You can use the Kaspersky IoT Secure Gateway Network Protector application to configure rules for blocking and filtering industrial protocol traffic in the Kaspersky IoT Secure Gateway 1000 configuration settings. Industrial traffic filtering uses packet analysis rules and includes the following checks:
For Kaspersky IoT Secure Gateway Network Protector to work, you need to configure it first. When started without a completed configuration, Kaspersky IoT Secure Gateway 1000 enters emergency mode, as it cannot receive traffic filtering rules to ensure a secure state.
To configure traffic filtering rules for industrial protocols:
The entire range of identifiers (sid) 9XXXXXXX is used for service purposes. Do not use these identifiers for custom rules. When using service identifiers from this range for custom rules, Kaspersky IoT Secure Gateway 1000 may switch to emergency support mode.
For detailed information on using the utility, refer to the Kaspersky Update Utility documentation.
Some rules contained in the industrial_commands.rules and industrial_anomalies.rules files may block business scenarios. Before using the rules from these files, we recommend that you first analyze them and select only the ones you need. As an example, you can use the rule described in step 7 of this instruction.
While Kaspersky IoT Secure Gateway Network Protector is stopped, transit traffic on the device will be blocked to ensure the security of connected devices.
kaspersky.kisg.netprotector
, add "APP_CONFIGURATION": {}
.APP_CONFIGURATION
, specify the following settings to enable and configure industrial protocol traffic filtering:"industrial_commands_rules": ""
parameter and specify a list of Base64-encoded rules for filtering commands at industrial protocol level."industrial_anomaly_rules": ""
parameter and specify a list of Base64-encoded rules for detecting traffic anomalies at industrial protocol level.As a result, the settings configuration under kaspersky.kisg.netprotector
will appear as shown below:
"APP_CONFIGURATION": {
"industrial_commands_rules": " <Base64 encoded rules>
",
"industrial_anomaly_rules": " <Base64-encoded rules>
"
}
For Kaspersky IoT Secure Gateway Network Protector to work, define at least one configuration setting, or else Kaspersky IoT Secure Gateway 1000 will enter emergency mode after you start it, as it cannot receive traffic filtering rules to ensure a secure state. You can disable only one of the settings by putting empty quotation marks ""
as the parameter value.
After adding APP_CONFIGURATION
and its settings, you cannot delete it, as it is required for the application to work.
Industrial protocol traffic will be filtered using the specified rules. If the rule is triggered, traffic that matches the rule is blocked, and the IP address where the traffic originated is added to the IP address denylist. The information that the IP address was blocked is sent to the Kaspersky IoT Secure Gateway 1000 firewall. The traffic blocking event is recorded in the audit log.
If you want to disable the use of specific rules specified in the "industrial_commands_rules"
and "industrial_anomaly_rules"
parameters, you can add the "disable_commands_rules": []
and "disable_anomaly_rules": []
parameters to the APP_CONFIGURATION
object, respectively, and specify the following values for them:
sid
numbers from the "industrial_commands_rules"
rule set for the "disable_commands_rules": []
parameter to disable specific command filtering rules at the industrial protocol level. Each sid
number must be specified in double quotes, for example: "disable_commands_rules": ["123", "456"]
.sid
numbers from the "industrial_anomaly_rules"
rule set for the "disable_anomaly_rules": []
parameter to disable specific anomaly detection rules in traffic passing at the industrial protocol level. Each sid
number must be specified in double quotes, for example: "disable_anomaly_rules": ["123", "456"]
.In some cases when the Kaspersky IoT Secure Gateway Network Protector application cannot process traffic received by the device, it may crash and the system will switch to emergency support mode. This may occur when processing specific types of network packets sent via the SIP, SMB, SMTP, DNS, HTTP, or HTTP2 protocols. The SIP protocol is involved in establishing a connection from external IP addresses if the modem is being used as the main communication channel and has an installed SIM card whose IP address can be accessed directly from the internet.
If this happens, you will need to apply a patch to disable processing of unsupported traffic and thereby restore the functionality of the application and system.