CacheGuard-OS
User's Guide - Version UF-2.3.5


Antivirus

The antivirus detects malware (viruses, trojans, worms) in Web traffic incoming from the external zone and blocks them at the gateway before they can enter your networks. The antivirus can operate in forwarding/browsing (web) mode as well as in reverse (rweb) mode. In forwarding mode, it blocks all attempts to access malware in Web traffic, while in reverse mode, all attempts to upload malware to protected Web servers are prevented (in rweb mode, the CacheGuard appliance is deployed in front of Web servers). To activate the antivirus, use the mode antivirus on command followed by the apply command.
The antivirus detects MS Office macro viruses, mobile malware, and other threats. It supports 32/64-bit Portable Executable files and 32-bit ELF files. It scans not only simple files but also inspects content within archive and compression files such as, but not limited to, ZIP (+SFX), RAR (+SFX), TAR, GZIP, BZIP2, MS OLE2, MS Cabinet files (+SFX), MS CHM (Compiled HTML), MS SZDD compression format, BinHex, SIS (SymbianOS packages), AutoIt, and NSIS. In addition, the following file types are inspected:

Automatic Updating

The CacheGuard appliance periodically checks the malware signature database and, if necessary, downloads updates. Updates are retrieved from a public service named database.clamav.net on the Internet. It is important to note that excessive or abusive download activity can result in temporary blocking by that service, which is outside the CacheGuard appliance’s control. To avoid being banned, it is recommended to allow the CacheGuard appliance to automatically update the signature database and to avoid manual updates unless absolutely necessary.

To complement the standard malware signature database provided by database.clamav.net, additional malware signatures are available as an optional service from CacheGuard Technologies. You can easily subscribe to this service. After subscribing, simply activate it on your CacheGuard appliance by setting the provided password and file server name (using the access file and password file commands).

Antivirus and WAF

When the CacheGuard appliance is deployed as a WAF in front of your Web servers (both rweb and waf modes activated), the antivirus scans all attempts to upload files to your protected or cloaked Web servers. If malware is detected in an uploaded file, the CacheGuard appliance immediately blocks the upload before the file can reach the Web servers. Note that the only upload method supported by the antivirus is the POST method with an encoding type of multipart/form-data. The following commands activate and configure the antivirus to scan file upload attempts on the Web server with the IP address 10.20.0.100, protected by the CacheGuard appliance:

Antivirus and MTA

The antivirus is natively used by the integrated Web proxy to block malware in Web traffic. However, it can also be used as a service offered to external clients or services such as an MTA (Mail Transfer Agent). For instance, to grant access to a remote exim4 MTA with the IP address 10.20.0.200 communicating with the CacheGuard appliance via its internal network interface, use the following commands: In this example, the exim4 MTA must be configured to use the CacheGuard appliance as its antivirus service by adding the following line to its configuration file: av_scanner = clamd: 10.20.0.254 8083.

Testing the Antivirus

The European Expert Group for IT Security provides virus test files for verification purposes. These files are available on the https://www.eicar.org/ website. To test the antivirus using these files, download them to an HTTP (not HTTPS) Web server and attempt to download them through your CacheGuard appliance Web proxy. If your CacheGuard antivirus is properly configured, the download attempt should be blocked by the CacheGuard appliance. To test directly from the https://www.eicar.org/ website, which uses HTTPS (not HTTP), SSL mediation must be activated on your CacheGuard appliance. Please refer to the SSL Mediation section to learn how to enable SSL mediation.