38
ESET Mail Security
agent_enabled = yes
listen_addr = ”192.168.1.0”
listen_port = 2525
where ‘listen_addr’ is the address of the local network interface named
if0
. Then, restart the
ESETS daemon. The next step is to redirect all SMTP requests to
esets_smtp
. If IP-filtering is being
performed by the ipchains administration tool, an appropriate rule would be:
ipchains -A INPUT -p tcp -i
if0
--dport 25 -j REDIRECT 2525
If IP-filtering is being performed by the iptables administration tool, the rule is:
iptables -t nat -A PREROUTING -p tcp -i
if0
\
--dport 25 -j REDIRECT --to-ports 2525
On FreeBSD, the rule is as follows:
ipfw add fwd 192.168.1.10,2525 tcp from any to any 25 via
if0
in
On NetBSD and Solaris:
echo ’rdr
if0
0.0.0.0/0 port 25 -> 192.168.1.10 \
port 2525 tcp’ | ipnat -f -
Warning:
Your MTA may accept all connections without extensive checking from
esets_smtp
because those connections are local. By using your own firewall rules, make sure you do not
create an open relay, i.e., allow someone from the outside to connect to
esets_smtp
and use it
as a relay SMTP server.
A.8. Setting
ESETS
for scanning of POP3 communication
The POP3 communication scanning is performed using esets_pop3 daemon. In the [pop3]
section of the ESETS configuration file, set these parameters:
agent_enabled = yes
listen_addr = ”192.168.1.10”
listen_port = 8110
where ‘listen_addr’ is the address of the local network interface named
if0
. Then restart the
ESETS daemon. The next step is to redirect all POP3 requests to esets_pop3. If IP-filtering is being
performed by the ipchains administration tool, an appropriate rule is:
ipchains -A INPUT -p tcp -i
if0
--dport 110 -j REDIRECT 8110
If IP-filtering is being performed by the iptables administration tool, the rule would be:
iptables -t nat -A PREROUTING -p tcp -i
if0
\
--dport 110 -j REDIRECT --to-ports 8110
On FreeBSD, the rule is as follows:
Summary of Contents for MAIL SECURITY
Page 1: ...ESET Mail Security Installation Manual and User Guide we protect digital worlds...
Page 3: ...Chapter 1 Introduction...
Page 5: ...Chapter 2 Terminology and abbreviations...
Page 8: ......
Page 9: ...Chapter 3 Installation...
Page 11: ...Chapter 4 Architecture Overview...
Page 14: ......
Page 15: ...Chapter 5 Integration with Email Messaging System...
Page 21: ...Chapter 6 Important ESET Mail Security mechanisms...
Page 27: ...Chapter 7 Updating ESET Mail Security...
Page 29: ...Chapter 8 Let us know...
Page 31: ...Appendix A ESETS setup and configuration...
Page 40: ......
Page 41: ...Appendix B PHP License...