Help for Kaspersky Web Traffic Security
- Kaspersky Web Traffic Security
- Licensing the application
- Scaling Kaspersky Web Traffic Security
- Installation and initial configuration of the application from an RPM or DEB package
- Installation and initial configuration of the application deployed from an ISO image
- Deploying a virtual machine in the VMware ESXi Hypervisor Management Console
- Deploying a virtual machine in the VMware vSphere web interface
- Deploying a virtual machine in the Management Console of Microsoft Hyper-V Manager
- Deploying a virtual machine using Microsoft SCVMM
- Application installation and initial configuration
- Removing an application deployed from an ISO image
- Preparing to remove the application
- Removing the application from a physical server
- Removing a virtual machine in the VMware ESXi Hypervisor Management Console
- Removing a virtual machine in the VMware vSphere web interface
- Removing a virtual machine in the Microsoft Hyper-V Hypervisor Management Console
- Removing a virtual machine using Microsoft SCVMM
- Getting started with the application
- Monitoring application operation
- Reports
- Kaspersky Web Traffic Security event log
- Using traffic processing rules
- Scenario for configuring access to web resources
- Adding a bypass rule
- Adding an access rule
- Adding a protection rule
- Configuring a rule triggering initiator
- Configuring traffic filtering
- Adding an exclusion for a traffic processing rule
- Configuring the schedule of a traffic processing rule
- Modifying a traffic processing rule
- Deleting a traffic processing rule
- Creating a copy of a traffic processing rule
- Enabling and disabling a traffic processing rule
- Changing the order of applied rules
- Working with traffic processing rule groups
- Configuring a default protection policy
- Monitoring traffic processing rules
- Managing workspaces
- Working with roles and user accounts
- Managing the cluster
- Creating a new cluster
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to a cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Checking data integrity
- Connecting to cluster nodes over the SSH protocol
- Restarting a cluster node
- Application operation in emergency mode
- Protecting network traffic
- ICAP server settings
- Block page
- Exporting and importing settings
- Upgrading the application from version 6.0 to version 6.1
- Installing update packages
- Installing the kwts_upgrade_6.1.0.4762_os_security_november_2024 update package
- Configuring the server time
- Configuring proxy server connection settings
- Updating Kaspersky Web Traffic Security databases
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Connecting to a LDAP server
- Configuring integration with Kaspersky Anti Targeted Attack Platform
- Syslog event log
- Application management over the SNMP protocol
- Single Sign-On authentication
- Managing the settings of a built-in proxy server in the application web interface
- Decrypting TLS/SSL connections
- Processing CONNECT requests
- About TLS connections
- Managing certificates for intercepting SSL connections
- Enabling and disabling decryption of SSL connections
- Selecting the default action for SSL connections
- Managing SSL rules
- Managing trusted certificates
- Sources of information about the application
- Publishing application events to a SIEM system
- Contacting the Technical Support
- Appendix 1. Installing and configuring the Squid service
- Appendix 2. Configuring integration of the Squid service with Active Directory
- Configuring Kerberos authentication
- Configuring NTLM authentication
- Installing the Samba service
- Configuring time synchronization
- Configuring DNS
- Configuring Samba on the server hosting the Squid service
- Checking Samba settings on the server hosting the Squid service
- Configuring the Squid service
- Configuring the client side of NTLM authentication
- Configuring NTLM authentication of a host that is not in a domain
- Configuring Basic authentication
- Appendix 3. Configuring ICAP balancing using HAProxy
- Appendix 4. MIME types of objects
- Appendix 5. URL normalization
- Appendix 6. Website categories
- Appendix 7. Physical processor core bandwidth values depending on the type of proxy server and the required protection level
- Appendix 8. Virtual processor bandwidth values depending on the type of proxy server and the required protection level
- Glossary
- Access rule
- Basic authentication
- Bypass rule
- Certificate fingerprint
- Cluster
- Directory service
- Heuristic analysis
- ICAP server
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Keytab file
- Layout
- LDAP
- License serial number
- Malicious links
- MIB (Management Information Base)
- nginx service
- Node with role Control
- Node with role Secondary
- Normalization
- NTLM authentication
- Phishing
- Protection rule
- PTR record
- Replay cache
- Reputation filtering
- SELinux (Security-Enhanced Linux)
- Service principal name (SPN)
- SIEM system
- SNI (Server Name Indication)
- SNMP agent
- SNMP trap
- Squid
- SRV record
- SSL Bumping
- Syslog
- TLS encryption
- Tracing
- Traffic processing rule
- Update source
- Virus
- Workspace
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Creating a virtual machine in the VMware ESXi Hypervisor Management Console
To create a virtual machine in the VMware ESXi Hypervisor Management Console:
- Open the Management Console of the VMware ESXi hypervisor.
- In the Navigator pane, select the Virtual Machines section.
- Click the Create/Register VM button.
The Virtual Machine Creation Wizard opens.
- Follow the steps of the Wizard:
- Select the virtual machine creation method.
- Select the Create a new virtual machine option.
This method lets you manually configure the settings and hardware configuration of the virtual machine.
- Click Next.
The Wizard proceeds to the next step.
- Select the Create a new virtual machine option.
- Specify the virtual machine name and select the guest operating system.
- In the Name field, enter the name of the virtual machine.
The name must be unique among the names of all existing virtual machines.
- In the Compatibility drop-down list, select ESXi 6.5 and later.
- In the Guest OS Family drop-down list, select Linux.
- In the Guest OS Version drop-down list, select CentOS 7 (64-bit).
- Click Next.
The Wizard proceeds to the next step.
- In the Name field, enter the name of the virtual machine.
- Select the virtual data storage.
- Select the virtual data storage from the list of available storages.
- Click Next.
The Wizard proceeds to the next step.
- Set the virtual machine hardware configuration.
- On the Virtual Hardware tab, in the CPU settings group, select the necessary number of virtual processors from the drop-down list.
The minimum recommended value is 8. You can specify a larger value if you require higher performance of the virtual machine.
The set of available values depends on the capabilities of the hypervisor.
- Expand the Memory settings group and do the following:
- In the RAM field, specify the amount of RAM that will be allocated for the virtual machine.
The minimum recommended value is 16 GB. You can specify a larger value if you require higher performance of the virtual machine.
- Select the Reserve all guest memory (All locked) check box.
- In the RAM field, specify the amount of RAM that will be allocated for the virtual machine.
- Expand the Hard Disk 1 settings group and do the following:
- Specify the amount of disk space that will be allocated for the virtual machine.
The minimum recommended value is 200 GB. You can specify a larger value if you need to save a large database for the event log.
- In the Disk Provisioning block, select the type of provisioning for virtual machine files.
- Specify the amount of disk space that will be allocated for the virtual machine.
- In the Network Adapter 1 settings group, select the virtual network to which the virtual machine will connect.
- In the CD/DVD Drive 1 settings group, do the following:
- Select the Datastore ISO File drive type.
- Click the Browse... button on the right of the CD/DVD Media field.
The file selection window opens.
- Select the ISO file that was uploaded prior to beginning installation and click OK.
- Select the Connect at power on check box.
- Click Next.
The Wizard proceeds to the next step.
- On the Virtual Hardware tab, in the CPU settings group, select the necessary number of virtual processors from the drop-down list.
- Confirm creation of the virtual machine.
- Verify that the virtual machine settings configured at previous steps are correct.
- If all settings are configured correctly, click the Finish button.
- Select the virtual machine creation method.
A virtual machine with the defined settings will be created.