background image

Troubleshooting with the error log

Here you will find some more information on how to use the error log for troubleshooting purposes.

Errors in the error log can come from multiple threads; each message in the error log is marked with the
number of the thread that generated it.

Here are some examples of error messages:

Meaning

Error message

This warning indicates that the amount of available
disk space is less than the amount that Policy Manager

Not enough disk space for a full
cache : 50 required, 0 already
occupied, only 8 more available

Proxy is set to use. Policy Manager Proxy will run more
efficiently if you free up some disk space.

This message is shown when the disk is almost full.
If the does fill up completely, it may cause
unpredictable system behavior.

Removed 74381 bytes for free
disk space smaller than cache
margins

The proxy server restricts itself to never using the last
three megabytes of disk space, but some other
application or user may fill up the disk completely.
When you see this message, you should free up some
more space on the disk.

When this line appears in the error log, look for
previous lines containing information about the same

socket 93 (92998ce:80)
main_mux(): connection broken

socket (in this case, 93) and the same address (in this
case, 92998ce:80).

A previous entry such as:

socket 103 (502fcbc7:8080)::RecvMore():
(m_http_value != m_length 4)

notifies you that the server with which Policy Manager
Proxy is trying to communicate is not valid. In this
case, an F-Secure product has probably set the wrong
IP address for Policy Manager.

F-Secure Policy Manager Proxy | Troubleshooting |

23

Summary of Contents for POLICY MANAGER PROXY 2.0 -

Page 1: ...F Secure Policy Manager Proxy Administrator s Guide...

Page 2: ......

Page 3: ...11 Configuring the product remotely 12 Chapter 4 Using the product on Linux 13 Installing the product 14 Configuring the product 15 Upgrading the product 16 Uninstalling the product 17 Frequently aske...

Page 4: ...4 F Secure Policy Manager Proxy TOC...

Page 5: ...overview of the product concepts a step by step guide to installation as well as other information you need to manage the product Topics System requirements An up to date system is a secure system Whe...

Page 6: ...r Small Business Server or Server Core editions Windows Server 2008 R2 Standard Enterprise Web Server Server Core or Foundation editions Linux Red Hat Linux Enterprise 3 or 4 Suse Linux 9 x or 10 0 Su...

Page 7: ...do the virus definitions get to F Secure products The figure above is an example of the steps the virus definition database takes to get to F Secure products in this case to F Secure Client Security...

Page 8: ...e Policy Manager Proxy To decrease the use of network bandwidth You should use F Secure Policy Manager Proxy when you have a group of workstations far away from your Policy Manager Server To decrease...

Page 9: ...y Manager Proxy Topics Locally for which you will find instructions in this section Installing the product locally Remotely for which you will find instructions in the Policy Manager Administrator s G...

Page 10: ...skipped If you select No you can continue through the following steps and select new settings 6 Select Central management with F Secure Policy Manager then click Next 7 Copy the admin pub public key...

Page 11: ...Chapter 3 Configuration F Secure Policy Manager Proxy is configured remotely through Policy Manager Console Topics Configuring the product remotely...

Page 12: ...ist of F Secure products You can select the necessary settings from the corresponding item in the tree view Explanations of each of the configuration options are shown in the help area You can configu...

Page 13: ...on Linux This section describes how to install and configure F Secure Policy Manager Proxy on Linux Topics Installing the product Configuring the product Upgrading the product Uninstalling the product...

Page 14: ...g command to start the installation Debian based distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm i f secure policy manager proxy 2 0 build 1 i386 rpm...

Page 15: ...b Specify the TCP port of the Policy Manager Proxy or HTTP proxy with which this proxy communicates on the line chained_proxy_port c If the HTTP proxy with which this proxy communicates requires a use...

Page 16: ...er the following command to upgrade the product Debian based distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm U f secure policy manager proxy 2 0 buil...

Page 17: ...ased distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm U f secure policy manager proxy 2 0 build 1 i386 rpm Note Log files and configuration files are...

Page 18: ...xy not start up To list all files and their locations enter Where are the F Secure Policy Manager Proxy files located in the Linux version dpkg L f secure policy manager proxy for Debian based distrib...

Page 19: ...rrors that have occurred The two time annotated log files are Topics The error log the error log which records any errors that have occurred and Error numbers the status report log which is a running...

Page 20: ...ere Every message in the error log contains the following information The date and time the message was generated May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open failed for...

Page 21: ...is associated with If the message reports an external error the external error code is usually specified as the reason May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open faile...

Page 22: ...he installation directory when installing the product then these paths will be relative to the path that you selected For example install_directory fspmp doc log_error_codes txt External error numbers...

Page 23: ...ill up completely it may cause unpredictable system behavior Removed 74381 bytes for free disk space smaller than cache margins The proxy server restricts itself to never using the last three megabyte...

Page 24: ...The status report log is by default located under c program files f secure fspmp reports server_status Note If you changed the installation directory when installing the product then these paths will...

Reviews: