F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 Administrator's Manual page 30

Table of Contents

Advertisement

HTTP proxy authentication
Proxy authentication (proxyauth_pam_auth)
Authenticates the proxy by using PAMs (Pluggable Authentication Modules). You can change
the authentication method in the /etc/pam.d/fsigk_http file.
For more information, see "
Add or remove users
User DB
Edits the database of users who are permitted to connect. You can add, delete, and modify
users and passwords.
Maximum number of simultaneous connections
Maximum connections (pre_spawn)
Specifies the maximum number of simultaneous connections from clients. The specified
number of processes listen for connections from clients.
You can check the number of connections in "Internal process ID" in the access log
(access.log).
If you increase the maximum number of connections, more connections are allowed, but
it requires more memory. Approximately 500 KB of memory is used per process.
A warning is output to the error log if the maximum number of connections is reached.
We recommend that you set an initial value of approximately 200 and then monitor the
performance. The value of the setting is usually less than 2000. (The setting itself
permits values up to 9999.)
Access control
Access Control
From these hosts
From: (acl_from)
Only accepts connections from the designated list of hosts.
If [DNS Reverse Lookup] is enabled, you can also specify <host name>.<domain name>.
For examples, see
To these hosts
To: (acl_to)
Only accepts connections to the designated list of hosts.
For examples, see
Exclude these targets from the virus scan
Skip scanning for:
User-Agent
F-Secure Internet Gatekeeper for Linux/Administrator's Guide
following file is updated: /opt/f-secure/fsigk/conf/template_http.html.
Proxy authentication using Internet
"Access
Control", 65.
If you edit the "From these hosts" setting in the web console, the http from field
is updated in /opt/f-secure/fsigk/conf/hosts.allow.
See man page hosts_access(5) for more information on the syntax used in the
file.
"Access
Control", 65.
If you edit the "To these hosts" setting in the web console, the http to field is
upated in /opt/f-secure/fsigk/conf/hosts.allow.
See man page hosts_access(5) for more information on the syntax used in the
file.
Gatekeeper", 102.
30

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the INTERNET GATEKEEPER FOR LINUX 4.01 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Internet gatekeeper for linux version 4

Table of Contents