User manual F-SECURE POLICY MANAGER PROXY 2.0 ADMINISTRATOR GUIDE

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual F-SECURE POLICY MANAGER PROXY 2.0. We hope that this F-SECURE POLICY MANAGER PROXY 2.0 user guide will be useful to you.

Lastmanuals help download the user guide F-SECURE POLICY MANAGER PROXY 2.0.


Mode d'emploi F-SECURE POLICY MANAGER PROXY 2.0
Download
Manual abstract: user guide F-SECURE POLICY MANAGER PROXY 2.0ADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] F-Secure Policy Manager allows you to centrally manage all the F-Secure products in your network. It is the central monitoring and configuration point for your network. See the F-Secure Policy Manager Administrator's Guide, available on the F-Secure web site at http://www. f-secure. com for more details. What does F-Secure Policy Manager Proxy do? [. . . ] For more information about policies and remote configuration, see the Policy Manager Administrator's guide, which is available on the F-Secure web site at http://www. f-secure. com. Chapter 3 Configuration Topics: · Configuring the product remotely F-Secure Policy Manager Proxy is configured remotely through Policy Manager Console. 12 | F-Secure Policy Manager Proxy | Configuration Configuring the product remotely You can configure F-Secure Policy Manager Proxy remotely in F-Secure Policy Manager Console. To configure F-Secure Policy Manager Proxy in Policy Manager Console: 1. Select View Advanced Mode from the menu. Select F-Secure Policy Manager Proxy from the list of F-Secure products. You can select the necessary settings from the corresponding item in the tree view. Explanations of each of the configuration options are shown in the help area. You can configure F-Secure Policy Manager Proxy to connect through another F-Secure Policy Manager Proxy or HTTP proxy. This type of configuration is called a chained proxy configuration, and it might be needed to: · · cross network boundaries, or reduce the load on Policy Manager Server. Chapter 4 Using the product on Linux Topics: · · · · · Installing the product Configuring the product Upgrading the product Uninstalling the product Frequently asked questions This section describes how to install and configure F-Secure Policy Manager Proxy on Linux. 14 | F-Secure Policy Manager Proxy | Using the product on Linux Installing the product This topic describes how to install F-Secure Policy Manager Proxy on Linux. Enter the following command to start the installation: · · Debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2. 0. <build>_i386. deb. RPM-based distributions: rpm -i f-secure-policy-manager-proxy-2. 0. <build>-1. i386. rpm. F-Secure Policy Manager Proxy will start up automatically once the installation is complete. F-Secure Policy Manager Proxy | Using the product on Linux | 15 Configuring the product This topic describes how to configure F-Secure Policy Manager Proxy on Linux. Configure F-Secure Policy Manager Proxy by editing the /opt/etc/f-secure/fspmp/conf/proxy. cfg file. For example, f you need to configure chained proxies: a) Add the host name or IP address of the Policy Manager Proxy or HTTP proxy with which this proxy communicates to the line chained_proxy_ip_addr=. b) Specify the TCP port of the Policy Manager Proxy or HTTP proxy with which this proxy communicates on the line chained_proxy_port=. c) If the HTTP proxy with which this proxy communicates requires a user name for authentication, add the user name to the line http_proxy_user=. d) If the HTTP proxy with which this proxy communicates requires a password for authentication, add the password to the line http_proxy_password=. Restart F-Secure Policy Manager Proxy to apply the configuration changes by entering the command /etc/init. d/fspmp restart. 16 | F-Secure Policy Manager Proxy | Using the product on Linux Upgrading the product This topic describes how to upgrade F-Secure Policy Manager Proxy on Linux. Enter the following command to upgrade the product: · · Debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2. 0. <build>_i386. deb. RPM-based distributions: rpm -U f-secure-policy-manager-proxy-2. 0. <build>-1. i386. rpm. Upgrading the product does not change the previous configuration. F-Secure Policy Manager Proxy | Using the product on Linux | 17 Uninstalling the product This topic describes how to uninstall F-Secure Policy Manager Proxy from your Linux system. The error log file is used to store messages generated by F-Secure Policy Manager Proxy. Some of the messages provide information about normal operations (startup, shutdown and daily maintenance, for example). In addition to the current error log file, three previous error log files are kept. By default, these are located as follows: · · · · c:\program c:\program c:\program c:\program files\f-secure\fspmp\log\log (current log file). [. . . ] When you see this message, you should free up some more space on the disk. socket 93 (92998ce:80) main_mux(): connection broken When this line appears in the error log, look for previous lines containing information about the same socket (in this case, 93) and the same address (in this case, 92998ce:80). A previous entry such as: socket 103 (502fcbc7:8080)::RecvMore(): (m_http_value != m_length_value + 4) notifies you that the server with which Policy Manager Proxy is trying to communicate is not valid. In this case, an F-Secure product has probably set the wrong IP address for Policy Manager. Removed 74381 bytes for free disk space smaller than cache margins 24 | F-Secure Policy Manager Proxy | Troubleshooting The status report log The status report log contains regular summaries of the status of Policy Manager Proxy. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE POLICY MANAGER PROXY 2.0

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE POLICY MANAGER PROXY 2.0 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag