ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
1. Introduction Dear user, you have acquired ESET Gateway Security - the premier security system running under the Linux, BSD and Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux, BSD and Solaris OS server.
Page 4
Low system requirements To run efficiently, ESET Gateway Security requires just 16MB of hard-disk space and 32MB of RAM. It runs smoothly under the 2.2.x, 2.4.x and 2.6.x Linux OS kernel versions as well as under 5.x, 6.x FreeBSD OS kernel versions.
ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r. o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
Page 6
Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET Gateway Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems...
After purchasing ESET Gateway Security, you will receive your authorization data (username/password and license key). This data is necessary for both identifying you as our customer and allowing you to download updates for ESET Gateway Security. The username/password data is also required for downloading the initial installation package from our web site.
CORE The Core of ESET Gateway Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc. Please refer to the esets_daemon(8) man page for details.
All HTTP (or FTP) communication with outbound servers is then routed via network gateway server, where ESET Gateway Security must be installed in order to scan the communication for infiltrations. For this purpose, a generic ESETS HTTP (or FTP) filter has been developed, called esets_http (or esets_ftp).
Manual proxy configuration of Mozilla Firefox The manual HTTP/FTP proxy configuration of esets_http with Mozilla Firefox is illustrated on Figure 5-2. This configuration allows ESET Gateway Security to be installed anywhere within the local network, including the gateway server and the user agent’s computer.
The manual HTTP proxy configuration of esets_http with the Squid Web Proxy Cache is illustrated by the right hand side of Figure 5-2. The significant difference from the previously described configuration is that ESET Gateway Security is installed on the HTTP/FTP Gateway between the proxy cache (Squid Web Proxy in this example) and the Internet. Thus, all inbound HTTP/FTP communications are first scanned for infiltrations and then stored in the dedicated network cache.
ICAP request. The Proxy Cache must also work in this case as the ICAP client and pass the ICAP request for the message adaptation to ESET Gateway Security, namely to a generic ESETS ICAP server - esets_icap.
To integrate the module, you must create links from the SafeSquid modules directory to the appropriate installation locations of the ESET Gateway Security package. In the following examples, it is assumed that SafeSquid is installed on a Linux OS in the ‘/opt/safesquid‘ directory.
Page 14
Config menu from the main interface page and browse Select a Section to Configure until you find ESET Gateway Security. Click Submit and create the antivirus profile for the ESET Gateway Security section by clicking the Add button at the bottom. Define the below parameters within the list that appears and click Submit. Remember to save the Safesquid configuration by clicking the Save settings button.
6. Important ESET Gateway Security mechanisms 6.1 Handle Object Policy The Handle Object Policy (see figure 6-1) mechanism provides filtering of scanned objects based on their status. This functionality is based on the following configuration options: action_av action_av_infected action_av_notscanned action_av_deleted For detailed information on these options, please refer to the esets.cfg(5) man page.
All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
In addition, users can choose to provide the ESET virus laboratory team with supplementary information using the ‘samples_provider_mail’ and/or ‘samples_provider_country’ configuration options. The information collected using these options will assist in providing the ESET team with an overview about a given infiltration which may be spreading over the Internet.
If you want to import new license files, use the following command: /usr/sbin/esets_lic --import *.lic Figure 6-2. ESET Licenses. You can enable the license notification option in the Global section options. If enabled, this functionality will notify you 30 days prior to your license expiration.
Using the web interface: Figure 6-3. ESETS - Configuration > HTTP Proxy. Always remember to save your new configuration by clicking Save changes. To apply your new changes click the Apply changes button in the Configuration sections panel. 6.5.2.1 HTTP Agent testing with the Mozilla Firefox To test ESETS HTTP Agent on your local machine, you need to set the local proxy server to localhost:8080.
If attempt to open an infected file, a warning message similar to the one on the figure below will display in your browser window: Figure 6-6. ESETS warning message. 6.5.3 Statistics You can view statistics for all of active ESETS agents here. Statistics summary refreshes every 10 seconds. Figure 6-5.
Sends all non-debug messages to Event logs These functionalities are not supported: Firewall Log Remote installation For more information, please read the ESET Remote Administrator manual. This manual is located on our web site at the following link: http://www.eset.com/documentation 6.6.1...
Page 22
By using ERA Console you can create a configuration task to ESETS daemon from ERA Console: Right click the connected Client Name Navigate to New Task > Configuration Task > Create... Expand Unix ESET Security tree For an example of a configuration task by the DAC agent, see below: Figure 6-7. ERA Configuration Editor.
7.1 ESETS update utility To maintain the effectiveness of ESET Gateway Security, the virus signature database must be kept up to date. The esets_update utility has been developed for this purpose. See the esets_update(8) man page for details. To launch an update, the configuration options ‘av_update_username‘...
8. Let us know Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET Gateway Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation. If you feel that any sections in this Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support...
9. Appendix A. ESETS setup and configuration 9.1 Setting ESETS for scanning of HTTP communication - transparent mode HTTP scanning is performed using the esets_http daemon. In the [http] section of the ESETS configuration file, set the following parameters: agent_enabled = yes listen_addr = ”192.168.1.10”...
10. Appendix B. PHP License The PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.
Need help?
Do you have a question about the GATEWAY SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?
Questions and answers