Sign In
Upload
Manuals
Brands
F-SECURE Manuals
Software
INTERNET GATEKEEPER FOR LINUX 4.01 -
F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 - Manuals
Manuals and User Guides for F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 -. We have
1
F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 - manual available for free PDF download: Administrator's Manual
F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 - Administrator's Manual (169 pages)
Brand:
F-SECURE
| Category:
Software
| Size: 0.99 MB
Table of Contents
Table of Contents
3
1 Introduction
6
2 Features
8
Overview
8
List of Features
8
3 System Requirements
11
Hardware Requirements
11
Software Requirements
12
4 Installing F-Secure Internet Gatekeeper for Linux
13
Installing an Rpm Package
13
Installing a Deb Package
14
Installing a Tar.gz Package
15
Using the Installation Command
15
Uninstalling F-Secure Internet Gatekeeper for Linux
16
Backup and Restore
16
5 Typical Configurations
17
Configuration Overview
17
HTTP Connection
17
SMTP Connection
18
POP Connection
19
FTP Connection
20
Network Configuration Examples
21
Internet Gatekeeper Server Settings
22
Web Console
22
Accessing the Web Console
22
Web Console Layout
23
Typical Settings
24
Client Settings
25
6 Checking the Proxy Setup
26
Checking the HTTP Proxy
26
Checking the SMTP Proxy
26
Checking the POP Proxy
27
Checking the FTP Proxy
27
7 Advanced Settings
28
Web Console Settings
28
Proxy Settings
28
HTTP Proxy
28
SMTP Proxy
35
POP Proxy
45
FTP Proxy
52
Common Settings
56
Virus Definition Database
62
Logs
63
Top Menu
64
Access Control
65
Detection Notification Templates
67
Expert Options
69
8 Command-Line Tools
70
Auto-Start
70
Proxy Execution
71
Virus Definition Updates
72
Restarting All Services
73
Creating Diagnostic Information
74
9 Logs
75
Log Files
75
Access Logs
75
Virus and Spam Detection Logs
78
Error Logs
79
Information Logs
89
Splitting/Rotating Log Files
94
Time Display Conversion Tool
95
Log Analysis Tools
96
External Output of Logs
97
10 Other Settings
98
Access Authentication
98
Host Authentication
98
Authentication Using Virtual Networks
100
Proxy Authentication Using Internet Gatekeeper
102
Authentication by Mail Servers
104
Authentication Using POP-Before-SMTP
105
Transparent Proxy
107
Transparent Proxy Details
108
Transparent Proxy - Router Mode
109
Transparent Proxy - Bridge Mode
113
Coexisting with Mail Servers
117
Changing the Port Number of Internet Gatekeeper
117
Changing the Port Number of the Mail Server
118
Changing the IP Address
121
Changing IP Addresses with Iptables
123
Scanning Viruses before Saving Mail to the Mail Server
125
Reverse Proxy Settings
128
Reverse Proxy - Typical Settings
128
Coexisting with Web Servers
129
Implementing a HTTPS (SSL) Server
130
11 Product Specifications
132
HTTP Proxy Process
134
SMTP Proxy Process
136
POP Proxy Process
138
FTP Proxy Process
140
HTTP Error Responses
144
HTTP Request and Response Headers
146
SMTP Command Responses
148
SMTP Commands - Operations
151
POP Commands - Operations
155
FTP Commands - Operations
157
Connection Error Messages
160
Service Process List
162
Detection Names
164
Riskware
166
12 Copyright Information
168
Advertisement
Advertisement
Related Products
F-SECURE LINUX SECURITY
F-SECURE Internet Gatekeeper for Linux Version 4
F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
F-SECURE ANTI-VIRUS FOR MIMESWEEPER -
F-SECURE Anti-Virus for Windows Servers
F-SECURE ANTI-VIRUS FOR WINDOWS SERVERS 9.00
F-SECURE Categories
Software
Network Router
Gateway
More F-SECURE Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL