<?xml version="1.0"?>
<rss version="2.0"><channel><title>Kaspersky Security for Internet Gateway Latest Topics</title><link>https://forum.kaspersky.com/forum/kaspersky-security-for-internet-gateway-176/</link><description>Kaspersky Security for Internet Gateway Latest Topics</description><language>en</language><item><title>SNMP MIBS</title><link>https://forum.kaspersky.com/topic/snmp-mibs-38632/</link><description><![CDATA[<p>
	Hi, 
</p>

<p>
	I need to know if exist a MIB objects for Kaspersky Web Traffic Security that support monitoring interface traffic
</p>

<p>
	For example:
</p>

<ul>
	<li>
		Bandwidth % used in the intefaces.
	</li>
	<li>
		Bandwidth used for the clients.
	</li>
	<li>
		# of clients connected in each node.
	</li>
</ul>

<p>
	Thanks in advanced!
</p>
]]></description><guid isPermaLink="false">38632</guid><pubDate>Thu, 18 Jan 2024 14:31:05 +0000</pubDate></item><item><title>Bypassing rule for ISO files</title><link>https://forum.kaspersky.com/topic/bypassing-rule-for-iso-files-37522/</link><description><![CDATA[<p>
	Hi all,<br />
	<br />
	Would some of you have examples of rules creation within KSIG ? My goal would be not the scan ISO images bigger than 100MB.<br />
	I came with this although was wonder if the mime type isn't perhaps to "broad" so to speak:
</p>

<table>
	<tbody>
		<tr>
			<td colspan="2">
				<p>
					Bypass Rule<br />
					<br />
					Traffic filter<br />
					HTTP Content-Length, KB     greater than or equal to 100240 KB<br />
					--- AND ---<br />
					MIME type of HTTP message     application/octet-stream
				</p>

				<p>
					It works as intended although if anyone might have better or sharper, it's welcome.
				</p>

				<p>
					Let me know,<br />
					Kind regards,<br />
					M.
				</p>
			</td>
		</tr>
		<tr>
			<td>
				 
			</td>
		</tr>
		<tr>
			<td>
				 
			</td>
			<td>
				 
			</td>
		</tr>
		<tr>
			<td>
				 
			</td>
			<td>
				 
			</td>
		</tr>
		<tr>
			<td>
				 
			</td>
		</tr>
	</tbody>
</table>
]]></description><guid isPermaLink="false">37522</guid><pubDate>Mon, 27 Nov 2023 13:03:37 +0000</pubDate></item><item><title>Categories in Dashboard are always 0</title><link>https://forum.kaspersky.com/topic/categories-in-dashboard-are-always-0-32965/</link><description><![CDATA[<p>
	What should we do to have sites get <span lang="en" xml:lang="en"><span><span>categorized/</span></span></span>classified ? Isn't it an automatic action based on some KWTS database ?
</p>
]]></description><guid isPermaLink="false">32965</guid><pubDate>Fri, 21 Apr 2023 15:06:29 +0000</pubDate></item><item><title>EICAR.COM and EICAR_COM.ZIP</title><link>https://forum.kaspersky.com/topic/eicarcom-and-eicar_comzip-32964/</link><description><![CDATA[<p>
	EICAR.COM test file from "<a href="https://www.eicar.org/download-anti-malware-testfile/" rel="external nofollow">https://www.eicar.org/download-anti-malware-testfile/</a>" is detected and blocked, BUT! EICAR_COM.ZIP is detected and ALLOWED to be downloaded. Is it OK ? It seems not...
</p>
]]></description><guid isPermaLink="false">32964</guid><pubDate>Fri, 21 Apr 2023 14:51:12 +0000</pubDate></item><item><title>How to import .KEY file ?</title><link>https://forum.kaspersky.com/topic/how-to-import-key-file-32908/</link><description><![CDATA[<p>
	We have key-file with suitable licence number. How to import it ? 
</p>
]]></description><guid isPermaLink="false">32908</guid><pubDate>Mon, 17 Apr 2023 12:03:20 +0000</pubDate></item><item><title>How to get trial license ?</title><link>https://forum.kaspersky.com/topic/how-to-get-trial-license-32906/</link><description><![CDATA[<p>
	How to get trial license ?
</p>
]]></description><guid isPermaLink="false">32906</guid><pubDate>Mon, 17 Apr 2023 09:29:56 +0000</pubDate></item><item><title>How to update licence on Web Traffic Security 6.1?</title><link>https://forum.kaspersky.com/topic/how-to-update-licence-on-web-traffic-security-61-32474/</link><description><![CDATA[<p>
	Hi,
</p>

<p>
	i got a new licence and Activation Code for Web Traffic Sec on my Squid proxy.
</p>

<p>
	In the Settings at the web-gui there is a "licence" subject, but it only allows to *delete* the active key. Not to add / update one.
</p>

<p>
	Do i have to delete the key first, before  updating the new one?
</p>

<p>
	Will Kaspersky halt if i delte the existing key and kill all my users connections?
</p>

<p>
	I am afraid, i need some help here. The docs are not usefull on that...
</p>

<p>
	 
</p>

<p>
	regards
</p>

<p>
	Sachbearbeiter
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">32474</guid><pubDate>Mon, 27 Mar 2023 09:12:23 +0000</pubDate></item><item><title>Serving a proxy.cap file through nginx on KWTS all in one appliance (ISO)</title><link>https://forum.kaspersky.com/topic/serving-a-proxycap-file-through-nginx-on-kwts-all-in-one-appliance-iso-28954/</link><description><![CDATA[<p>
	Hi all,<br />
	<br />
	A possible way of serving a "proxy.pac" file from your KWTS "all in one" appliance (.ISO based setup) --&gt; <strong>please note that this might not be officially supported</strong><br />
	Obviously, you need SSH access to your KWTS appliance.
</p>

<pre class="ipsCode prettyprint lang-html prettyprinted"><span class="pln">----&gt; edit /etc/nginx/mime.types and add the following line where it alphabetically belongs, respecting the identation:
[root@kwts ~]# vim /etc/nginx/mime.type
types {
  ~
  application/x-ns-proxy-autoconfig			pac;
  ~
}

----&gt; create a folder which will be hosting our .pac file:
[root@kwts ~]# mkdir /usr/share/nginx/pac

----&gt; create /etc/nginx/conf.d/pacserver.conf (you need to edit the lines below according to your wanted scheme: </span><span class="tag">&lt;port&gt;</span><span class="pln">, </span><span class="tag">&lt;fqdn&gt;</span><span class="pln">):
[root@kwts ~]# vim /etc/nginx/conf.d/pacserver.conf
server {
  listen </span><span class="tag">&lt;port&gt;</span><span class="pln">;
  server_name  </span><span class="tag">&lt;fqdn&gt;</span><span class="pln">;
  charset utf8;
  location / {
    root /usr/share/nginx/pac;
    index proxy.pac;
  }
}
    
----&gt; create your proxy.pac file and edit accordingly:
[root@kwts ~]# vim /usr/share/nginx/pac/proxy.pac 
function FindProxyForURL(url, host) 
{
        
        // Convert host to lower case
        var lhost = host.toLowerCase();
        host = lhost;
        
        // Convert url to lower case
        var lurl = url.toLowerCase();
        url = lurl;
        
        // Defining proxy Services
        var direct = "DIRECT";
        var kwts = "PROXY 10.1.1.250:3128";
        
        // Forced through --&gt; KWTS
        if (shExpMatch(host, "Hostname.FQDN"))
            return kwts;
        
        // If the hostname suffix is within *.xxx --&gt; DIRECT.
        if (shExpMatch(host, "*.local"))
            return direct;
        
        // DEFAULT RULE: Catchall --&gt; KWTS
            return kwts;

}    
    
----&gt; restart nginx services
[root@kwts ~]# systemctl restart nginx.service

----&gt; verify that the assigned PACSERVER:PORT is up and listening:
[root@kwts ~]# ss -tnlp

----&gt; test a proxy.pac retrieval:
[root@kwts ~]# curl http://</span><span class="tag">&lt;your.fqdn.suffix:port&gt;</span><span class="pln">/proxy.pac
function FindProxyForURL(url, host) 
{
        
        // Convert host to lower case
        var lhost = host.toLowerCase();
        host = lhost;
        
        // Convert url to lower case
        var lurl = url.toLowerCase();
        url = lurl;
        
        // Defining proxy Services
        var direct = "DIRECT";
        var kwts = "PROXY 10.1.1.250:3128";
        
        // Forced through --&gt; KWTS
        if (shExpMatch(host, "Hostname.FQDN"))
            return kwts;
        
        // If the hostname suffix is within *.xxx --&gt; DIRECT.
        if (shExpMatch(host, "*.local"))
            return direct;
        
        // DEFAULT RULE: Catchall --&gt; KWTS
            return kwts;

}   
[root@kwts ~]#</span></pre>

<p>
	You should afterwards be able to configure your OS'es/Browsers using the PAC file: http://kwts.domain.suffix:PORT/proxy.pac
</p>

<p>
	Hope this helps,<br />
	Kind regards.<br />
	m.
</p>
]]></description><guid isPermaLink="false">28954</guid><pubDate>Mon, 31 Oct 2022 18:32:36 +0000</pubDate></item><item><title><![CDATA[disengaging VIA & X-FORWARDED-FOR HEADERS]]></title><link>https://forum.kaspersky.com/topic/disengaging-via-x-forwarded-for-headers-28915/</link><description><![CDATA[<p>
	Hi all,<br />
	<br />
	Continuing my testings, like it more and more <span class="ipsEmoji">?</span><br />
	I actually found out that the integrated squid proxy would send out the VIA &amp; X-FORWARDED-FOR HEADERS if not specifically disabled.<br />
	Here is what I've done in order to disengage these settings (caution: this might not be supported at all):<br />
	 
</p>

<pre class="ipsCode prettyprint lang-html prettyprinted"><span class="pln">---&gt; Edit the squid.conf.template file + addons = last tree lines of the snipet below:

[root@kwts ~]# vim  /opt/kaspersky/kwts-appliance-addon/share/templates/squid.conf.template
{#-* This is a template for generating a configuration file *-#}
################################################################################
# This file was generated automatically.                                       #
# All changes to this file will be lost.                                       #
################################################################################

cache deny all
cache_mem 0
shared_memory_locking on
shutdown_lifetime 5 seconds
stats_collection deny all
error_log_languages off
via off
forwarded_for off
follow_x_forwarded_for deny all

---&gt; Use the Web Admin interface and change any setting of the built-in proxy server. 
---&gt; This will cause the settings update. For example, you can change the Access log parameters and save the changes.</span></pre>

<p>
	You can test before and after here:<br />
	<a href="https://www.whatismybrowser.com/detect/what-http-headers-is-my-browser-sending" rel="external nofollow">https://www.whatismybrowser.com/detect/what-http-headers-is-my-browser-sending</a>
</p>

<p>
	Cheers,<br />
	m.
</p>
]]></description><guid isPermaLink="false">28915</guid><pubDate>Sun, 30 Oct 2022 15:47:33 +0000</pubDate></item><item><title><![CDATA[KWTS & Multi Homing]]></title><link>https://forum.kaspersky.com/topic/kwts-multi-homing-28907/</link><description><![CDATA[<p>
	Hi there KTeam,
</p>

<p>
	I'm currently testing KWTS and honestly I'm very pleased with the appliance, stunning stuff!!<br />
	I've been a bit astonished that multi-homing or multiple Ethernet interfaces doesn't seems to be endorsed by default, simple stuff like "trusted/untrusted" interface was my goal.
</p>

<p>
	Nevertheless, I found ways to enable KWTS in the layout I've wanted (perhaps not supported) and let me share that with you:
</p>

<pre class="ipsCode prettyprint lang-html prettyprinted"><span class="pln">----&gt; You need a public/private key pair in order to be able to access the KWTS Technical Support Mode (SSH):
----&gt; creating the key pair:
ssh-keygen -o
----&gt; You then need to upload the public key on KWTS Web Admin for being able to connect over SSH:
ssh -i kwts root@10.1.1.250

----&gt; Enabling ip_forward / reboot persistent:
[root@kwts ~]# cat /etc/sysctl.conf
# sysctl settings are defined through files in
# /usr/lib/sysctl.d/, /run/sysctl.d/, and /etc/sysctl.d/.
#
# Vendors settings live in /usr/lib/sysctl.d/.
# To override a whole file, create a new file with the same in
# /etc/sysctl.d/ and put new settings there. To override
# only specific settings, add a file with a lexically later
# name in /etc/sysctl.d/ and put new settings there.
#
# For more information, see sysctl.conf(5) and sysctl.d(5).
#
net.ipv4.ip_forward = 1

----&gt; Adding interface based routing (if needed etc..)
[root@kwts ~]# cat /etc/sysconfig/network-scripts/route-eth0
10.0.0.0/8 via 10.1.1.1 dev eth0

----&gt; A few iptables rules in order to DROP anything except ICMP messages inbounding on eth1 (my untrusted interface):
[root@kwts ~]# cp /etc/sysconfig/iptables-config /etc/sysconfig/iptables-config.ORG
[root@kwts ~]# iptables -F 
[root@kwts ~]# iptables -A INPUT -i eth1 -m state --state ESTABLISHED,RELATED -j ACCEPT 
[root@kwts ~]# iptables -A INPUT -i eth1 -p icmp -j ACCEPT 
[root@kwts ~]# iptables -A INPUT -i eth1 -j DROP
[root@kwts ~]# iptables-save &gt; /etc/sysconfig/iptables-config</span></pre>

<p>
	Finally, I've setup the KWTS on a KVM Host which worked flawlessly using the ISO file.<br />
	 
</p>

<p>
	Thanks,<br />
	Cheers,<br />
	m.
</p>

<p>
	 
</p>
]]></description><guid isPermaLink="false">28907</guid><pubDate>Sun, 30 Oct 2022 12:27:41 +0000</pubDate></item></channel></rss>
