The Kaspersky Industrial CyberSecurity for Linux Nodes application creates a special chain of allowing rules named kics_bypass and adds it first to the list of the mangle table of the iptables and ip6tables utilities. The kics_bypass chain rules lets you exclude traffic from interception by the application. If traffic exclusion rules are configured in the chain, these rules affect the Web Threat Protection, Network Threat Protection, and Web Control components.
The rules in this chain can be changed by means of the operating system.
For example, to exclude incoming and outgoing HTTP traffic, you need to add a rule by running the following command: iptables -t mangle -I kics_bypass -m tcp -p tcp --dport http -j ACCEPT.
When the application is removed, the kics_bypass rule chain in iptables and ip6tables is removed only if it was empty.
Page top