ESET GATEWAY SECURITY - FOR LINUX BSD AND SOLARIS Installation Manual

Advertisement

Quick Links

ESET
Gateway Security
Installation Manual and User Guide
Linux, BSD and Solaris

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GATEWAY SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ESET GATEWAY SECURITY - FOR LINUX BSD AND SOLARIS

  • Page 1 ESET Gateway Security Installation Manual and User Guide Linux, BSD and Solaris...
  • Page 2: Table Of Contents

    ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
  • Page 3: Introduction

    1. Introduction Dear user, you have acquired ESET Gateway Security - the premier security system running under the Linux, BSD and Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux, BSD and Solaris OS server.
  • Page 4 Low system requirements To run efficiently, ESET Gateway Security requires just 16MB of hard-disk space and 32MB of RAM. It runs smoothly under the 2.2.x, 2.4.x and 2.6.x Linux OS kernel versions as well as under 5.x, 6.x FreeBSD OS kernel versions.
  • Page 5: Terminology And Abbreviations

    ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r. o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
  • Page 6 Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET Gateway Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems...
  • Page 7: Installation

    After purchasing ESET Gateway Security, you will receive your authorization data (username/password and license key). This data is necessary for both identifying you as our customer and allowing you to download updates for ESET Gateway Security. The username/password data is also required for downloading the initial installation package from our web site.
  • Page 8: Architecture Overview

    CORE The Core of ESET Gateway Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc. Please refer to the esets_daemon(8) man page for details.
  • Page 9: Integration With Internet Gateway Services

    All HTTP (or FTP) communication with outbound servers is then routed via network gateway server, where ESET Gateway Security must be installed in order to scan the communication for infiltrations. For this purpose, a generic ESETS HTTP (or FTP) filter has been developed, called esets_http (or esets_ftp).
  • Page 10: Manual Http/Ftp Proxy Configuration

    Manual proxy configuration of Mozilla Firefox The manual HTTP/FTP proxy configuration of esets_http with Mozilla Firefox is illustrated on Figure 5-2. This configuration allows ESET Gateway Security to be installed anywhere within the local network, including the gateway server and the user agent’s computer.
  • Page 11: Manual Proxy Configuration Of Squid Web Proxy Cache

    The manual HTTP proxy configuration of esets_http with the Squid Web Proxy Cache is illustrated by the right hand side of Figure 5-2. The significant difference from the previously described configuration is that ESET Gateway Security is installed on the HTTP/FTP Gateway between the proxy cache (Squid Web Proxy in this example) and the Internet. Thus, all inbound HTTP/FTP communications are first scanned for infiltrations and then stored in the dedicated network cache.
  • Page 12: Internet Content Adaptation Configuration

    ICAP request. The Proxy Cache must also work in this case as the ICAP client and pass the ICAP request for the message adaptation to ESET Gateway Security, namely to a generic ESETS ICAP server - esets_icap.
  • Page 13: Esets Plug-In Filter For Safesquid Proxy Cache

    To integrate the module, you must create links from the SafeSquid modules directory to the appropriate installation locations of the ESET Gateway Security package. In the following examples, it is assumed that SafeSquid is installed on a Linux OS in the ‘/opt/safesquid‘ directory.
  • Page 14 Config menu from the main interface page and browse Select a Section to Configure until you find ESET Gateway Security. Click Submit and create the antivirus profile for the ESET Gateway Security section by clicking the Add button at the bottom. Define the below parameters within the list that appears and click Submit. Remember to save the Safesquid configuration by clicking the Save settings button.
  • Page 15: Important Eset Gateway Security Mechanisms

    6. Important ESET Gateway Security mechanisms 6.1 Handle Object Policy The Handle Object Policy (see figure 6-1) mechanism provides filtering of scanned objects based on their status. This functionality is based on the following configuration options: action_av action_av_infected action_av_notscanned action_av_deleted For detailed information on these options, please refer to the esets.cfg(5) man page.
  • Page 16: Blacklist And Whitelist

    All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
  • Page 17: Web Interface

    In addition, users can choose to provide the ESET virus laboratory team with supplementary information using the ‘samples_provider_mail’ and/or ‘samples_provider_country’ configuration options. The information collected using these options will assist in providing the ESET team with an overview about a given infiltration which may be spreading over the Internet.
  • Page 18: License Management

    If you want to import new license files, use the following command: /usr/sbin/esets_lic --import *.lic Figure 6-2. ESET Licenses. You can enable the license notification option in the Global section options. If enabled, this functionality will notify you 30 days prior to your license expiration.
  • Page 19: Http Agent Testing With The Mozilla Firefox

    Using the web interface: Figure 6-3. ESETS - Configuration > HTTP Proxy. Always remember to save your new configuration by clicking Save changes. To apply your new changes click the Apply changes button in the Configuration sections panel. 6.5.2.1 HTTP Agent testing with the Mozilla Firefox To test ESETS HTTP Agent on your local machine, you need to set the local proxy server to localhost:8080.
  • Page 20: Statistics

    If attempt to open an infected file, a warning message similar to the one on the figure below will display in your browser window: Figure 6-6. ESETS warning message. 6.5.3 Statistics You can view statistics for all of active ESETS agents here. Statistics summary refreshes every 10 seconds. Figure 6-5.
  • Page 21: Remote Administration

    Sends all non-debug messages to Event logs These functionalities are not supported: Firewall Log Remote installation For more information, please read the ESET Remote Administrator manual. This manual is located on our web site at the following link: http://www.eset.com/documentation 6.6.1...
  • Page 22 By using ERA Console you can create a configuration task to ESETS daemon from ERA Console: Right click the connected Client Name Navigate to New Task > Configuration Task > Create... Expand Unix ESET Security tree For an example of a configuration task by the DAC agent, see below: Figure 6-7. ERA Configuration Editor.
  • Page 23: Eset Security System Update

    7.1 ESETS update utility To maintain the effectiveness of ESET Gateway Security, the virus signature database must be kept up to date. The esets_update utility has been developed for this purpose. See the esets_update(8) man page for details. To launch an update, the configuration options ‘av_update_username‘...
  • Page 24: Let Us Know

    8. Let us know Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET Gateway Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation. If you feel that any sections in this Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support...
  • Page 25: Appendix A. Esets Setup And Configuration

    9. Appendix A. ESETS setup and configuration 9.1 Setting ESETS for scanning of HTTP communication - transparent mode HTTP scanning is performed using the esets_http daemon. In the [http] section of the ESETS configuration file, set the following parameters: agent_enabled = yes listen_addr = ”192.168.1.10”...
  • Page 26: Appendix B. Php License

    10. Appendix B. PHP License The PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.

This manual is also suitable for:

Gateway security

Table of Contents