Page 2
Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Chapter 1 Introduction An Up-To-Date System is a Secure System ..............11 When Should You Use F-Secure Policy Manager Proxy? .........12 How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different? 14 Chapter 2 Installation System Requirements....................16 Installing F-Secure Policy Manager Proxy ..............16 2.2.1 Local Installation.....................16...
Page 4
5.5.1 Some Example Error Messages..............37 The Status Report Log ....................37 Technical Support Overview ..........................40 Web Club ...........................40 Virus Descriptions on the Web.................. 40 Advanced Technical Support .....................40 F-Secure Technical Product Training .................41 Training Program ...................... 41 Contact Information....................42 About F-Secure Corporation...
F-Secure Policy Manager Proxy concepts, a step-by-step guide to installation and all the information you need to set up and manage your F-Secure Policy Manager Proxy. F-Secure Policy Manager Proxy Administrator’s Guide is divided into the following chapters: Chapter 1. Introduction provides general information about F-Secure Policy Manager Proxy and how it works.
Who Should Use This Guide This guide is intended for system administrators. It is assumed that the reader has: Working knowledge of Microsoft Windows Server operating systems. A basic understanding of the Internet and TCP/IP protocols.
Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
Page 9
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
NTRODUCTION An Up-To-Date System is a Secure System....... 11 When Should You Use F-Secure Policy Manager Proxy?..12 How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different?................14...
This virus definition database is regularly made available to all the workstations with F-Secure Client Security installed. It is this virus definition database that enables F-Secure Client Security to protect a workstation from viruses and malware.
When Should You Use F-Secure Policy Manager Proxy? The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example a large corporation with remote offices in different parts of the globe. An example of one situation where...
Page 13
Figure 1-2 On the right, with F-Secure Policy Manager Proxy, the number of slow connections is dramatically reduced. There are three reasons to use F-Secure Policy Manager Proxy: To Decrease Network Bandwidth Usage You should use F-Secure Policy Manager Proxy when you have a group of workstations far away from you F-Secure Policy Manager Server;...
To Decrease F-Secure Policy Manager Hardware Load You should use F-Secure Policy Manager Proxy, if the server hardware running the F-Secure Policy Manager is unable to cope with the number of virus definition database requests it receives. How are F-Secure Policy Manager Proxy and F-Secure Anti-Virus Proxy Different? They are designed to work with different F-Secure products.
CHAPTER 2 Installation System Requirements To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements: Processor: Intel Pentium III 450MHz processor or faster Memory: 256 MB RAM Disk Space: 300 MB; 500 MB or more is recommended. The disk space required depends on the size of the installation.
Page 17
Step 1. 1. Run the setup.exe file. 2. Click the Next button on the first screen of the installer. 3. Read through the license agreement and click the I accept this agreement option. Click Next. 4. Select the Custom option and click Next to continue.
Page 18
CHAPTER 2 Installation 5. Make sure the box next to F-Secure Policy Manager Proxy is checked and click Next. Figure 2-2 Components...
Page 19
Figure 2-3 Installation folder 7. If a previous installation of an F-Secure product is detected, you will be asked if you would like to use the same settings as the previous installed product. If you select the dialogs in steps 8–10 will be...
Page 20
8. Select the Central management with F-Secure Policy Manager option and click Next. Figure 2-4 Central management 9. Copy the public key file, admin.pub from the F-Secure Policy Manager Server to the local file system. Click Browse and select this key file.
Page 21
10. Enter the IP address of the F-Secure Policy Manager Server you wish the F-Secure Policy Manager Proxy to communicate with. Click Next Figure 2-6 F-Secure Policy Manager Server IP address 11. Click Start to begin. 12. When the progress bar is full, click Next.
Overview F-Secure Policy Manager Proxy is configured remotely through the F-Secure Policy Manager Console. For more information about the F-Secure Policy Manager, see the F-Secure Policy Manager Administrator’s Guide. Remote Configuration Configuring F-Secure Policy Manager Proxy remotely is done in the F-Secure Policy Manager Console through the advanced editing mode.
CHAPTER 3 Configuration Figure 3-1 The F-Secure Policy Manager Console showing the settings available for the F-Secure Policy Manager Proxy. You can find explanations of each of the configuration options in the help area (see Figure 3-1). 3.2.1 Chained Proxy Configuration F-Secure Policy Manager Proxy can connect through another F-Secure Policy Manager Proxy or HTTP proxy;...
Page 25
Figure 3-2 An example chained proxy configuration. A chained proxy configuration may be necessary to: traverse network boundaries or, reduce load from F-Secure Policy Manager Server.
This chapter describes how to install, configure and troubleshoot F-Secure Policy Manager Proxy for Linux. System Requirements To install F-Secure Policy Manager Proxy for Linux, your system must meet the following minimum requirements: Processor: Intel Pentium III 1GHz processor or faster...
“Chained Proxy Configuration”, To configure chained proxies: 1. Open the F-Secure Policy Manager Proxy configuration file: /opt/etc/f-secure/fspmp/conf/proxy.cfg Add the host name or IP address of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in chained_proxy_ip_addr=...
Specify the TCP port of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in: chained_proxy_port= If the HTTP Proxy with which this proxy communicates requires a user name for authentication, enter it in: http_proxy_user= If the HTTP Proxy with which this proxy communicates requires a...
To remove these, type: rm -rf /opt/f-secure/fspmp Frequently Asked Questions Q. How can I check that F-Secure Policy Manager Proxy is running? A. You can check this by typing: /etc/init.d/fspmp status Q. How can I start F-Secure Policy Manager Proxy manually? A.
Page 31
Q. Where are the F-Secure Policy Manager Proxy files located in the Linux version? A. To list all files and their places type: Debian Based Distributions RPM Based Distributions dpkg -L f-secure-policy-manager-proxy rpm -ql f-secure-policy-manager-proxy Q. Can I configure F-Secure Policy Manager Proxy not to start on system start up? A.
ROUBLESHOOTING Overview..................33 The Error Log ................33 Reading the Error Log ..............33 Error Numbers................36 Troubleshooting with the Error Log ..........36 The Status Report Log ............... 37...
Log”, 37; a running summary of the F-Secure Policy Manager Proxy’s activity. The Error Log The Error Log file is used to store messages generated by F-Secure Policy Manager Proxy. Some of the messages provide information about normal operations (for example, startup, shutdown, daily maintenance).
Page 34
May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see errno (reason: 2) The F-Secure Policy Manager Proxy error number (in case of an error). May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see...
Numbers”), the external error code is usually specified as the reason. May-28-12:20:28.461 2-ERR 00017999 379 iad_open(): A library/system-call open() failed for file c:\program files\f-secure\FSPMP\data\misc\license.dat, see errno (reason: 2) 5.3.2 Message Levels Messages in the log have various levels of importance:...
If an error message in the log was caused by an external error, the external error code is appended to the message in the Error Log. Usually, the description of F-Secure Policy Manager Proxy error number describes the kind of external error that occurred, and suggests places to look it up.
This warning indicates that the available disk space is less Not enough disk space for a full than the amount F-Secure Policy Manager Proxy is set to cache : 50 required, 0 already use. F-Secure Policy Manager Proxy will operate more occupied, only 8 more available efficiently if you free up some disk space.
Page 38
CHAPTER 5 Troubleshooting Every 10 minutes, F-Secure Policy Manager Proxy creates a record in the Status Report Log which contains the date, time and various counters (packets count, connected client count, etc.). The Status Report Log is located, by default at: c:\program files\f-secure\fspmp\log\server_status.
Technical Support Overview..................40 Web Club..................40 Advanced Technical Support............40 F-Secure Technical Product Training ......... 41...
The F-Secure Web Club provides assistance to users of F-Secure products. To enter, choose the Web Club command from the Help menu in the F-Secure application. The first time you use this option, enter the path and name of your Web browser and your location.
After installing the F-Secure software, you may find a Readme file in the F-Secure folder in the Windows Start > Programs menu. The Readme file contains late-breaking information about the product.
The courses take place in modern and well-equipped classrooms. All of our courses consist of theory and hands-on parts. At the end of each course there is a certification exam. Contact your local F-Secure office or F-Secure Certified Training Partner to get information about the courses and schedules.
F-Secure Corporation is the fastest growing publicly listed company in the antivirus and intrusion prevention industry with more than 50% revenue growth in 2004. Founded in 1988, F-Secure has been listed on the Helsinki Stock Exchange since 1999. We have our headquarters in Helsinki, Finland, and offices in USA, France, Germany, Italy, Sweden, the United Kingdom and Japan.
Need help?
Do you have a question about the POLICY MANAGER PROXY and is the answer not in the manual?
Questions and answers