
94
5.2
Configuring F-Secure Anti-Virus for Internet
Gateways
Change the F-Secure Anti-Virus for Internet Gateways settings to set up
the working directory, connection, logging and advanced settings. For
information on how to change HTTP scanning settings, see “
The F-Secure Content Scanner settings also have an effect on how the
HTTP and FTP-over-HTTP traffic is scanned. The default settings apply
in most system configurations, but it might be a good idea to check that
they are valid for your system.
5.2.1
Network Configuration
You can configure the network settings in
F-Secure Anti-Virus for Internet
Gateways / Settings / Network Configuration.
Binding
You can define how F-Secure Anti-Virus for Internet Gateways listens to
requests that come from the end users or down-stream proxies from the
F-Secure Anti-Virus for Internet Gateways / Settings / Network
Configuration
/
Binding
branch.
After you have configured F-Secure Anti-Virus for Internet Gateways you
can use the Export Settings functionality on the F-Secure Internet
Gatekeeper Web Console Home page to get a full list of the modified
settings for later use. For more information, see “
All HTTP settings apply also to FTP-over-HTTP.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...