F-SECURE POLICY MANAGER PROXY - Скачать руководство пользователя страница 1

F-Secure Policy 

Manager Proxy

Administrator’s Guide

Содержание POLICY MANAGER PROXY -

Страница 1: ...F Secure Policy Manager Proxy Administrator s Guide...

Страница 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Страница 3: ...Use F Secure Policy Manager Proxy 12 1 3 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different 14 Chapter 2 Installation 15 2 1 System Requirements 16 2 2 Installing F Secure P...

Страница 4: ...Log 33 5 3 1 Message Structure 33 5 3 2 Message Levels 35 5 4 Error Numbers 36 5 4 1 Internal Error Numbers 36 5 4 2 External Error Numbers 36 5 5 Troubleshooting with the Error Log 36 5 5 1 Some Exa...

Страница 5: ...5 ABOUT THIS GUIDE How This Guide Is Organized 6 Who Should Use This Guide 7 Conventions Used in F Secure Guides 8...

Страница 6: ...nformation about F Secure Policy Manager Proxy and how it works Chapter 2 Installation contains a step by step guide to installing F Secure Policy Manager Proxy Chapter 3 Configuration describes how F...

Страница 7: ...This Guide This guide is intended for system administrators It is assumed that the reader has Working knowledge of Microsoft Windows Server operating systems A basic understanding of the Internet and...

Страница 8: ...black is used for file and folder names for figure and table captions and for directory tree names Courier New is used for messages on your computer screen WARNING The warning symbol indicates a situ...

Страница 9: ...used for online viewing and printing using Adobe Acrobat Reader When printing the manual please print the entire manual including the copyright and disclaimer statements For More Information Visit F...

Страница 10: ...10 1 INTRODUCTION An Up To Date System is a Secure System 11 When Should You Use F Secure Policy Manager Proxy 12 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different 14...

Страница 11: ...alled It is this virus definition database that enables F Secure Client Security to protect a workstation from viruses and malware How Do the Virus Definition Databases Get To F Secure Client Security...

Страница 12: ...cy Manager Proxy helps deliver the virus definition databases quickly and efficiently 1 2 When Should You Use F Secure Policy Manager Proxy The effects of F Secure Policy Manager Proxy are most obviou...

Страница 13: ...ecure Policy Manager Proxy when you have a group of workstations separated from the F Secure Policy Manager Server by a slow connection for example a dialup connection for example in a situation like...

Страница 14: ...1 3 How are F Secure Policy Manager Proxy and F Secure Anti Virus Proxy Different They are designed to work with different F Secure products Both can function in the same network F Secure Policy Manag...

Страница 15: ...15 2 INSTALLATION System Requirements 16 Installing F Secure Policy Manager Proxy 16...

Страница 16: ...dministrator s Guide 2 2 1 Local Installation Installing F Secure Policy Manager Proxy is a two step process 1 Install F Secure Policy Manager Proxy 2 Configure F Secure Client Security to use F Secur...

Страница 17: ...Click the Next button on the first screen of the installer 3 Read through the license agreement and click the I accept this agreement option Click Next 4 Select the Custom option and click Next to con...

Страница 18: ...CHAPTER2 18 Installation 5 Make sure the box next to F Secure Policy Manager Proxy is checked and click Next Figure 2 2 Components...

Страница 19: ...s detected you will be asked if you would like to use the same settings as the previous installed product If you select Yes the dialogs in steps 8 10 will be skipped If you select No you can continue...

Страница 20: ...F Secure Policy Manager option and click Next Figure 2 4 Central management 9 Copy the public key file admin pub from the F Secure Policy Manager Server to the local file system Click Browse and selec...

Страница 21: ...the progress bar is full click Next 13 F Secure Policy Manager Proxy is now running Click Finish to close the final dialog Step 2 In a centrally managed network you should configure F Secure Client S...

Страница 22: ...22 3 CONFIGURATION Overview 23 Remote Configuration 23...

Страница 23: ...nfiguration Configuring F Secure Policy Manager Proxy remotely is done in the F Secure Policy Manager Console through the advanced editing mode To enter this mode 1 Go to the View drop down menu 2 Cli...

Страница 24: ...or the F Secure Policy Manager Proxy You can find explanations of each of the configuration options in the help area see Figure 3 1 3 2 1 Chained Proxy Configuration F Secure Policy Manager Proxy can...

Страница 25: ...proxy configuration may be necessary to traverse network boundaries or reduce load from F Secure Policy Manager Server 6HFXUH 3ROLF 0DQDJHU 3UR WUD 3UR 6HFXUH 3ROLF 0DQDJHU 3UR RU 773 3UR 6HFXUH 3ROL...

Страница 26: ...26 4 F SECURE POLICY MANAGER PROXY ON LINUX Introduction 27 System Requirements 27 Installation 27 Configuration 28 Upgrading 29 Uninstallation 30 Frequently Asked Questions 30...

Страница 27: ...in as root 2 Open a terminal Processor Intel Pentium III 1GHz processor or faster Memory 512 MB of RAM or more is recommended Disk space to install 90 MB Free disk space 100 MB of free hard disk space...

Страница 28: ...ecure Policy Manager Proxy can connect through another F Secure Policy Manager Proxy or HTTP proxy this is a chained proxy configuration For more information see Chained Proxy Configuration 24 To conf...

Страница 29: ...which this proxy communicates requires a password for authentication enter it in http_proxy_password 6 Restart F Secure Policy Manager Proxy to apply configuration changes by typing etc init d fspmp r...

Страница 30: ...Manager Proxy manually A Type etc init d fspmp start Q Why does F Secure Policy Manager Proxy not start A Check the runtime errors warnings and other information that are logged in var opt f secure f...

Страница 31: ...s type To configure F Secure Policy Manager Proxy to start on system start up again type Debian Based Distributions RPM Based Distributions dpkg L f secure policy manager proxy rpm ql f secure policy...

Страница 32: ...32 5 TROUBLESHOOTING Overview 33 The Error Log 33 Reading the Error Log 33 Error Numbers 36 Troubleshooting with the Error Log 36 The Status Report Log 37...

Страница 33: ...up shutdown daily maintenance Other messages indicate errors In addition to the current Error Log file three previous Error Log files are kept By default these are located at c program files f secure...

Страница 34: ...ense dat see errno reason 2 The F Secure Policy Manager Proxy error number in case of an error May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open failed for file c program file...

Страница 35: ...that the current message is associated with If the message reports an external error as explained in External Error Numbers the external error code is usually specified as the reason May 28 12 20 28 4...

Страница 36: ...s txt 5 4 2 External Error Numbers If an error message in the log was caused by an external error the external error code is appended to the message in the Error Log Usually the description of F Secur...

Страница 37: ...disk does completely fill this may cause unpredictable system behavior The proxy server restricts itself to never use the last 3 Mbytes of disk space but some other application or user may completely...

Страница 38: ...ted by default at c program files f secure fspmp log server_status Although the Status Report Log is a text file and can be viewed in any text editor it is easier read in a spreadsheet program Figure...

Страница 39: ...39 Technical Support Overview 40 Web Club 40 Advanced Technical Support 40 F Secure Technical Product Training 41...

Страница 40: ...owser and your location To connect to the Web Club directly from your Web browser go to http www f secure com webclub Virus Descriptions on the Web F Secure Corporation maintains a comprehensive colle...

Страница 41: ...mum effort F Secure Technical Product Training F Secure provides technical product training material and information for our distributors resellers and customers to succeed with F Secure security prod...

Страница 42: ...parts At the end of each course there is a certification exam Contact your local F Secure office or F Secure Certified Training Partner to get information about the courses and schedules Contact Info...

Страница 43: ...er Communications The latest real time virus threat scenario news are available at the F Secure Antivirus Research Team weblog at http www f secure com weblog Services for Individuals and Businesses F...

Отзывы: