APPENDIX F
321
Advanced Deployment Options
want to configure a transparent proxy if you want all clients to use the
proxy server without any changes in web browser configurations and if
you want to make sure that all clients use the proxy server.
One method that you can use to configure a transparent proxy is to
modify the network so that all HTTP requests that come from the clients
are silently captured and forwarded to F-Secure Internet Gatekeeper. For
example, you can use a firewall that resides between the clients and the
web servers that they try to access.
Figure F-1 F-Secure Anti-Virus for Internet Gateways deployed with a transparent
proxy
Using a transparent proxy is the best way to provide a reliable and easy
HTTP scanning service with F-Secure Internet Gatekeeper. However,
configuring a transparent proxy may require some modifications in the
network infrastructure. As the traffic has to be captured at the TCP/IP
protocol level, the transparency is achieved in the firewall. It recognizes
and redirects HTTP requests that come from the clients to F-Secure
Internet Gatekeeper.
This way, web browsers do not have to be configured manually and if the
firewall rules are configured properly, filtering policies cannot be
bypassed. As the firewall forwards all HTTP requests silently to F-Secure
Internet Gatekeeper, clients are not even aware that the traffic is being
redirected.
Configuring a transparent proxy can be very easy, depending on the
network infrastructure and the firewall in the network.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...