F-Secure Internet Gatekeeper Ii | Contents | F-Secure Internet Gatekeeper

F-Secure Internet Gatekeeper Ii | Contents | F-Secure Internet Gatekeeper

F-Secure Internet Gatekeeper ii | Contents | F-Secure Internet Gatekeeper Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper......................................6 1.1 Features..............................................................................................................................................................7 Chapter 2: Deployment..................................................................................9 2.1 System requirements........................................................................................................................................10 2.2 Installing the product.......................................................................................................................................10 2.2.1 Pre-installation checklist...................................................................................................................10 2.2.2 Installing an rpm package................................................................................................................10 2.2.3 Installing a tar.gz package.................................................................................................................11 2.2.4 Installing the product on RHEL 8 and CentOS 8...............................................................................12 2.3 Upgrading the product ....................................................................................................................................12 2.3.1 Upgrading Internet Gatekeeper, international version.....................................................................12 2.3.2 Upgrading Internet Gatekeeper, Japanese version ..........................................................................12 2.4 Uninstallation...................................................................................................................................................14 2.4.1 Uninstalling the rpm package...........................................................................................................14 2.4.2 Uninstalling the tar.gz package........................................................................................................14 Chapter 3: Typical configurations.................................................................15 3.1 Traffic scanning.................................................................................................................................................16 3.1.1 HTTP connection...............................................................................................................................16 3.1.2 SMTP connection...............................................................................................................................16 3.1.3 POP connection ................................................................................................................................17 3.1.4 FTP connection .................................................................................................................................17 3.2 Network configuration examples.....................................................................................................................18 3.3 Internet Gatekeeper server settings ................................................................................................................19 3.3.1 Accessing the web user interface......................................................................................................19 3.3.2 Typical configuration........................................................................................................................20 3.3.3 Client settings...................................................................................................................................20 3.4 Using HTTP proxy for services that require a network access .........................................................................21 3.5 Checking the product setup.............................................................................................................................21 Chapter 4: Using the product.......................................................................22 4.1 HTTP proxy.......................................................................................................................................................23 4.1.1 Editing HTTP proxy settings..............................................................................................................23 4.2 SMTP proxy......................................................................................................................................................24 4.2.1 Editing SMTP proxy settings.............................................................................................................24 4.3 POP proxy........................................................................................................................................................27 4.3.1 Editing POP proxy settings................................................................................................................27 4.4 FTP proxy.........................................................................................................................................................30 4.4.1 Editing FTP proxy settings................................................................................................................30 F-Secure Internet Gatekeeper | Contents | iii 4.5 ICAP service......................................................................................................................................................31 4.5.1 Editing ICAP service settings.............................................................................................................31 4.5.2 EMC Isilon Scale-Out Storage support.............................................................................................32 4.6 Global settings.................................................................................................................................................32 4.6.1 Editing Global settings......................................................................................................................32 4.7 Virus definition updates...................................................................................................................................37 4.7.1 Virus definition update settings........................................................................................................37 4.8 System information.........................................................................................................................................38 4.8.1 Viewing system information.............................................................................................................38 4.8.2 System information status...............................................................................................................38 4.8.3 Run diagnostics................................................................................................................................38 4.8.4 Download log files...........................................................................................................................38 4.8.5 Back up and restore the configuration............................................................................................38 4.9 License.............................................................................................................................................................39 4.9.1 Updating the product license...........................................................................................................39 4.9.2 Viewing the privacy policy...............................................................................................................39 4.10 Admin password............................................................................................................................................39 4.10.1 Changing the password..................................................................................................................39 4.11 Web user interface language.........................................................................................................................40 4.11.1 Changing the language...................................................................................................................40 Chapter 5: Advanced settings.......................................................................41 5.1 Proxy settings...................................................................................................................................................42 5.1.1 HTTP proxy........................................................................................................................................42 5.1.2 SMTP proxy .......................................................................................................................................43 5.1.3 POP proxy.........................................................................................................................................46 5.1.4 FTP proxy..........................................................................................................................................48 5.1.5 Common settings .............................................................................................................................49

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    128 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us