[. . . ] F-Secure Policy Manager Proxy Administrator's Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. [. . . ] 27 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Upgrading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 26 27 4. 1 Introduction This chapter describes how to install, configure and troubleshoot F-Secure Policy Manager Proxy for Linux. 4. 2 System Requirements To install F-Secure Policy Manager Proxy for Linux, your system must meet the following minimum requirements: Processor: Memory: Disk space to install: Free disk space: Operating System: Intel Pentium III 1GHz processor or faster 512 MB of RAM or more is recommended 90 MB 100 MB of free hard disk space; 500 MB or more is recommended. Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 3 SUSE Linux 10. 0 SUSE Linux 9. x SUSE Linux Enterprise Server 9 Debian GNU Linux Sarge 3. 1 F-Secure Client Security 6 or later F-Secure Policy Manager 6 or later F-Secure Software: 4. 3 Installation 1. Open a terminal. CHAPTER 4 F-Secure Policy Manager Proxy on Linux 28 3. To install type: Debian Based Distributions dpkg -i f-secure-policy-manager-proxy_1. 0. <buil d>_i386. deb RPM Based Distributions rpm -i f-secure-policy-manager-proxy-1. 0. <bu ild>-1. i386. rpm F-Secure Policy Manager Proxy is started automatically after the installation. 4. 4 Configuration 1. Configure F-Secure Policy Manager Proxy by editing the following configuration file: /opt/etc/f-secure/fspmp/conf/proxy. cfg 2. Restart F-Secure Policy Manager Proxy to apply configuration changes by typing: # /etc/init. d/fspmp restart 4. 4. 1 Chained Proxy Configuration F-Secure Policy Manager Proxy can connect through another F-Secure Policy Manager Proxy or HTTP proxy; this is a `chained proxy configuration. ' For more information, see "Chained Proxy Configuration", 24. Open the F-Secure Policy Manager Proxy configuration file: /opt/etc/f-secure/fspmp/conf/proxy. cfg 2. Add the host name or IP address of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in chained_proxy_ip_addr= 29 3. Specify the TCP port of the F-Secure Policy Manager Proxy or HTTP Proxy with which this proxy communicates in: chained_proxy_port= 4. If the HTTP Proxy with which this proxy communicates requires a user name for authentication, enter it in: http_proxy_user= 5. If the HTTP Proxy with which this proxy communicates requires a password for authentication, enter it in: http_proxy_password= 6. Restart F-Secure Policy Manager Proxy to apply configuration changes by typing: # /etc/init. d/fspmp restart 4. 5 Upgrading 1. Type: Debian Based Distributions dpkg -i f-secure-policy-manager-proxy_1. 0. <buil d>_i386. deb RPM Based Distributions rpm -U f-secure-policy-manager-proxy-1. 0. <bu ild>-1. i386. rpm Upgrading does not change the previous configuration. CHAPTER 4 F-Secure Policy Manager Proxy on Linux 30 4. 6 Uninstallation 1. Type: Debian Based Distributions dpkg -r f-secure-policy-manager-proxy RPM Based Distributions rpm -e f-secure-policy-manager-console Log files and configuration files are not removed as these are irreplaceable and contain valuable information. To remove these, type: rm -rf /opt/f-secure/fspmp 4. 7 Frequently Asked Questions Q. Check the runtime errors, warnings and other information that are logged in /var/opt/f-secure/fspmp/log/log 31 Q. Where are the F-Secure Policy Manager Proxy files located in the Linux version? [. . . ] To connect to the Web Club directly from your Web browser, go to: http://www. f-secure. com/webclub/ Virus Descriptions on the Web F-Secure Corporation maintains a comprehensive collection of virus-related information on its Web site. To view the Virus Information Database, go to: http://www. f-secure. com/virus-info/. Advanced Technical Support For advanced technical support, go to the F-Secure Support Center at http://support. f-secure. com/ or contact your local F-Secure distributor directly. For basic technical assistance, please contact your F-Secure distributor. Please include the following information with your support request: 41 1. [. . . ]