agent_enabled = yes
listen_addr = ”192.168.1.0”
listen_port = 2525
where‘listen_addr’ is the address of localnetwork interface named if0. Then restart ESETS
daemon. The next step is to redirect all SMTP requests to esets_smtp. In case of IP-ltering
provided by ipchains administration tool an appropriate rule is:
ipchains -A INPUT -p tcp -i if0 --dport 25 -j REDIRECT 2525
If IP-ltering mechanism is provided by iptables administration tool, the rule is:
iptables-tnat-APREROUTING-ptcp-iif0\
--dport 25 -j REDIRECT --to-ports 2525
On FreeBSD, the rule is as follows:
ipfw add fwd 192.168.1.10,2525 tcp from any to any 25 via if0 in
On NetBSD and Solaris:
echo ’rdr if00.0.0.0/0port25->192.168.1.10\
port 2525 tcp’ | ipnat -f -
Warning: Your MTA may accept all connections without extensive checking from esets_smtp
because they are local. By using your own rewall rules, make sure you do not create an open
relay, i.e. allow someone from the outside to connect to esets_smtp and thus use him as relay
SMTP server.
A.8. Setting ESETS for scanning of POP3 communication
ThePOP3communicationscanningisperformedusingesets_pop3daemon.Inthe[pop3]
section of ESETS conguration le set these parameters:
agent_enabled = yes
listen_addr = ”192.168.1.10”
listen_port = 8110
where‘listen_addr’ is the address of local network interface named if0 Then restart ESETS
daemon. The next step is to redirect all POP3 requests to esets_pop3. In case of IP-ltering
provided by ipchains administration tool an appropriate rule is:
ipchains -A INPUT -p tcp -i if0 --dport 110 -j REDIRECT 8110
If IP-ltering mechanism is provided by iptables administration tool, the rule is:
iptables-tnat-APREROUTING-ptcp-iif0\
--dport 110 -j REDIRECT --to-ports 8110
On FreeBSD, the rule is as follows: