F-SECURE POLICY MANAGER PROXY - Administrator's Manual

Summary of POLICY MANAGER PROXY -

  • Page 1

    F-secure policy manager proxy administrator’s guide.

  • Page 2

    "f-secure" and the triangle symbol are registered trademarks of f-secure corporation and f-secure product names and symbols/logos are either trademarks or registered trademarks of f-secure corporation. All product names referenced herein are trademarks or registered trademarks of their respective co...

  • Page 3

    Iii contents about this guide 5 how this guide is organized .............................................................................................. 6 who should use this guide ................................................................................................ 7 conventions used i...

  • Page 4

    Iv 4.2 system requirements................................................................................................ 27 4.3 installation .................................................................................................................. 27 4.4 configuration.........................

  • Page 5

    5 a bout t his g uide how this guide is organized...................................................... 6 who should use this guide ....................................................... 7 conventions used in f-secure guides ....................................... 8.

  • Page 6

    About this guide 6 how this guide is organized the f-secure policy manager proxy administrator’s guide provides an overview of f-secure policy manager proxy concepts, a step-by-step guide to installation and all the information you need to set up and manage your f-secure policy manager proxy. F-secu...

  • Page 7

    7 who should use this guide this guide is intended for system administrators. It is assumed that the reader has: working knowledge of microsoft windows server operating systems. A basic understanding of the internet and tcp/ip protocols..

  • Page 8

    8 conventions used in f-secure guides this section describes the symbols, fonts, and terminology used in this manual. Symbols ⇒ an arrow indicates a one-step procedure. Fonts arial bold (blue) is used to refer to menu names and commands, to buttons and other items in a dialog box. Arial italics (blu...

  • Page 9

    9 courier new bold is used for information that you must type. Small caps ( black ) is used for a key or key combination on your keyboard. Arial underlined (blue) is used for user interface links. Arial italics is used for window and dialog box names. Pdf document this manual is provided in pdf (por...

  • Page 10

    10 1 i ntroduction an up-to-date system is a secure system............................... 11 when should you use f-secure policy manager proxy?.......... 12 how are f-secure policy manager proxy and f-secure anti-virus proxy different?....................................................................

  • Page 11

    11 1.1 an up-to-date system is a secure system to be protected, a workstation must have the latest defence against viruses and other malware that exist in the internet. What is the virus definition database? Information against known viruses, worms and other malware are compiled into the virus defin...

  • Page 12

    Chapter 1 12 introduction what does f-secure policy manager do? F-secure policy manager allows you to centrally manage all the f-secure products in your network. It is the central monitoring and configuration point for your network. What does f-secure policy manager proxy do? F-secure policy manager...

  • Page 13

    13 figure 1-2 on the right, with f-secure policy manager proxy, the number of slow connections is dramatically reduced. There are three reasons to use f-secure policy manager proxy: to decrease network bandwidth usage you should use f-secure policy manager proxy when you have a group of workstations...

  • Page 14

    Chapter 1 14 introduction to decrease f-secure policy manager hardware load you should use f-secure policy manager proxy, if the server hardware running the f-secure policy manager is unable to cope with the number of virus definition database requests it receives. 1.3 how are f-secure policy manage...

  • Page 15

    15 2 i nstallation system requirements ................................................................ 16 installing f-secure policy manager proxy.................................. 16.

  • Page 16

    Chapter 2 16 installation 2.1 system requirements to install f-secure policy manager proxy, your system must meet the following minimum requirements: 2.2 installing f-secure policy manager proxy there are two possible methods of installing f-secure policy manager proxy: locally; see further instruct...

  • Page 17

    17 step 1. 1. Run the setup.Exe file. 2. Click the next button on the first screen of the installer. 3. Read through the license agreement and click the i accept this agreement option. Click next . 4. Select the custom option and click next to continue. Figure 2-1 custom installation.

  • Page 18

    Chapter 2 18 installation 5. Make sure the box next to f-secure policy manager proxy is checked and click next . Figure 2-2 components.

  • Page 19

    19 6. Select where to install f-secure policy manager proxy in the dialog by clicking the browse button. Click next . Figure 2-3 installation folder 7. If a previous installation of an f-secure product is detected, you will be asked if you would like to use the same settings as the previous installe...

  • Page 20

    Chapter 2 20 installation 8. Select the central management with f-secure policy manager option and click next . Figure 2-4 central management 9. Copy the public key file, admin.Pub from the f-secure policy manager server to the local file system. Click browse and select this key file. Click next fig...

  • Page 21

    21 10. Enter the ip address of the f-secure policy manager server you wish the f-secure policy manager proxy to communicate with. Click next figure 2-6 f-secure policy manager server ip address 11. Click start to begin. 12. When the progress bar is full, click next . 13. F-secure policy manager prox...

  • Page 22

    22 3 c onfiguration overview..................................................................................... 23 remote configuration................................................................. 23.

  • Page 23

    23 3.1 overview f-secure policy manager proxy is configured remotely through the f-secure policy manager console. 3.2 remote configuration configuring f-secure policy manager proxy remotely is done in the f-secure policy manager console through the advanced editing mode. To enter this mode: 1. Go to...

  • Page 24

    Chapter 3 24 configuration figure 3-1 the f-secure policy manager console showing the settings available for the f-secure policy manager proxy. You can find explanations of each of the configuration options in the help area (see figure 3-1). 3.2.1 chained proxy configuration f-secure policy manager ...

  • Page 25

    25 figure 3-2 an example chained proxy configuration. A chained proxy configuration may be necessary to: traverse network boundaries or, reduce load from f-secure policy manager server. )6hfxuh 3rolf\ 0dqdjhu 3ur[\ ([wud3ur[\ )6hfxuh 3rolf\0dqdjhu 3ur[\ru+773 3ur[\ )6hfxuh 3rolf\ 0dqdjhu )6hfxuh9lux...

  • Page 26

    26 4 f-s ecure p olicy m anager p roxy on l inux introduction................................................................................. 27 system requirements ................................................................ 27 installation ........................................................

  • Page 27

    27 4.1 introduction this chapter describes how to install, configure and troubleshoot f-secure policy manager proxy for linux. 4.2 system requirements to install f-secure policy manager proxy for linux, your system must meet the following minimum requirements: 4.3 installation 1. Log in as root. 2. ...

  • Page 28

    Chapter 4 28 f-secure policy manager proxy on linux 3. To install type: f-secure policy manager proxy is started automatically after the installation. 4.4 configuration 1. Configure f-secure policy manager proxy by editing the following configuration file: /opt/etc/f-secure/fspmp/conf/proxy.Cfg 2. R...

  • Page 29

    29 3. Specify the tcp port of the f-secure policy manager proxy or http proxy with which this proxy communicates in: chained_proxy_port= 4. If the http proxy with which this proxy communicates requires a user name for authentication, enter it in: http_proxy_user= 5. If the http proxy with which this...

  • Page 30

    Chapter 4 30 f-secure policy manager proxy on linux 4.6 uninstallation 1. Log in as root. 1. Open a terminal. 2. Type: 4.7 frequently asked questions q. How can i check that f-secure policy manager proxy is running? A. You can check this by typing: /etc/init.D/fspmp status q. How can i start f-secur...

  • Page 31

    31 q. Where are the f-secure policy manager proxy files located in the linux version? A. To list all files and their places type: q. Can i configure f-secure policy manager proxy not to start on system start up? A. Yes, type: to configure f-secure policy manager proxy to start on system start up aga...

  • Page 32

    32 5 t roubleshooting overview..................................................................................... 33 the error log ............................................................................. 33 reading the error log ...................................................................

  • Page 33

    33 5.1 overview the f-secure policy manager proxy keeps detailed logs of activity and any errors that have occurred. Two time-annotated log files kept: the “ the error log ”, 33; a record of any errors that occurred, the “ the status report log ”, 37; a running summary of the f-secure policy manager...

  • Page 34

    Chapter 5 34 troubleshooting may-28-12:20:28.461 2-err 00017999 379 iad_open(): a library/system-call open() failed for file c:\program files\f-secure\fspmp\data\misc\license.Dat, see errno (reason: 2) the message level, as explained in the section “ message levels ”. The level is written both as a ...

  • Page 35

    35 the message may also include the following if it was due to an error: the reason for the error, which may include one or both of the following: if the message reports an error that was a consequence of a previous message (issued by the same thread), the reason usually specifies the original messa...

  • Page 36

    Chapter 5 36 troubleshooting 5.4 error numbers every error message written to the log contains an error number. This number uniquely specifies what went wrong.There are two types of errors: internal errors; those generated by f-secure policy manager proxy. External errors; those generated by the ope...

  • Page 37

    37 5.5.1 some example error messages 5.6 the status report log the status report log contains regular summaries of f-secure policy manager proxy’s status. Error message meaning not enough disk space for a full cache : 50 required, 0 already occupied, only 8 more available this warning indicates that...

  • Page 38

    Chapter 5 38 troubleshooting every 10 minutes, f-secure policy manager proxy creates a record in the status report log which contains the date, time and various counters (packets count, connected client count, etc.). The status report log is located, by default at: c:\program files\f-secure\fspmp\lo...

  • Page 39

    39 technical support overview..................................................................................... 40 web club.................................................................................... 40 advanced technical support...................................................... 40 f-...

  • Page 40

    Technical support 40 overview f-secure technical support is available by e-mail and from the f-secure web site. You can access our web site from within your f-secure application or from your web browser. Web club the f-secure web club provides assistance to users of f-secure products. To enter, choo...

  • Page 41

    41 1. Name and version number of your f-secure software program (including the build number). 2. Name and version number of your operating system (including the build number). 3. A detailed description of the problem, including any error messages displayed by the program, and any other details, whic...

  • Page 42

    Technical support 42 the courses take place in modern and well-equipped classrooms. All of our courses consist of theory and hands-on parts. At the end of each course there is a certification exam. Contact your local f-secure office or f-secure certified training partner to get information about the...

  • Page 43

    About f-secure corporation f-secure corporation is the fastest growing publicly listed company in the antivirus and intrusion prevention industry with more than 50% revenue growth in 2004. Founded in 1988, f-secure has been listed on the helsinki stock exchange since 1999. We have our headquarters i...