Technical Support

Need help?

 

What do the P2P, proxy and Proxy/Repository server functionalities implemented in Endpoint Protection consist of?

Information applies to:

Products
Endpoint Protection
Endpoint Protection Plus

P2P system

The local installation and update processes in Endpoint Protection (walupg and walupd*) use a certain logic to detect whether the necessary installation or update files are available on another agent on the network. This way, the solution will get the installation or update files from another computer on the network instead of downloading them from the Internet. This logic is known as P2P system and its main objective is to reduce bandwidth consumption.

* walupg: local process for installing and updating the protection.

* walupd: local process for updating the signature file.

Operation

  • When a computer downloads a file from the Internet, it can serve it to other computers so that they don't need to connect to the Internet to get it.
  • When the computer finishes updating the virus signature file or the protection, it broadcasts information about the available files to the other computers on the network.
  • If a computer needs a file, it will first try to obtain it through the P2P system. If this fails, it will try to download it from the Internet.
  • For a computer to serve files to other computers through P2P, it must have at least 128 MB of RAM.

Proxy

The Endpoint Protection agent includes a proxy functionality, which allows the solution to work on computers without access to the Internet. The solution accesses the Internet through an agent installed on a computer with an Internet connection.

To act as a proxy for other agents, a computer must meet the following requirements:

  • Have a direct connection to the Internet.
  • Have at least 128 MB of RAM.

This system will only be used when it is not possible to access the Internet directly.

Operation

  • The agent detects it cannot access the Internet.
  • The agent broadcast a request to find the computers that can act as a proxy.
  • These computers (a maximum of 10) are listed in a file called Proxy.dat.
  • The next time the agent cannot access the Internet directly, it will try the first computer on the list.
  • Every request sent to the Proxy.dat file will be addressed at a different computer, to avoid using the same computer all the time.
  • Also, proxies have an availability indicator. When an agent on the proxy list cannot be accessed, its level of availability will decrease. The initial availability value is 3. Once it reaches 0, the computer is removed from the Proxy.dat list.

Proxy/Repository server

This feature lets the administrator select a computer for centralizing all communications with the server. Additionally, from version 6.0, this computer will store all files downloaded from the Internet, so that the other computers on the network won't have to access the Internet to obtain them, reducing bandwidth usage and increasing speed.

This feature is disabled by default, but you can enable and configure it through the Edit profile screen. Follow these steps:

  1. In the administration console, go to the Settings tab.
  2. Create a new profile by clicking the + symbol in Profiles section or edit an existing profile (click it to do so).
  3. Once in the Edit profile screen, click Advanced settings, and enable the Proxy/Repository server feature. Select a computer and click Select.

  4. Once this is complete, click OK to save changes.

Help nº- 20131115 50003 EN
ALWAYS ONLINE TO HELP YOU TWITTER FORUM
ALWAYS ONLINE TO HELP YOU TWITTER FORUM