ESET Gateway Security
Copyright ©2010 by ESET, spol. s r. o.
ESET Gateway Security was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in writing
from the author.
ESET, spol. s r. o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV. 2010-11-30
Contents
................................................3
1. Introduction
........................................................................3Main functionality1.1
........................................................................3Key features of the system1.2
................................................5
2. Terminology and abbreviations
................................................7
3. Installation
................................................8
4. Architecture Overview
................................................9
5. Integration with Internet Gateway
services
........................................................................9Transparent HTTP/FTP proxy configuration5.1
........................................................................10Manual HTTP/FTP proxy configuration5.2
..............................................................................10Manual proxy configuration of Mozilla Firefox5.2.1
..............................................................................11
Manual proxy configuration of Squid Web
Proxy Cache
5.2.2
........................................................................12Internet Content Adaptation configuration5.3
........................................................................12Large HTTP Objects Handling5.4
........................................................................13ESETS plug-in filter for SafeSquid Proxy Cache5.5
..............................................................................13Operation principle5.5.1
..............................................................................13Installation and configuration5.5.2
................................................15
6. Important ESET Gateway Security
mechanisms
........................................................................15Handle Object Policy6.1
........................................................................15User Specific Configuration6.2
........................................................................16Blacklist and Whitelist6.3
..............................................................................16Whitelist URL6.3.1
........................................................................16Samples Submission System6.4
........................................................................17Web Interface6.5
..............................................................................18License management6.5.1
..............................................................................18Agent HTTP configuration example6.5.2
..............................................................................19HTTP Agent testing with the Mozilla Firefox6.5.2.1
..............................................................................20Statistics6.5.3
........................................................................21Remote Administration6.6
..............................................................................21Remote Administration usage example6.6.1
................................................23
7. ESET Security system update
........................................................................23ESETS update utility7.1
........................................................................23ESETS update process description7.2
........................................................................23ESETS mirror http daemon7.3
................................................24
8. Let us know
................................................25
9. Appendix A. ESETS setup and
configuration
........................................................................25
Setting ESETS for scanning of HTTP communication
- transparent mode
9.1
........................................................................25
Setting ESETS for scanning of FTP communication transparent mode
9.2
........................................................................25
Setting ESETS for scanning of ICAP encapsulated
HTTP messages
9.3
................................................26
10. Appendix B. PHP License