Configuring The Product - F-SECURE INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61 Administrator's Manual

Windows 2000/2003 server
Table of Contents

Advertisement

70
3.4.2

Configuring the Product

By default, F-Secure Internet Gatekeeper has very strict access control
settings for security reasons. You have to configure F-Secure Internet
Gatekeeper before you can use it properly. Follow these instructions
before you start using F-Secure Internet Gatekeeper:
F-Secure Anti-Virus for Internet Mail
1. Make sure that you define the internal network addresses of your
company with the Intranet Hosts setting. For more information, see
"Intranet
Hosts", 164.
2.
Specify hosts that are allowed or not allowed to connect to F-Secure
Anti-Virus for Internet Mail in the Allowed hosts and Denied hosts
settings. For more information, see
3.
Configure the virus scanning to specify the type of traffic you want to
scan.
For mail traffic scanning, see
Scanning", 166.
Make sure that you limit users who are allowed to receive
e-mail messages to the users in the corporate network. For
more information, see "Receiving", 166.
4.
Configure mail delivery on the Mail Routing Table. For more
information, see
"Mail
F-Secure Anti-Virus for Internet Gateways
1. If you already have a web proxy in your network, check the proxy
chaining settings. For more information, see
2.
Configure network and performance settings to make sure that
F-Secure Internet Gatekeeper works properly. For more information,
see
"Configuring F-Secure Anti-Virus for Internet
"Configuring F-Secure Content Scanner
"SMTP
Connections", 146.
"Configuring SMTP Traffic
Delivery", 187.
"Proxy
Server", 211.
Chaining", 98.
Gateways", 94, and

Advertisement

Table of Contents
loading

This manual is also suitable for:

Internet gatekeeper

Table of Contents