F-Secure Internet Gatekeeper Ii | Contents | F-Secure Internet Gatekeeper
Total Page:16
File Type:pdf, Size:1020Kb
F-Secure Internet Gatekeeper ii | Contents | F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper......................................6 1.1 Features..............................................................................................................................................................7 Chapter 2: Deployment..................................................................................9 2.1 System requirements........................................................................................................................................10 2.2 Installing the product.......................................................................................................................................10 2.2.1 Pre-installation checklist...................................................................................................................10 2.2.2 Installing an rpm package................................................................................................................10 2.2.3 Installing a tar.gz package.................................................................................................................11 2.2.4 Installing the product on RHEL 8 and CentOS 8...............................................................................12 2.3 Upgrading the product ....................................................................................................................................12 2.3.1 Upgrading Internet Gatekeeper, international version.....................................................................12 2.3.2 Upgrading Internet Gatekeeper, Japanese version ..........................................................................12 2.4 Uninstallation...................................................................................................................................................14 2.4.1 Uninstalling the rpm package...........................................................................................................14 2.4.2 Uninstalling the tar.gz package........................................................................................................14 Chapter 3: Typical configurations.................................................................15 3.1 Traffic scanning.................................................................................................................................................16 3.1.1 HTTP connection...............................................................................................................................16 3.1.2 SMTP connection...............................................................................................................................16 3.1.3 POP connection ................................................................................................................................17 3.1.4 FTP connection .................................................................................................................................17 3.2 Network configuration examples.....................................................................................................................18 3.3 Internet Gatekeeper server settings ................................................................................................................19 3.3.1 Accessing the web user interface......................................................................................................19 3.3.2 Typical configuration........................................................................................................................20 3.3.3 Client settings...................................................................................................................................20 3.4 Using HTTP proxy for services that require a network access .........................................................................21 3.5 Checking the product setup.............................................................................................................................21 Chapter 4: Using the product.......................................................................22 4.1 HTTP proxy.......................................................................................................................................................23 4.1.1 Editing HTTP proxy settings..............................................................................................................23 4.2 SMTP proxy......................................................................................................................................................24 4.2.1 Editing SMTP proxy settings.............................................................................................................24 4.3 POP proxy........................................................................................................................................................27 4.3.1 Editing POP proxy settings................................................................................................................27 4.4 FTP proxy.........................................................................................................................................................30 4.4.1 Editing FTP proxy settings................................................................................................................30 F-Secure Internet Gatekeeper | Contents | iii 4.5 ICAP service......................................................................................................................................................31 4.5.1 Editing ICAP service settings.............................................................................................................31 4.5.2 EMC Isilon Scale-Out Storage support.............................................................................................32 4.6 Global settings.................................................................................................................................................32 4.6.1 Editing Global settings......................................................................................................................32 4.7 Virus definition updates...................................................................................................................................37 4.7.1 Virus definition update settings........................................................................................................37 4.8 System information.........................................................................................................................................38 4.8.1 Viewing system information.............................................................................................................38 4.8.2 System information status...............................................................................................................38 4.8.3 Run diagnostics................................................................................................................................38 4.8.4 Download log files...........................................................................................................................38 4.8.5 Back up and restore the configuration............................................................................................38 4.9 License.............................................................................................................................................................39 4.9.1 Updating the product license...........................................................................................................39 4.9.2 Viewing the privacy policy...............................................................................................................39 4.10 Admin password............................................................................................................................................39 4.10.1 Changing the password..................................................................................................................39 4.11 Web user interface language.........................................................................................................................40 4.11.1 Changing the language...................................................................................................................40 Chapter 5: Advanced settings.......................................................................41 5.1 Proxy settings...................................................................................................................................................42 5.1.1 HTTP proxy........................................................................................................................................42 5.1.2 SMTP proxy .......................................................................................................................................43 5.1.3 POP proxy.........................................................................................................................................46 5.1.4 FTP proxy..........................................................................................................................................48 5.1.5 Common settings .............................................................................................................................49