F-SECURE POLICY MANAGER PROXY Administrator's Manual

Hide thumbs Also See for POLICY MANAGER PROXY:

Advertisement

F-Secure Policy
Manager Proxy
Administrator's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the POLICY MANAGER PROXY and is the answer not in the manual?

Questions and answers

Summary of Contents for F-SECURE POLICY MANAGER PROXY

  • Page 1 F-Secure Policy Manager Proxy Administrator’s Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Chapter 1 Introduction An Up-To-Date System is a Secure System ..............11 When Should You Use F-Secure Policy Manager Proxy? .........12 How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different? 14 Chapter 2 Installation System Requirements....................16 Installing F-Secure Policy Manager Proxy ..............16 2.2.1 Local Installation.....................16...
  • Page 4 5.5.1 Some Example Error Messages..............37 The Status Report Log ....................37 Technical Support Overview ..........................40 Web Club ...........................40 Virus Descriptions on the Web.................. 40 Advanced Technical Support .....................40 F-Secure Technical Product Training .................41 Training Program ...................... 41 Contact Information....................42 About F-Secure Corporation...
  • Page 5: About This Guide

    BOUT UIDE How This Guide Is Organized............6 Who Should Use This Guide ............7 Conventions Used in F-Secure Guides ........8...
  • Page 6: How This Guide Is Organized

    F-Secure Policy Manager Proxy concepts, a step-by-step guide to installation and all the information you need to set up and manage your F-Secure Policy Manager Proxy. F-Secure Policy Manager Proxy Administrator’s Guide is divided into the following chapters: Chapter 1. Introduction provides general information about F-Secure Policy Manager Proxy and how it works.
  • Page 7: Who Should Use This Guide

    Who Should Use This Guide This guide is intended for system administrators. It is assumed that the reader has: Working knowledge of Microsoft Windows Server operating systems. A basic understanding of the Internet and TCP/IP protocols.
  • Page 8: Conventions Used In F-Secure Guides

    Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 9 In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 10: Chapter 1 Introduction

    NTRODUCTION An Up-To-Date System is a Secure System....... 11 When Should You Use F-Secure Policy Manager Proxy?..12 How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different?................14...
  • Page 11: An Up-To-Date System Is A Secure System

    This virus definition database is regularly made available to all the workstations with F-Secure Client Security installed. It is this virus definition database that enables F-Secure Client Security to protect a workstation from viruses and malware.
  • Page 12: When Should You Use F-Secure Policy Manager Proxy

    When Should You Use F-Secure Policy Manager Proxy? The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example a large corporation with remote offices in different parts of the globe. An example of one situation where...
  • Page 13 Figure 1-2 On the right, with F-Secure Policy Manager Proxy, the number of slow connections is dramatically reduced. There are three reasons to use F-Secure Policy Manager Proxy: To Decrease Network Bandwidth Usage You should use F-Secure Policy Manager Proxy when you have a group of workstations far away from you F-Secure Policy Manager Server;...
  • Page 14: How Are F-Secure Policy Manager Proxy And F-Secure Anti-Virus Proxy Different

    To Decrease F-Secure Policy Manager Hardware Load You should use F-Secure Policy Manager Proxy, if the server hardware running the F-Secure Policy Manager is unable to cope with the number of virus definition database requests it receives. How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different? They are designed to work with different F-Secure products.
  • Page 15: Chapter 2 Installation

    NSTALLATION System Requirements ..............16 Installing F-Secure Policy Manager Proxy........16...
  • Page 16: System Requirements

    CHAPTER 2 Installation System Requirements To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements: Processor: Intel Pentium III 450MHz processor or faster Memory: 256 MB RAM Disk Space: 300 MB; 500 MB or more is recommended. The disk space required depends on the size of the installation.
  • Page 17 Step 1. 1. Run the setup.exe file. 2. Click the Next button on the first screen of the installer. 3. Read through the license agreement and click the I accept this agreement option. Click Next. 4. Select the Custom option and click Next to continue.
  • Page 18 CHAPTER 2 Installation 5. Make sure the box next to F-Secure Policy Manager Proxy is checked and click Next. Figure 2-2 Components...
  • Page 19 Figure 2-3 Installation folder 7. If a previous installation of an F-Secure product is detected, you will be asked if you would like to use the same settings as the previous installed product. If you select the dialogs in steps 8–10 will be...
  • Page 20 8. Select the Central management with F-Secure Policy Manager option and click Next. Figure 2-4 Central management 9. Copy the public key file, admin.pub from the F-Secure Policy Manager Server to the local file system. Click Browse and select this key file.
  • Page 21 10. Enter the IP address of the F-Secure Policy Manager Server you wish the F-Secure Policy Manager Proxy to communicate with. Click Next Figure 2-6 F-Secure Policy Manager Server IP address 11. Click Start to begin. 12. When the progress bar is full, click Next.
  • Page 22: Chapter 3 Configuration

    ONFIGURATION Overview..................23 Remote Configuration..............23...
  • Page 23: Overview

    Overview F-Secure Policy Manager Proxy is configured remotely through the F-Secure Policy Manager Console. For more information about the F-Secure Policy Manager, see the F-Secure Policy Manager Administrator’s Guide. Remote Configuration Configuring F-Secure Policy Manager Proxy remotely is done in the F-Secure Policy Manager Console through the advanced editing mode.
  • Page 24: Chained Proxy Configuration

    CHAPTER 3 Configuration Figure 3-1 The F-Secure Policy Manager Console showing the settings available for the F-Secure Policy Manager Proxy. You can find explanations of each of the configuration options in the help area (see Figure 3-1). 3.2.1 Chained Proxy Configuration F-Secure Policy Manager Proxy can connect through another F-Secure Policy Manager Proxy or HTTP proxy;...
  • Page 25 Figure 3-2 An example chained proxy configuration. A chained proxy configuration may be necessary to: traverse network boundaries or, reduce load from F-Secure Policy Manager Server.
  • Page 26: F-Secure Policy Manager Proxy On Linux

    ECURE OLICY ANAGER ROXY ON INUX Introduction................. 27 System Requirements ..............27 Installation .................. 27 Configuration ................28 Upgrading ................... 29 Uninstallation ................30 Frequently Asked Questions ............30...
  • Page 27: Introduction

    This chapter describes how to install, configure and troubleshoot F-Secure Policy Manager Proxy for Linux. System Requirements To install F-Secure Policy Manager Proxy for Linux, your system must meet the following minimum requirements: Processor: Intel Pentium III 1GHz processor or faster...
  • Page 28: Configuration

    “Chained Proxy Configuration”, To configure chained proxies: 1. Open the F-Secure Policy Manager Proxy configuration file: /opt/etc/f-secure/fspmp/conf/proxy.cfg Add the host name or IP address of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in chained_proxy_ip_addr=...
  • Page 29: Upgrading

    Specify the TCP port of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in: chained_proxy_port= If the HTTP Proxy with which this proxy communicates requires a user name for authentication, enter it in: http_proxy_user= If the HTTP Proxy with which this proxy communicates requires a...
  • Page 30: Uninstallation

    To remove these, type: rm -rf /opt/f-secure/fspmp Frequently Asked Questions Q. How can I check that F-Secure Policy Manager Proxy is running? A. You can check this by typing: /etc/init.d/fspmp status Q. How can I start F-Secure Policy Manager Proxy manually? A.
  • Page 31 Q. Where are the F-Secure Policy Manager Proxy files located in the Linux version? A. To list all files and their places type: Debian Based Distributions RPM Based Distributions dpkg -L f-secure-policy-manager-proxy rpm -ql f-secure-policy-manager-proxy Q. Can I configure F-Secure Policy Manager Proxy not to start on system start up? A.
  • Page 32: Chapter 5 Troubleshooting

    ROUBLESHOOTING Overview..................33 The Error Log ................33 Reading the Error Log ..............33 Error Numbers................36 Troubleshooting with the Error Log ..........36 The Status Report Log ............... 37...
  • Page 33: Overview

    Log”, 37; a running summary of the F-Secure Policy Manager Proxy’s activity. The Error Log The Error Log file is used to store messages generated by F-Secure Policy Manager Proxy. Some of the messages provide information about normal operations (for example, startup, shutdown, daily maintenance).
  • Page 34 May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see errno (reason: 2) The F-Secure Policy Manager Proxy error number (in case of an error). May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see...
  • Page 35: Message Levels

    Numbers”), the external error code is usually specified as the reason. May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see errno (reason: 2) 5.3.2 Message Levels Messages in the log have various levels of importance:...
  • Page 36: Error Numbers

    If an error message in the log was caused by an external error, the external error code is appended to the message in the Error Log. Usually, the description of F-Secure Policy Manager Proxy error number describes the kind of external error that occurred, and suggests places to look it up.
  • Page 37: Some Example Error Messages

    This warning indicates that the available disk space is less Not enough disk space for a full than the amount F-Secure Policy Manager Proxy is set to cache : 50 required, 0 already use. F-Secure Policy Manager Proxy will operate more occupied, only 8 more available efficiently if you free up some disk space.
  • Page 38 CHAPTER 5 Troubleshooting Every 10 minutes, F-Secure Policy Manager Proxy creates a record in the Status Report Log which contains the date, time and various counters (packets count, connected client count, etc.). The Status Report Log is located, by default at: c:\program files\f-secure\fspmp\log\server_status.
  • Page 39: Technical Support

    Technical Support Overview..................40 Web Club..................40 Advanced Technical Support............40 F-Secure Technical Product Training ......... 41...
  • Page 40: Overview

    The F-Secure Web Club provides assistance to users of F-Secure products. To enter, choose the Web Club command from the Help menu in the F-Secure application. The first time you use this option, enter the path and name of your Web browser and your location.
  • Page 41: F-Secure Technical Product Training

    After installing the F-Secure software, you may find a Readme file in the F-Secure folder in the Windows Start > Programs menu. The Readme file contains late-breaking information about the product.
  • Page 42: Contact Information

    The courses take place in modern and well-equipped classrooms. All of our courses consist of theory and hands-on parts. At the end of each course there is a certification exam. Contact your local F-Secure office or F-Secure Certified Training Partner to get information about the courses and schedules.
  • Page 43: About F-Secure Corporation

    F-Secure Corporation is the fastest growing publicly listed company in the antivirus and intrusion prevention industry with more than 50% revenue growth in 2004. Founded in 1988, F-Secure has been listed on the Helsinki Stock Exchange since 1999. We have our headquarters in Helsinki, Finland, and offices in USA, France, Germany, Italy, Sweden, the United Kingdom and Japan.

Table of Contents