F-Secure Policy Manager Proxy | TOC | 3 Contents Chapter 1: Introduction...............5 System requirements........................6 An up-to-date system is a secure system.................7 When should you use F-Secure Policy Manager Proxy?............8 Chapter 2: Installation.................9 Installing the product locally....................10 Chapter 3: Configuration..............11 Configuring the product remotely....................12 Chapter 4: Using the product on Linux...........13...
This guide provides an overview of the product concepts, a step-by-step guide to installation as well as other information you need to manage the • System requirements product. • An up-to-date system is a secure system • When should you use F-Secure Policy Manager Proxy?
6 | F-Secure Policy Manager Proxy | Introduction System requirements The system requirements for the product are listed here. To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements: Operating system: Windows: • Windows Server 2003 SP1 or higher (32-bit);...
The figure above is an example of the steps the virus definition database takes to get to F-Secure products, in this case to F-Secure Client Security. This is the primary path; there are also fallback paths if one or more of the links is unavailable (for example if the machine running F-Secure Policy Manager has a power cut).
8 | F-Secure Policy Manager Proxy | Introduction When should you use F-Secure Policy Manager Proxy? You do not have to use F-Secure Policy Manager Proxy to update the virus definitions database, but it does provide certain advantages. The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example, a large corporation with remote offices in different parts of the globe.
• Locally, for which you will find instructions in this section. • Installing the product locally • Remotely, for which you will find instructions in the Policy Manager Administrator's Guide, which is available on the F-Secure web site at http://www.f-secure.com.
Browse button, then click Next. Note: If a previous installation of an F-Secure product is detected on the computer, this dialog is not displayed and the previous installation directory is used. 5. If a previous installation of the product is detected, you will be asked if you want to use the same settings as in the previously installed product: •...
You can configure F-Secure Policy Manager Proxy to connect through another F-Secure Policy Manager Proxy or HTTP proxy. This type of configuration is called a chained proxy configuration, and it might be needed •...
Chapter Using the product on Linux Topics: This section describes how to install and configure F-Secure Policy Manager Proxy on Linux. • Installing the product • Configuring the product • Upgrading the product • Uninstalling the product • Frequently asked questions...
1. Log in as root. 2. Open a terminal. 3. Enter the following command to start the installation: • Debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2.0.<build>_i386.deb. • RPM-based distributions: rpm -i f-secure-policy-manager-proxy-2.0.<build>-1.i386.rpm. F-Secure Policy Manager Proxy will start up automatically once the installation is complete.
If the HTTP proxy with which this proxy communicates requires a password for authentication, add the password to the line http_proxy_password=. 2. Restart F-Secure Policy Manager Proxy to apply the configuration changes by entering the command /etc/init.d/fspmp restart.
16 | F-Secure Policy Manager Proxy | Using the product on Linux Upgrading the product This topic describes how to upgrade F-Secure Policy Manager Proxy on Linux. 1. Log in as root. 2. Open a terminal. 3. Enter the following command to upgrade the product: •...
F-Secure Policy Manager Proxy | Using the product on Linux | 17 Uninstalling the product This topic describes how to uninstall F-Secure Policy Manager Proxy from your Linux system. 1. Log in as root. 2. Open a new terminal. 3. Enter the following command to uninstall the product: •...
18 | F-Secure Policy Manager Proxy | Using the product on Linux Frequently asked questions Here are some answers to frequently asked questions regarding F-Secure Policy Manager Proxy on Linux. Question Answer How can I check that F-Secure Policy Manager Proxy...
Chapter Troubleshooting Topics: F-Secure Policy Manager Proxy keeps detailed logs of activity and any errors that have occurred. The two time-annotated log files are: • The error log • the error log, which records any errors that have occurred, and •...
Here you will find information on the error log for F-Secure Policy Manager Proxy. The error log file is used to store messages generated by F-Secure Policy Manager Proxy. Some of the messages provide information about normal operations (startup, shutdown and daily maintenance, for example).
F-Secure Policy Manager Proxy | Troubleshooting | 21 files\f-secure\FSPMP\data\misc\license.dat, see errno (reason: 2) If the message was due to an error, it may also include the reason for the error, which can consist of one or both of the following: •...
22 | F-Secure Policy Manager Proxy | Troubleshooting Error numbers Every error message written to the log contains an error number. This error number uniquely specifies what went wrong. There are two types of errors. Internal error numbers A complete list of all the error numbers is located by default in c:\program files\f-secure\fspmp\doc\log_error_codes.txt.
103 (502fcbc7:8080)::RecvMore(): (m_http_value != m_length_value + 4) notifies you that the server with which Policy Manager Proxy is trying to communicate is not valid. In this case, an F-Secure product has probably set the wrong IP address for Policy Manager.
24 | F-Secure Policy Manager Proxy | Troubleshooting The status report log The status report log contains regular summaries of the status of Policy Manager Proxy. Every 10 minutes, Policy Manager Proxy creates a record in the status report log containing the date, time and various counters (packets count, connected clients count, etc.).
Need help?
Do you have a question about the POLICY MANAGER PROXY 2.0 and is the answer not in the manual?
Questions and answers