We spent a lot of time on the “textual” side - ok, here are the pictures…:
To configure the basic Copfilter for the first use after successful installation, choose the different Copfilter services one by one from the additional “Copfilter” tab on the IPCop menu bar.
V1 and V2 menu are a bit different - Copfilter V2 also includes C-ICAP Filter:
The status screen has been shown before - here again for completeness in all its beauty (IPCop 1.4.x, Copfilter 0.85.3beta4).
It shows a comprehensive overview of the installed Copfilter components - and something more.
Included are several Documentations, the Virus- and SPAM-Quarantine, the Monit Service Manager, the Whitelist-/Blacklist/SPAM-Manager and various SPAM- and Virus-Statistics.
Some screenshot details (Copfilter V1):
|ON||=||Service is active.|
|OFF||=||Service is stopped.|
|NOT ACTIVATED||=||Service is deactivated per GUI.|
|ON ACCESS (no pid)||=||Special case for service without daemon (for example: free F-PROT-version) - service is started only when required.|
The most important and indispensable information after first installation - the Copfilter E-mail-address.
All informations and alarms generated by 'monit' - as well as update-informations and alarms from all installed virus-scanners - will be sent to this address.
By clicking the button
the settings are applied.
Different to other occasions, there is No service restart required…
While configuring a service - in this case 'monit' - the user has the choice to only save his settings or also to restart the service:
Next, the POP3 scanner (P3Scan) for filtering incoming messages should be enabled and configured for filtering:
To check incoming mail for viruses, set the options “Enable P3Scan to filter incoming traffic…” and “Stop virus emails and send virus notification instead” to ON.
If not already done, this should be the latest point to hesitate and take a close look at the Copfilter documentations!
This becomes more clearly in the configuration page for the filtering of outgoing mail:
To check outgoing mail for viruses, set the options “Enable ProxSMTP to filter outgoing traffic…” and “Stop virus emails and send virus notification instead” to ON.
Outgoing mail is filtered and the attempt to send an email virus is blocked by ProxSMTP according to the settings made:
The configuration page of the HTTP scanner (HAVP, privoxy) can be set to filter all HTTP-network access through the installed virus scanners and through 'privoxy'.
Copfilter 2.0.91beta4 - 'HAVP' is ON, 'C-ICAP' is OFF (see below), 'privoxy' is ON:
On its - very extensive - configuration page, the various C-ICAP-function groups such as virus filtering, integration of built in URLFilter, editing of own white- and blacklists, selection of the external blacklist and its scheduled update can be configured.
Copfilter 2.0.91beta4, 'C-ICAP ON, 'HAVP' OFF, 'privoxy' ON:
The FTP Scanner (Frox) is a bit simplier in its settings, there is only ON or OFF…
'Spamassassin'-(AntiSpam)-configuration is a little more complicated - the default Copfilter values shown here should only be changed unless you really know what you are doing:
About the functionality of SpamAssassin:
This is the configuration page for the installed virus scanners and the 3rd party signatures, integrated since version 2.0.91beta1:
But ClamAV alone is controlled through ~80 possible parameters, which are unvisible here…
For those, who always got problems installing F-PROT, here's a screenshot how this is done (free workstation version):
On the Test & Logs page the Copfilter basic features of the POP3-, SMTP-, HTTP- and FTP-Scanner can be tested. Also several important log files can be viewed directly.
A list of archived logs is not possible here, only the current contents are shown.
All services are still in the OFF state.
Now the button “Restart all services” should be clicked:
A new page opens…
And depending on the browser, you'll have to wait for a while - or you may receive the following messages one by one (Copfilter 0.85.3beta4):