![]() |
NoteICAPS is not available for ICAP clients using SSLv2 or SSLv3 for SSL handshake. IWSVA
only supports TLSv1, TLSv1.1, and TLSv1.2 for secure ICAP communication.
|
X-Virus-ID: EICAR Test String
![]() |
NoteSome ICAP clients do not offer the recursive group membership search. For example,
if a user belongs to group A, and group A belongs to group B, the ICAP client only
sends group A information in the header. If you require recursive group membership
information, Trend Micro recommends disabling the x_authenticated_groups header.
|
Configuration Parameter | Details | Recommended Value |
HTTP Listening port | This is the port that IWSVA listens on to receive connections for ICAP. | 1344 |
Enable ICAP over SSL | Enable/Disable secure ICAP communication | Disable |
ICAPS Port Number | This is the port that IWSVA listens on to receive connections for ICAPS. | 11344 |
Certificate | Import server certificates for SSL-secured requests from clients. | |
Private Key | Import the private key for SSL-secured communication. | |
Passphrase | Enter the passphrase for the private key. | |
Confirm Passphrase | Enter the passphrase again to confirm. | |
Enable X-Virus-ID ICAP header (check box) | Enable / Disable the ICAP short name of the infection detected being recorded. | Disable |
Enable X-Infection-Found ICAP header (check box) | Enable / Disable ICAP details regarding malware detected and passing details back to the ICAP device | Disable |
Enable X-Authenticated-User ICAP header | Enable / Disable ICAP details about username information. | Check (enable) |
Enable X-Authenticated-Groups ICAP Header | Enable / Disable ICAP details about group membership information. | Disable |
![]() |
NoteComplete all steps in the Deployment Wizard to deploy in ICAP mode. After receiving
a successful deployment message, configure the IWSVA ICAP set up.
|