Installation manual
ESET GATEWAY SECURITY
Copyright ©2013 by ESET, spol. s r. o.
ESET Gateway Security was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced,
stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning, or
otherwise without permission in writing from the author.
ESET, spol. s r. o. reserves the right to change any of the described
application software without prior notice.
Worldwide Customer Support: www.eset.com/support
REV. 7/2/2013
Contents
..................................................................31. Introduction
.........................................................................................3
Main functionality1.1
.........................................................................................3
Key features of the system1.2
..................................................................52. Terminology and abbreviations
..................................................................63. System requirements
..................................................................74. Installation
..................................................................95. Architecture Overview
..................................................................116. Integration with Internet Gateway services
.........................................................................................11
Transparent HTTP/FTP proxy configuration6.1
.........................................................................................12
Manual HTTP/FTP proxy configuration6.2
...........................................................................12Manual proxy configuration of Mozilla Firefox6.2.1
...........................................................................12Manual proxy configuration of Squid6.2.2
.........................................................................................13
Internet Content Adaptation configuration6.3
.........................................................................................14
Long Transfer Handling6.4
.........................................................................................14
ESETS plug-in filter for SafeSquid Proxy Cache6.5
...........................................................................15Operation principle6.5.1
...........................................................................15Installation and configuration6.5.2
..................................................................167. Important ESET Gateway Security mechanisms
.........................................................................................16
Handle Object Policy7.1
.........................................................................................16
User Specific Configuration7.2
.........................................................................................17
Blacklist and Whitelist7.3
...........................................................................17URL Whitelist7.3.1
.........................................................................................17
Samples Submission System7.4
.........................................................................................18
Scheduler7.5
.........................................................................................18
Web Interface7.6
...........................................................................19License management7.6.1
...........................................................................20Agent HTTP configuration example7.6.2
..........................................................................21HTTP Agent testing with the Mozilla Firefox7.6.2.1
...........................................................................22Scheduler7.6.3
...........................................................................23Statistics7.6.4
.........................................................................................23
Remote Administration7.7
...........................................................................24Remote Administration usage example7.7.1
.........................................................................................26
Logging7.8
.........................................................................................26
Command-line scripts7.9
..................................................................278. ESET Security system update
.........................................................................................27
ESETS update utility8.1
.........................................................................................27
ESETS update process description8.2
.........................................................................................27
ESETS mirror http daemon8.3
..................................................................289. Let us know
..................................................................2910. Appendix A. ESETS setup and configuration
.........................................................................................29
Setting ESETS for scanning of HTTP communication -
transparent mode
10.1
.........................................................................................29
Setting ESETS for scanning of FTP communication - transparent
mode
10.2
.........................................................................................29
Setting ESETS for scanning of ICAP encapsulated HTTP
messages
10.3
..................................................................3011. Appendix B. PHP License