background image

System requirements

The system requirements for the product are listed here.

To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements:

Windows:

Operating system:

Windows Server 2003 SP1 or higher (32-bit);
Standard, Enterprise, Small Business Server or
Web Server editions

Windows Server 2003 SP1 or higher (64-bit);
Standard or Enterprise editions

Windows Server 2008 SP1 (32-bit); Standard,
Enterprise, Web Server or Server Core editions

Windows Server 2008 SP1 (64-bit); Standard,
Enterprise, Web Server, Small Business Server or
Server Core editions

Windows Server 2008 R2; Standard, Enterprise,
Web Server, Server Core or Foundation editions

Linux:

Red Hat Linux Enterprise 3 or 4

Suse Linux 9.x or 10.0

Suse Linux Enterprise Server 9

Debian GNU Linux Sarge 3.1

Pentium III 450MHz, 1GHz or faster is recommended.

Processor:

256 MB of RAM, 512 MB is recommended.

Memory:

500 MB of free hard disk space.

Disk space:

10-Mbit connection, 100-Mbit connection
recommended.

Network:

Supported F-Secure software:

F-Secure Policy Manager

F-Secure Client Security

F-Secure Anti-Virus for Workstations

F-Secure Anti-Virus for Windows/Citrix Servers

F-Secure Anti-Virus for MS Exchange

F-Secure Linux Security

6

| F-Secure Policy Manager Proxy | Introduction

Summary of Contents for POLICY MANAGER PROXY 2.0 -

Page 1: ...F Secure Policy Manager Proxy Administrator s Guide...

Page 2: ......

Page 3: ...11 Configuring the product remotely 12 Chapter 4 Using the product on Linux 13 Installing the product 14 Configuring the product 15 Upgrading the product 16 Uninstalling the product 17 Frequently aske...

Page 4: ...4 F Secure Policy Manager Proxy TOC...

Page 5: ...overview of the product concepts a step by step guide to installation as well as other information you need to manage the product Topics System requirements An up to date system is a secure system Whe...

Page 6: ...r Small Business Server or Server Core editions Windows Server 2008 R2 Standard Enterprise Web Server Server Core or Foundation editions Linux Red Hat Linux Enterprise 3 or 4 Suse Linux 9 x or 10 0 Su...

Page 7: ...do the virus definitions get to F Secure products The figure above is an example of the steps the virus definition database takes to get to F Secure products in this case to F Secure Client Security...

Page 8: ...e Policy Manager Proxy To decrease the use of network bandwidth You should use F Secure Policy Manager Proxy when you have a group of workstations far away from your Policy Manager Server To decrease...

Page 9: ...y Manager Proxy Topics Locally for which you will find instructions in this section Installing the product locally Remotely for which you will find instructions in the Policy Manager Administrator s G...

Page 10: ...skipped If you select No you can continue through the following steps and select new settings 6 Select Central management with F Secure Policy Manager then click Next 7 Copy the admin pub public key...

Page 11: ...Chapter 3 Configuration F Secure Policy Manager Proxy is configured remotely through Policy Manager Console Topics Configuring the product remotely...

Page 12: ...ist of F Secure products You can select the necessary settings from the corresponding item in the tree view Explanations of each of the configuration options are shown in the help area You can configu...

Page 13: ...on Linux This section describes how to install and configure F Secure Policy Manager Proxy on Linux Topics Installing the product Configuring the product Upgrading the product Uninstalling the product...

Page 14: ...g command to start the installation Debian based distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm i f secure policy manager proxy 2 0 build 1 i386 rpm...

Page 15: ...b Specify the TCP port of the Policy Manager Proxy or HTTP proxy with which this proxy communicates on the line chained_proxy_port c If the HTTP proxy with which this proxy communicates requires a use...

Page 16: ...er the following command to upgrade the product Debian based distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm U f secure policy manager proxy 2 0 buil...

Page 17: ...ased distributions dpkg i f secure policy manager proxy_2 0 build _i386 deb RPM based distributions rpm U f secure policy manager proxy 2 0 build 1 i386 rpm Note Log files and configuration files are...

Page 18: ...xy not start up To list all files and their locations enter Where are the F Secure Policy Manager Proxy files located in the Linux version dpkg L f secure policy manager proxy for Debian based distrib...

Page 19: ...rrors that have occurred The two time annotated log files are Topics The error log the error log which records any errors that have occurred and Error numbers the status report log which is a running...

Page 20: ...ere Every message in the error log contains the following information The date and time the message was generated May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open failed for...

Page 21: ...is associated with If the message reports an external error the external error code is usually specified as the reason May 28 12 20 28 461 2 ERR 00017999 379 iad_open A library system call open faile...

Page 22: ...he installation directory when installing the product then these paths will be relative to the path that you selected For example install_directory fspmp doc log_error_codes txt External error numbers...

Page 23: ...ill up completely it may cause unpredictable system behavior Removed 74381 bytes for free disk space smaller than cache margins The proxy server restricts itself to never using the last three megabyte...

Page 24: ...The status report log is by default located under c program files f secure fspmp reports server_status Note If you changed the installation directory when installing the product then these paths will...

Reviews: