Protecting a Local Web Server

Top  Previous  Next

This option is available only in the product distributions for GNU/Linux OSes.

To protect a web server that is running on the same host on which Dr.Web for UNIX Internet Gateways is installed, you need to configure the Dr.Web Firewall for Linux component in such a way that traffic coming to the web server will be checked by the SpIDer Gate monitor.

To configure protection for a web sever, change the value of the InputDivert parameter, which is located in the configuration file, in the section with the settings of Dr.Web Firewall for Linux (the [LinuxFirewall] section):

InputDivert = Auto(interface:<network interface> protected:<list of ports>)

where

<network interface>—is the name of a network interface (eth0, wlan etc.) through which inbound connections that must be checked access the web server.

<list of ports>—a list of ports serviced by the web server (80, 8080 etc.).

To view and to change the settings of Dr.Web Firewall for Linux and SpIDer Gate you can use the following means:

The command-line-based management tool—Dr.Web Ctl (use the drweb-ctl cfshow and drweb-ctl cfset commands).

The management web interface of Dr.Web for UNIX Internet Gateways (by default, you can access it via a web browser at https://127.0.0.1:4443/).

For example, the following command:

# drweb-ctl cfset LinuxFirewall.InputDivert 'Auto(interface:eth0 protected:80,8080)'

will configure the Dr.Web Firewall for Linux in such a way that the data received via the eth0 network interface and directed to the local ports 80 or 8080 will be checked by the SpIDer Gate monitor.