ESET Gateway SecurityInstallation Manualand User Guide
10After purchasing ESET Gateway Security, you will receive your authorization data (username/password and license key). This data is necessary for bot
Chapter 4:Architecture Overview
12ESET Gateway SecurityOnce ESET Gateway Security is successfully installed, you should become familiar with its architecture.The structur
13@ETCDIR@/esets.cfgThis is the most important conguration le, as it controls all major aspects of the product‘s functionality. The esets.cfg le i
Chapter 5:Integration with Internet Gateway services
16ESET Gateway SecurityESET Gateway Security protects the organization’s HTTP and FTP services against viruses, worms, trojans, spyware, ph
175.2. Manual HTTP/FTP proxy con gurationThe manual proxy con guration (see Figure 5-2) is characterized by explicitly con guring the proxied user
18ESET Gateway SecurityTo congure Firefox to use esets_http, click Tools > Options from the main menu, and click Advanced. Click the Network
19 cache_peer192.168.1.10parent80800no-query prefer_directoffTo reread the newly created con guration, reload the ESETS daemon.5.3. Inter
2ESET Gateway SecurityTable of contents1. Introduction ...32.
20ESET Gateway SecurityThe second step of the ICAP conguration method is activating the ICAP client functionality within the Proxy Cache. The IC
21To enable this technique, the parameter lo_partscan_enabled is entered in the [http] section of the ESETS conguration le. This will cause large ob
22ESET Gateway Securityconguration by clicking the Save settings button.Comment:ESETGatewaySecurityProles:antivirus The SafeSquid plug-i
Chapter 6:Important ESET Gateway Security mechanisms
24ESET Gateway Security6.1. Handle Object PolicyThe Handle Object Policy (see gure 6-1) mechanism provides ltering of scanned objects based on t
25 [http] agent_enabled=yes listen_addr=”192.168.1.10” listen_port=8080 action_av=”scan” To provide individual parameter
26ESET Gateway SecurityTo create the ‘white-list’ used by esets_http it is necessary to create the following group section within the sp
27Substitute your own values for the parameters in italics and direct your browser to ’https://address:port’ (note the https). Login with ’name/pass’.
Chapter 7:ESET Security system update
Chapter 1:Introduction
30ESET Gateway Security7.1. ESETS update utilityTo maintain the eectiveness of ESET Gateway Security, the virus signature database must be kept u
317.3. ESETS mirror http daemonESETS mirror http daemon is installed automatically with ESET Gateway Security. The http mirror daemon starts if the o
Chapter 8:Let us know
34ESET Gateway SecurityDear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET Gatewa
Appendix A. ESETS setup process description
36ESET Gateway SecurityA.1. Setting ESETS for scanning of HTTP communication - transparent modeHTTP scanning is performed using the esets_http daemon
37If IP-ltering is being performed by the iptables administration tool, the rule is: iptables-tnat-APREROUTING-ptcp-iif0\ --dport21
Appendix B. PHP License
4ESET Gateway SecurityDear user, you have acquired ESET Gateway Security - the premier security system running under the Linux/BSD/Solaris OS. As you
40ESET Gateway SecurityThe PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved.Redistribution and use in source a
Chapter 2:Terminology and abbreviations
6ESET Gateway SecurityIn this section we will review the terms and abbreviations used in this document. Note that a boldface font is reserved for pro
7abbreviation @BINDIR@ will be used for future references to this directory. The @BINDIR@ value for the following Operating Systems is listed below:
Chapter 3:Installation
Comments to this Manuals