90
Click
Export Settings
to open a list of all F-Secure Internet Gatekeeper
Settings in a new Internet browser window. You can then save the file for
later use by selecting
File > Save As...
.
Click
Export Statistics
to open a list of all F-Secure Internet Gatekeeper
Statistics in a new Internet browser window. You can then save or print
the file for later use by selecting
File > Save As...
..
Click
Configure Console
to configure the F-Secure Internet Gatekeeper
Web Console. For instructions, see “
Configuring the F-Secure Internet
.
Configuring the F-Secure Internet Gatekeeper Web Console
On the F-Secure Internet Gatekeeper Web Console Configuration page
you can specify settings for connections to the server. You can also open
the F-Secure Internet Gatekeeper Web Console access log from this
page.
Click
Show Access Log
to view the F-Secure Internet Gatekeeper Web
Console access log. Note that the Web Console access log differs from
standard web server access logs, as it logs only the first request per
session.
Session timeout
Specify the time how long a client can be
connected to the server. When the session
expires, the F-Secure Internet Gatekeeper
Web Console displays a warning. The
default value is 60 minutes.
Listen on
Specify the IP address of the F-Secure
Internet Gatekeeper Web Console Server.
Port
Specify the port where the server listens for
connections. The default port is 25023.
Accept connections from
the following hosts
Specify a list of hosts which are allowed to
connect to F-Secure Internet Gatekeeper
Web Console.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...