Specifications

3
7.2.2 dbupdate.........................................................................................................72
7.3 Firewall Protection......................................................................................................72
7.3.1 fsfwc ...............................................................................................................73
7.4 Integrity Checking ......................................................................................................73
7.4.1 fsic ..................................................................................................................73
7.4.2 fsims ...............................................................................................................74
7.5 General Command Line Tools ...................................................................................74
7.5.1 fssetlanguage .................................................................................................74
7.5.2 fsma................................................................................................................75
7.5.3 fsav-config ......................................................................................................76
AppendixA Installation Prerequisites 77
A.1 All 64-bit Distributions ............................................................................................... 78
A.2 Red Hat Enterprise Linux 4........................................................................................78
A.3 Debian 3.1 and Ubuntu 5.04, 5.10, 6.06 ....................................................................79
A.4 SuSE..........................................................................................................................80
A.5 Turbolinux 10 .............................................................................................................80
AppendixB Installing Required Kernel Modules Manually 81
B.1 Introduction ............................................................................................................... 82
B.2 Before Installing Required Kernel Modules................................................................82
B.3 Installation Instructions...............................................................................................82
AppendixC List of Used System Resources 84
C.1 Overview ................................................................................................................... 85
C.2 Installed Files .............................................................................................................85
C.3 Network Resources....................................................................................................85
C.4 Memory ......................................................................................................................86
C.5 CPU............................................................................................................................86
AppendixD Troubleshooting 87
D.1 User Interface............................................................................................................ 88
D.2 F-Secure Policy Manager...........................................................................................89