background image

F-Secure Policy 

Manager Proxy

Administrator’s Guide

Summary of Contents for POLICY MANAGER PROXY -

Page 1: ...F Secure Policy Manager Proxy Administrator s Guide...

Page 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Page 3: ...Use F Secure Policy Manager Proxy 12 1 3 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different 14 Chapter 2 Installation 15 2 1 System Requirements 16 2 2 Installing F Secure P...

Page 4: ...Log 33 5 3 1 Message Structure 33 5 3 2 Message Levels 35 5 4 Error Numbers 36 5 4 1 Internal Error Numbers 36 5 4 2 External Error Numbers 36 5 5 Troubleshooting with the Error Log 36 5 5 1 Some Exa...

Page 5: ...5 ABOUT THIS GUIDE How This Guide Is Organized 6 Who Should Use This Guide 7 Conventions Used in F Secure Guides 8...

Page 6: ...nformation about F Secure Policy Manager Proxy and how it works Chapter 2 Installation contains a step by step guide to installing F Secure Policy Manager Proxy Chapter 3 Configuration describes how F...

Page 7: ...This Guide This guide is intended for system administrators It is assumed that the reader has Working knowledge of Microsoft Windows Server operating systems A basic understanding of the Internet and...

Page 8: ...black is used for file and folder names for figure and table captions and for directory tree names Courier New is used for messages on your computer screen WARNING The warning symbol indicates a situ...

Page 9: ...used for online viewing and printing using Adobe Acrobat Reader When printing the manual please print the entire manual including the copyright and disclaimer statements For More Information Visit F...

Page 10: ...10 1 INTRODUCTION An Up To Date System is a Secure System 11 When Should You Use F Secure Policy Manager Proxy 12 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different 14...

Page 11: ...alled It is this virus definition database that enables F Secure Client Security to protect a workstation from viruses and malware How Do the Virus Definition Databases Get To F Secure Client Security...

Page 12: ...cy Manager Proxy helps deliver the virus definition databases quickly and efficiently 1 2 When Should You Use F Secure Policy Manager Proxy The effects of F Secure Policy Manager Proxy are most obviou...

Page 13: ...ecure Policy Manager Proxy when you have a group of workstations separated from the F Secure Policy Manager Server by a slow connection for example a dialup connection for example in a situation like...

Page 14: ...1 3 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different They are designed to work with different F Secure products Both can function in the same network F Secure Policy Manag...

Page 15: ...15 2 INSTALLATION System Requirements 16 Installing F Secure Policy Manager Proxy 16...

Page 16: ...dministrator s Guide 2 2 1 Local Installation Installing F Secure Policy Manager Proxy is a two step process 1 Install F Secure Policy Manager Proxy 2 Configure F Secure Client Security to use F Secur...

Page 17: ...Click the Next button on the first screen of the installer 3 Read through the license agreement and click the I accept this agreement option Click Next 4 Select the Custom option and click Next to con...

Page 18: ...CHAPTER2 18 Installation 5 Make sure the box next to F Secure Policy Manager Proxy is checked and click Next Figure 2 2 Components...

Page 19: ...s detected you will be asked if you would like to use the same settings as the previous installed product If you select Yes the dialogs in steps 8 10 will be skipped If you select No you can continue...

Page 20: ...F Secure Policy Manager option and click Next Figure 2 4 Central management 9 Copy the public key file admin pub from the F Secure Policy Manager Server to the local file system Click Browse and selec...

Page 21: ...the progress bar is full click Next 13 F Secure Policy Manager Proxy is now running Click Finish to close the final dialog Step 2 In a centrally managed network you should configure F Secure Client S...

Page 22: ...22 3 CONFIGURATION Overview 23 Remote Configuration 23...

Page 23: ...nfiguration Configuring F Secure Policy Manager Proxy remotely is done in the F Secure Policy Manager Console through the advanced editing mode To enter this mode 1 Go to the View drop down menu 2 Cli...

Page 24: ...or the F Secure Policy Manager Proxy You can find explanations of each of the configuration options in the help area see Figure 3 1 3 2 1 Chained Proxy Configuration F Secure Policy Manager Proxy can...

Page 25: ...proxy configuration may be necessary to traverse network boundaries or reduce load from F Secure Policy Manager Server 6HFXUH 3ROLF 0DQDJHU 3UR WUD 3UR 6HFXUH 3ROLF 0DQDJHU 3UR RU 773 3UR 6HFXUH 3ROL...

Page 26: ...26 4 F SECURE POLICY MANAGER PROXY ON LINUX Introduction 27 System Requirements 27 Installation 27 Configuration 28 Upgrading 29 Uninstallation 30 Frequently Asked Questions 30...

Page 27: ...in as root 2 Open a terminal Processor Intel Pentium III 1GHz processor or faster Memory 512 MB of RAM or more is recommended Disk space to install 90 MB Free disk space 100 MB of free hard disk space...

Page 28: ...ecure Policy Manager Proxy can connect through another F Secure Policy Manager Proxy or HTTP proxy this is a chained proxy configuration For more information see Chained Proxy Configuration 24 To conf...

Page 29: ...which this proxy communicates requires a password for authentication enter it in http_proxy_password 6 Restart F Secure Policy Manager Proxy to apply configuration changes by typing etc init d fspmp r...

Page 30: ...Manager Proxy manually A Type etc init d fspmp start Q Why does F Secure Policy Manager Proxy not start A Check the runtime errors warnings and other information that are logged in var opt f secure f...

Page 31: ...s type To configure F Secure Policy Manager Proxy to start on system start up again type Debian Based Distributions RPM Based Distributions dpkg L f secure policy manager proxy rpm ql f secure policy...

Page 32: ...32 5 TROUBLESHOOTING Overview 33 The Error Log 33 Reading the Error Log 33 Error Numbers 36 Troubleshooting with the Error Log 36 The Status Report Log 37...

Page 33: ...up shutdown daily maintenance Other messages indicate errors In addition to the current Error Log file three previous Error Log files are kept By default these are located at c program files f secure...

Page 34: ...ense dat see errno reason 2 The F Secure Policy Manager Proxy error number in case of an error May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open failed for file c program file...

Page 35: ...that the current message is associated with If the message reports an external error as explained in External Error Numbers the external error code is usually specified as the reason May 28 12 20 28 4...

Page 36: ...s txt 5 4 2 External Error Numbers If an error message in the log was caused by an external error the external error code is appended to the message in the Error Log Usually the description of F Secur...

Page 37: ...disk does completely fill this may cause unpredictable system behavior The proxy server restricts itself to never use the last 3 Mbytes of disk space but some other application or user may completely...

Page 38: ...ted by default at c program files f secure fspmp log server_status Although the Status Report Log is a text file and can be viewed in any text editor it is easier read in a spreadsheet program Figure...

Page 39: ...39 Technical Support Overview 40 Web Club 40 Advanced Technical Support 40 F Secure Technical Product Training 41...

Page 40: ...owser and your location To connect to the Web Club directly from your Web browser go to http www f secure com webclub Virus Descriptions on the Web F Secure Corporation maintains a comprehensive colle...

Page 41: ...mum effort F Secure Technical Product Training F Secure provides technical product training material and information for our distributors resellers and customers to succeed with F Secure security prod...

Page 42: ...parts At the end of each course there is a certification exam Contact your local F Secure office or F Secure Certified Training Partner to get information about the courses and schedules Contact Info...

Page 43: ...er Communications The latest real time virus threat scenario news are available at the F Secure Antivirus Research Team weblog at http www f secure com weblog Services for Individuals and Businesses F...

Reviews: