User manual F-SECURE POLICY MANAGER PROXY 2.0 ADMINISTRATOR GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE POLICY MANAGER PROXY 2.0. We hope that this F-SECURE POLICY MANAGER PROXY 2.0 user guide will be useful to you.


F-SECURE POLICY MANAGER PROXY 2.0 ADMINISTRATOR GUIDE: Download the complete user guide (242 Ko)

Manual abstract: user guide F-SECURE POLICY MANAGER PROXY 2.0ADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] It is the central monitoring and configuration point for your network. See the F-Secure Policy Manager Administrator's Guide, available on the F-Secure web site at http://www. f-secure. com for more details. F-Secure Policy Manager Proxy helps deliver the virus definition databases quickly and efficiently. 8 | F-Secure Policy Manager Proxy | Introduction When should you use F-Secure Policy Manager Proxy? You do not have to use F-Secure Policy Manager Proxy to update the virus definitions database, but it does provide certain advantages. The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example, a large corporation with remote offices in different parts of the globe. [. . . ] For more information about policies and remote configuration, see the Policy Manager Administrator's guide, which is available on the F-Secure web site at http://www. f-secure. com. Chapter 3 Configuration Topics: · Configuring the product remotely F-Secure Policy Manager Proxy is configured remotely through Policy Manager Console. 12 | F-Secure Policy Manager Proxy | Configuration Configuring the product remotely You can configure F-Secure Policy Manager Proxy remotely in F-Secure Policy Manager Console. To configure F-Secure Policy Manager Proxy in Policy Manager Console: 1. Select F-Secure Policy Manager Proxy from the list of F-Secure products. You can select the necessary settings from the corresponding item in the tree view. Explanations of each of the configuration options are shown in the help area. You can configure F-Secure Policy Manager Proxy to connect through another F-Secure Policy Manager Proxy or HTTP proxy. This type of configuration is called a chained proxy configuration, and it might be needed to: · · cross network boundaries, or reduce the load on Policy Manager Server. Chapter 4 Using the product on Linux Topics: · · · · · Installing the product Configuring the product Upgrading the product Uninstalling the product Frequently asked questions This section describes how to install and configure F-Secure Policy Manager Proxy on Linux. 14 | F-Secure Policy Manager Proxy | Using the product on Linux Installing the product This topic describes how to install F-Secure Policy Manager Proxy on Linux. Enter the following command to start the installation: · · Debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2. 0. <build>_i386. deb. RPM-based distributions: rpm -i f-secure-policy-manager-proxy-2. 0. <build>-1. i386. rpm. F-Secure Policy Manager Proxy will start up automatically once the installation is complete. F-Secure Policy Manager Proxy | Using the product on Linux | 15 Configuring the product This topic describes how to configure F-Secure Policy Manager Proxy on Linux. Configure F-Secure Policy Manager Proxy by editing the /opt/etc/f-secure/fspmp/conf/proxy. cfg file. For example, f you need to configure chained proxies: a) Add the host name or IP address of the Policy Manager Proxy or HTTP proxy with which this proxy communicates to the line chained_proxy_ip_addr=. b) Specify the TCP port of the Policy Manager Proxy or HTTP proxy with which this proxy communicates on the line chained_proxy_port=. c) If the HTTP proxy with which this proxy communicates requires a user name for authentication, add the user name to the line http_proxy_user=. d) If the HTTP proxy with which this proxy communicates requires a password for authentication, add the password to the line http_proxy_password=. Restart F-Secure Policy Manager Proxy to apply the configuration changes by entering the command /etc/init. d/fspmp restart. 16 | F-Secure Policy Manager Proxy | Using the product on Linux Upgrading the product This topic describes how to upgrade F-Secure Policy Manager Proxy on Linux. Enter the following command to upgrade the product: · · Debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2. 0. <build>_i386. deb. RPM-based distributions: rpm -U f-secure-policy-manager-proxy-2. 0. <build>-1. i386. rpm. Upgrading the product does not change the previous configuration. F-Secure Policy Manager Proxy | Using the product on Linux | 17 Uninstalling the product This topic describes how to uninstall F-Secure Policy Manager Proxy from your Linux system. The error log file is used to store messages generated by F-Secure Policy Manager Proxy. Some of the messages provide information about normal operations (startup, shutdown and daily maintenance, for example). In addition to the current error log file, three previous error log files are kept. By default, these are located as follows: · · · · c:\program c:\program c:\program c:\program files\f-secure\fspmp\log\log (current log file). files\f-secure\fspmp\log\log. ooo (oldest log file). Note: If you changed the installation directory when installing the product, then these paths will be relative to the path that you selected. [. . . ] The proxy server restricts itself to never using the last three megabytes of disk space, but some other application or user may fill up the disk completely. When you see this message, you should free up some more space on the disk. socket 93 (92998ce:80) main_mux(): connection broken When this line appears in the error log, look for previous lines containing information about the same socket (in this case, 93) and the same address (in this case, 92998ce:80). A previous entry such as: socket 103 (502fcbc7:8080)::RecvMore(): (m_http_value != m_length_value + 4) notifies you that the server with which Policy Manager Proxy is trying to communicate is not valid. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE POLICY MANAGER PROXY 2.0




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE POLICY MANAGER PROXY 2.0 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.