User manual F-SECURE POLICY MANAGER PROXY ADMINISTRATOR GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE POLICY MANAGER PROXY. We hope that this F-SECURE POLICY MANAGER PROXY user guide will be useful to you.


F-SECURE POLICY MANAGER PROXY ADMINISTRATOR GUIDE: Download the complete user guide (300 Ko)

Manual abstract: user guide F-SECURE POLICY MANAGER PROXYADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] F-Secure Policy Manager Proxy Administrator's Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. [. . . ] 27 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 26 27 4. 1 Introduction This chapter describes how to install, configure and troubleshoot F-Secure Policy Manager Proxy for Linux. 4. 2 System Requirements To install F-Secure Policy Manager Proxy for Linux, your system must meet the following minimum requirements: Processor: Memory: Disk space to install: Free disk space: Operating System: Intel Pentium III 1GHz processor or faster 512 MB of RAM or more is recommended 90 MB 100 MB of free hard disk space; 500 MB or more is recommended. Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 3 SUSE Linux 10. 0 SUSE Linux 9. x SUSE Linux Enterprise Server 9 Debian GNU Linux Sarge 3. 1 F-Secure Client Security 6 or later F-Secure Policy Manager 6 or later F-Secure Software: 4. 3 Installation 1. Open a terminal. CHAPTER 4 F-Secure Policy Manager Proxy on Linux 28 3. To install type: Debian Based Distributions dpkg -i f-secure-policy-manager-proxy_1. 0. <buil d>_i386. deb RPM Based Distributions rpm -i f-secure-policy-manager-proxy-1. 0. <bu ild>-1. i386. rpm F-Secure Policy Manager Proxy is started automatically after the installation. 4. 4 Configuration 1. Configure F-Secure Policy Manager Proxy by editing the following configuration file: /opt/etc/f-secure/fspmp/conf/proxy. cfg 2. Restart F-Secure Policy Manager Proxy to apply configuration changes by typing: # /etc/init. d/fspmp restart 4. 4. 1 Chained Proxy Configuration F-Secure Policy Manager Proxy can connect through another F-Secure Policy Manager Proxy or HTTP proxy; this is a `chained proxy configuration. ' For more information, see "Chained Proxy Configuration", 24. Open the F-Secure Policy Manager Proxy configuration file: /opt/etc/f-secure/fspmp/conf/proxy. cfg 2. Add the host name or IP address of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in chained_proxy_ip_addr= 29 3. Specify the TCP port of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in: chained_proxy_port= 4. If the HTTP Proxy with which this proxy communicates requires a user name for authentication, enter it in: http_proxy_user= 5. If the HTTP Proxy with which this proxy communicates requires a password for authentication, enter it in: http_proxy_password= 6. Restart F-Secure Policy Manager Proxy to apply configuration changes by typing: # /etc/init. d/fspmp restart 4. 5 Upgrading 1. Type: Debian Based Distributions dpkg -i f-secure-policy-manager-proxy_1. 0. <buil d>_i386. deb RPM Based Distributions rpm -U f-secure-policy-manager-proxy-1. 0. <bu ild>-1. i386. rpm Upgrading does not change the previous configuration. CHAPTER 4 F-Secure Policy Manager Proxy on Linux 30 4. 6 Uninstallation 1. Type: Debian Based Distributions dpkg -r f-secure-policy-manager-proxy RPM Based Distributions rpm -e f-secure-policy-manager-console Log files and configuration files are not removed as these are irreplaceable and contain valuable information. To remove these, type: rm -rf /opt/f-secure/fspmp 4. 7 Frequently Asked Questions Q. Check the runtime errors, warnings and other information that are logged in /var/opt/f-secure/fspmp/log/log 31 Q. Where are the F-Secure Policy Manager Proxy files located in the Linux version? [. . . ] To connect to the Web Club directly from your Web browser, go to: http://www. f-secure. com/webclub/ Virus Descriptions on the Web F-Secure Corporation maintains a comprehensive collection of virus-related information on its Web site. To view the Virus Information Database, go to: http://www. f-secure. com/virus-info/. Advanced Technical Support For advanced technical support, go to the F-Secure Support Center at http://support. f-secure. com/ or contact your local F-Secure distributor directly. For basic technical assistance, please contact your F-Secure distributor. Please include the following information with your support request: 41 1. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE POLICY MANAGER PROXY




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE POLICY MANAGER PROXY will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.