifications
•
The notification text can be edited and customized freely
•
UTF-8 characters (for example, Japanese) can be used in messages
•
An e-mail can be sent to the administrator when a virus is detected
•
The header and body of the notification e-mail are customizable
Flexible Configuration
•
Can use a transparent proxy (HTTP, SMTP, POP, and FTP)
•
Individual users can select POP servers independently
•
Scans files that are sent by using the HTTP protocol for viruses. Supports POST and PUT
methods.
•
Supports sending and receiving from dedicated FTP clients
•
Supports multi-level connections using parent proxy settings
•
Can monitor all connections to designated web servers by using parent proxy settings (reverse
proxy)
•
Can connect to any mail server
•
Can use any mail server running on the same computer
•
SMTP reception and SMTP transmission can be configured independently