Installation manual
Table Of Contents
- Introduction
- Terminology and abbreviations
- System requirements
- Installation
- Architecture Overview
- Integration with Email Messaging System
- Important ESET Mail Security mechanisms
- ESET Security system update
- Let us know
- Appendix A. ESETS setup and configuration
- Setting ESETS for MTA Postfix
- Setting ESETS for MTA Sendmail
- Setting ESETS for MTA Qmail
- Setting ESETS for MTA Exim version 3
- Setting ESETS for MTA Exim version 4
- Setting ESETS for MTA ZMailer
- Setting ESETS for MTA Novell GroupWise
- Setting ESETS for outbound email message scanning
- Setting ESETS for scanning of POP3 communication
- Setting ESETS for scanning of IMAP communication
- Appendix B. PHP License

38
10.10 Setting ESETS for scanning of IMAP communication
The IMAP communication scanning is performed using the esets_imap daemon. In the [imap] section of the ESETS configuration
file, set these parameters:
agent_enabled = yes
listen_addr = "192.168.1.10"
listen_port = 8143
where ‘listen_addr’ is the address of the local network interface named if0. Then restart the ESETS daemon. The next step is to
redirect all IMAP requests to esets_imap. If IP-filtering is being performed by the ipchains administration tool an appropriate
rule would be:
ipchains -A INPUT -p tcp -i if0 --dport 143 -j REDIRECT 8143
If IP-filtering is being performed by the iptables administration tool, the rule is:
iptables -t nat -A PREROUTING -p tcp -i if0 --dport 143 -j REDIRECT --to-ports 8143
On FreeBSD, the rule is as follows:
ipfw add fwd 192.168.1.10,8143 tcp from any to any 143 via if0 in
On NetBSD and Solaris:
echo 'rdr if0 0.0.0.0/0 port 143 -> 192.168.1.10 port 8143 tcp' | ipnat -f -